CISO Executive Summit & Roundtable 2010 Madrid - MIS Training
CISO Executive Summit & Roundtable 2010 Madrid - MIS Training
CISO Executive Summit & Roundtable 2010 Madrid - MIS Training
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Bring a Guest for FREE! Invite a colleague or security
peer along to the CISO Summit 2010 & they pay no fee!
* See back page for full terms & conditions
7th Annual
CISO Executive
Summit & Roundtable
2010 Madrid
9 – 11 June 2010, Hotel Wellington, Madrid
Managing Information Security Risk Holistically To Address New Expectations:
How Are You Emerging & Preparing For The Future?
Keynotes on the Latest Cyber Threats & Approaches By:
Francisco López Crespo, Deputy Director for Informatics, Communications and Networks, Ministry of Foreign Affairs
and Cooperation, Spain
Bernard Roussely, Recently Chief Information Assurance and Service Control Team, NC3 Agency, NATO
Mr. Heli Tiirmaa-Klaar, Senior Advisor to the Undersecretary of Defence, Ministry of Defence Estonia
Mike Humphrey, Head of Information Assurance and Accreditation, Serious Organised Crime Agency
Unrivalled International Speaker Panel Includes...
Gianluca D´Antonio, CISO, Grupo FCC (& President, ISMS Forum Spain)
Lazaro Pejsachowicz, Director of Information Security (RSSI), (French National Health Service)
Dr. Alastair MacWillson, Managing Director of Global Security Practice, Accenture
Marcus Alldrick, Chief Information Security Officer & Senior Manager, Information Protection and Continuity, Lloyd's
Chris van den Brink, CISO - Head of Information Security & Compliance, AkzoNobel, Netherlands
Dr. John I. Meakin, Director, Digital Security & CISO, BP plc
Dr. Robert Coles, CISO & Head of Digital Risk & Security, National Grid
David Cripps, CISO, Investec plc.
Julia Harris, Head of Information Security, BBC
Paul Wood MBE, Group Chief Security Officer, Aviva
Dr David Aubrey-Jones, Senior Information Security Specialist - Security & Risk, Information Security,
Royal Bank of Scotland Group
Kevin Harrington, Head of Information Risk Management, Bank of Tokyo-Mitsubishi UFJ Ltd
Dave Verma, Audit Investigations Manager, Brent Council, UK
Michael Colao, Recently Global CISO & Director Information Management, Dresdner Kleinwort
Mark Logsdon, Director, Information Risk Management, Barclays
Matthew Lord, Global Technology Risk Manager, Unilever
Dr. Cheryl Hennell, Head of IT Security and Information Assurance, Openreach, UK
Jorge Pinto, Chief Security Officer, Bank Credibom Portugal
Deepak Taneja, Founder, President & CTO, Aveksa
Ray Stanton, Global Head of Business Continuity, Security & Governance Practice, British Telecom
Dr. Eduardo Gelbstein, Adjunct Professor, Webster University, Geneva, Former Advisor, UN Board of Auditors
and Former Director, UN International Computing Centre
Iain Sutherland, Managing Director, Information Security Solutions
Eddie Schwartz, Chief Security Officer, NetWitness Corporation, U.S.
Randy Barr, Chief Security Officer, Qualys, Inc.
Charles Pask, Managing Director, ITSEC Associated Limited
Here’s What Your Peers Said About
Last Year’s CISO Summit &
Roundtable:
1. “The right people were in the room – ideal to meet
peers & new people, quality participants!”
2. “A friendly, relaxed & professional atmosphere, intimate”
3. “Practical thoughts & impressive presentations on key
topics plus an amazing level of networking & interaction”
4. “Quality of speakers who walk the walk, not just talk
the talk!”
5. “Open discussions, sharing of ideas & great debate
with all attendees! The place to learn & exchange
ideas on current threats and the mix of training &
debate avoids re-inventing the wheel”
Gain Inspiration & Motivation to Bolster Your Information Security Strategy & Team!
“Unparalleled opportunity to hear & talk to well-respected Information Industry leaders”
Chief Security Advisor, Microsoft Ltd
“The only IT Security event I will attend!” Head of Information Security, Baille Grifford
“One of the best conferences I have attended, bringing together key industry players willing to discuss
openly the issues they face together” CSO, AVIVA
“Excellent forum to confirm understanding & issues & to learn of different approaches” Group
Information Security Director, Xchanging
“For every CSO/CISO that's feeling lonely or frustrated with their work, come to a MIS CISO Executive Summit &
Roundtable & discuss the issues. Get better with the best!” CSO, Bank Portugal
Register now at conferences@mistieurope.com, www.mistieurope.com/ciso, Tel: +44 (0)20 7779 8944
Gold Sponsors
One to One
Meetings
Sponsors
Silver Sponsors Lead CISO Bronze Sponsor Cocktail Sponsor
Roundtable Sponsor
Lunch Sponsor
Association Partners
Media Partners
Breakfast Briefing
Sponsor
UK, EMEA & Spain
Valencia, Belgium & London
7th Annual CISO Executive Summit & Roundtable 2010 Madrid
“For every CSO/CISO that's feeling lonely or frustrated with their work, come to a MIS CISO Executive Summit & Roundtable and
discuss the issues. Get better with the best!” CSO, Bank Credibom
9 – 11 June 2010, Hotel Wellington, Madrid
CISO Summit Day One - Wednesday 9th June 2010
KEYNOTE
KEYNOTE
KEYNOTE
KEYNOTE
KEYNOTE
KEY CASE STUDY
KEYNOTE
PANEL
KEY CASE
STUDY
KEY CASE
STUDY
08:00 COFFEE & REGISTRATION
08:30 CHAIRMAN’S INTRODUCTION
08:40 OPENING KEYNOTE BY THE MINISTRY OF FOREIGN AFFAIRS,
SPAIN
Francisco López Crespo, Deputy Director for Informatics, Communications
and Networks, Ministry of Foreign Affairs and Cooperation, Spain
09:00 RAISING AWARENESS OF CYBER SECURITY
Bernard Roussely, Recently Chief Information Assurance and
Service Control Team, NC3 Agency, NATO
09:20 WHICH IS GREATER, THE INTERNAL THREAT OR THOSE WHO
YOU SHARE & EXCHANGE DATA WITH?
• With increasing demands to share data & services where does
the threat now come from?
• Is it just about the technical vulnerabilities or is the human factor
becoming a bigger issue?
Mike Humphrey, Head of Information Assurance and Accreditation, Serious
Organised Crime Agency, UK
10:00 PROTECTING THE DIGITAL ECONOMY - THE CYBER SECURITY
CHALLENGE
Dr. Alastair MacWillson, Managing Director of Global Security Practice,
Accenture
10:40 MORNING COFFEE BREAK
11:00 INFORMATION SECURITY & RISK MANAGEMENT IN THE OIL SECTOR
Dr. Alastair MacWillson, Managing Director of Global Security Practice,
Accenture
11:30 ESTONIAN NATIONAL CYBER SECURITY STRATEGY: RAISING
AWARENESS OF CYBER SECURITY & DEVELOPING A NATIONAL
STRATEGY
Mr. Heli Tiirmaa-Klaar, Senior Advisor to the Undersecretary of Defence,
Ministry of Defence Estonia
12:00 HOW TO ASSESS A CLOUD PROVIDER'S SECURITY POSTURE
Randy Barr, Chief Security Officer, Qualys, Inc.
12:20 THE E-CRIME THREAT EVOLUTION & GLOBAL CYBER SECURITY
INFRASTRUCTURE & ENFORCEMENT: WHY & HOW THE
INFORMATION ASSURANCE PARADIGM IS SHIFTING & WHAT
THAT MEANS TO YOU
• How may the threat landscape change? What are the current
threats?
• Legislation & regulation of cyberspace- what are the limits of the
possible
• Securing critical infrastructure from attacks (hacks, DDoS /
Botnets & extortion, data breaches, fraud & identity crime)
• Social networks
• The influence of new trends in e-crime on national &
organisational information assurance policy-making
• Serious and Organised Crime Groups
• Complacency
• Lack of confidence & promoting a global culture of security
• How real is the threat of cyber terrorism & state organized crime?
Panellists: Bernard Roussely, Recently Chief Information Assurance and
Service Control Team, NC3 Agency, NATO; Mike Humphrey, Head of
Information Assurance and Accreditation - Security Dept. Corporate Services,
Serious Organised Crime Agency; Mr. Heli Tiirmaa-Klaar, Senior Advisor to
the Undersecretary of Defence, Ministry of Defence Estonia; Dr. Alastair
MacWillson, Managing Director of Global Security Practice, Accenture;
Dr. John I. Meakin, Director, Digital Security & CISO, BP plc
13:00 LUNCH
KINDLY SPONSORED BY
14:00 ADDRESSING INFORMATION SECURITY RISK & REPUTATION
Marcus Alldrick, Chief Information Security Officer & Senior Manager,
Information Protection and Continuity, Lloyd's
14:40 INFORMATION SECURITY TRAINING - HOW AVIVA DID IT
• The challenge of delivering security awareness training in a global
organisation
• Getting the right balance
• Measurement and Metrics
• Associated campaign and top level support
• The Launch of the Information Protection Wizard
Paul Wood MBE, Group Chief Security Officer, Aviva
15:10 STHE EMPLOYMENT HORIZON & THE HUMAN FACTOR
• Recruitment & management trends & predictions for CISOs
• Human aspects – business needs
• Human aspects – economic changes
• Technology changes & skill set
• Psychology of security
• Training, embedding awareness & negotiation skills
• Computer Based Training (CBT) to improve employee security
• Ensuring a consistent message & approach is adopted
• Re-organising an information security team globally
Chaired by: Iain Sutherland, Managing Director, Information Security
Solutions
Panellists: Paul Wood MBE, Group Chief Security Officer, Aviva;
Dr David Aubrey-Jones, Senior Information Security Specialist - Security &
Risk, Information Security, Royal Bank of Scotland Group;
Dr. Cheryl Hennell, Head of IT Security and Information Assurance,
Openreach, UK: Peter Wood, Chief of Operations, First Base Technologies
15:40 SECURING CLOUD APPLICATION USERS
David Tyrrell, Everett UK
16:00 AFTERNOON TEA BREAK
16:30 WINNING THE CYBER WAR OF 2010 KEY INSIGHTS
In 2010, we are in the middle of a cyber war, but many
organizations in the public and private sectors are ill-prepared or
simply do not believe it. According to authorities like former CIA
and NSA director General Michael Hayden, cyber warfare is the 5th
and final domain of battle, and it is happening now across the
Internet and within your organization.
• The definition of cyber war in 2010 & true nature & risks of
advanced threats
• Sources and manifestations of advanced threats in public &
commercial organizations
• What is being done by leading organizations to detect & counter
these threats
• Case studies & recommendations for winning the cyber war of
2010
Eddie Schwartz, CISA, CISM, CISSP, PMP, Chief Security Officer, NetWitness
Corporation
17:00 VISIONARY TIPS & INSPIRATION FOR CISOS TODAY: PEOPLE,
PROCESSES & TECHNOLOGIES
• Managing the ‘Power of Four’: how can CISOs to overcome
generational challenges
• Dispelling fear, uncertainty & doubt
• Key insights on terrorism, & economic threats
• Managing technology people, processes & planning: what to
consider to get that mix right
Chaired by: Ray Stanton, Global Head of Business Continuity, Security &
Governance Practice, British Telecom
Panellists: Julia Harris, Head of Information Security, BBC; Phil Genge,
Head of Information Security, Nationwide; Kevin Harrington, Head of
Information Risk Management, Bank of Tokyo-Mitsubishi UFJ Ltd:
Chris van den Brink, CISO - Head of Information Security & Compliance,
AkzoNobel, Netherlands; Gianluca D´Antonio, CISO, Grupo FCC (&
President, ISMS Forum Spain)
17:40 SUMMARY & CLOSE OF DAY ONE
18:15 EVENING RECEPTION
KINDLY SPONSORED BY
20:00 FOLLOWED BY CISO DINNER
KINDLY SPONSORED BY
INDUSTRY INSIGHTS
* Please note that timings & details of all networking activities are
still provisional. Further details will be confirmed shortly.
KEY CASE
STUDY
PANEL
PANEL
7th Annual CISO Executive Summit & Roundtable 2010 Madrid
“Unparalleled opportunity to hear and talk to well-respected Information Industry leaders” Chief Security Advisor, Microsoft Ltd
9 – 11 June 2010, Hotel Wellington, Madrid
CISO Summit Day Two - Thursday 10th June 2010
KEY CASE
STUDY
KEYNOTE
PANEL
KEYNOTE
KEY CASE
STUDY
PANEL
KEY CASE
STUDY
08:30 - 09:00 COFFEE & SPANISH BREAKFAST BRIEFING
KINDLY SPONSORED BY
Gus Malezis, Sales & Support VP, nCircle Worldwide & Chris van den Brink,
CISO - Head of Information Security & Compliance, AkzoNobel Netherlands
09:00 CHAIRMAN’S RE-OPENING
09:10 BBC SECURITY APPROACHES TO WEB DEVELOPMENT:
CURRENT THINKING & FUTURE IDEAS
Julia Harris, Head of Information Security, BBC
09:40 HOW TO SCREW UP A COMPUTER FORENSICS INVESTIGATION
Michael Colao, Recently Global CISO & Director Information Management,
Dresdner Kleinwort
10:10 DATA PRIVACY & PROTECTION: DEALING WITH ADVANCED
THREATS TO REDUCE DATA LOSS
• Top tips to reduce exposure
• Selecting the best security solutions
• Setting up incident response teams & hiring skilled personnel
• Privacy versus security – what has changed?
• The CEO view on security & privacy
• If you do nothing else...
Panellists:
Phil Genge, Head of Information Security, Nationwide;
David Pérez Lázaro, SPAI Security Lead, Accenture;
Lazaro Pejsachowicz, Director of Information Security (RSSI), CNAMTS
(French National Health Service);
Eddie Schwartz, Chief Security Officer, NetWitness Corporation;
Chief Privacy Officer
Dave Verma, Audit Investigations Manager, Brent Council, UK
Mark Logsdon, Director, Information Risk Management, Barclays
10:50 MORNING COFFEE BREAK
11:10 MANAGING RISK FOR EFFECTIVE ACCESS GOVERNANCE
Deepak Taneja, Founder, President & CTO, Aveksa
11:40 INFORMATION SECURITY – ART OR SCIENCE
Dr. Robert Coles, CISO & Head of Digital Risk & Security, National Grid
12:10 REPORTING, PROVIDING ASSURANCE & MEASURING
INFORMATION SECURITY
• What influences & determines board representation?
• How can security influence customer retention & shareholder value?
• Establishing an imaginative security awareness campaign
• Increasing security credibility to the board
• Tips of honestly appraising your areas of operational strength
• Presenting ROSI to the Board to get security budget & the
attention of the Board
Panellists:
Paul Wood, Group Chief Security Officer, Aviva;
Marcus Alldrick, Chief Information Security Officer & Senior Manager,
Information Protection and Continuity, Lloyd’s;
Deepak Taneja, Founder, President & CTO, Aveksa;
Lazaro Pejsachowicz, Director of Information Security (RSSI), CNAMTS
(French National Health Service) & Member of Board of the Clusif France;
Dr. Robert Coles, CISO & Head of Digital Risk & Security, National Grid
12:40 LUNCH
13:40 THE LEGAL RISKS OF SOCIAL NETWORKING!
David Cripps, CISO, Investec plc.
14:40 ENTERPRISE INFORMATION PROTECTION (EIP) – THE NEXT
GENERATION IN INFORMATION SECURITY
• How to move security programs beyond the walls of a conventional
enterprise to include knowledge sharing across joint ventures, supply
chains, partnerships and outsourced environments while enforcing
the proper, secure and compliant use of information.
• Enabled the business to increase the amount and flow of
sensitive high value data securely
• Enabled their organization to distribute and outsource knowledgebased
business processes for better business agility, efficiency
and market advantage
• Secured the adoption of new computing paradigms including
virtualization and cloud computing
• Designed an information security program that is not only
positioned to secure your information protection needs today but
is protected from the rising tide of ever shifting privacy and
compliance legislation, as well as hackers who continue to
become more organized and sophisticated
Emeric Miszti, Vice President of Customer Enterprise Information Protection
(EIP) Strategy, Verdasys
15:00 DATA INTEGRITY – INFOSEC’S POOR RELATION
• The focus of CIOs & CISOs has centred for many years on
availability management & disaster recovery which, by & large,
are well understood & managed
• More recently attention has shifted towards protecting
confidentiality but data leakage remains a concern as it requires
activities the CIO or the CISO do not manage – data classification
and end user behaviour among others
• Managing data integrity falls almost entirely within business users
– the role of the CIO & the CISO being important but limited
Dr. Eduardo Gelbstein, Adjunct Professor, Webster University, Geneva,
Former Advisor, UN Board of Auditors and Former Director,
UN International Computing Centre
15:30 AFTERNOON ‘CHURROS Y CHOCOLATE’ BREAK &
SPONSORED PRIZE DRAW
KINDLY SPONSORED BY
16:00 USING RISK MANAGEMENT TECHNIQUES TO FACILITATE
CONVERGENCE: CONVERTING “SECURITY” IN “PROTECTION”
• Risk & threat analysis
• Converging security topics: facilities, physical, logical, business
continuity, occupational health & safety
• Control definition: cost & benefits
• Protecting facilities, people, processes & technology
• Knowing that you are protected even when you're not feeling secure
Jorge Pinto, Chief Security Officer, Bank Credibom Portugal
17:00 INFORMATION SECURITY & BUSINESS INTELLIGENCE FOR
STRATEGIC ADVANTAGE
John Colley, Managing Director, (ISC)2 EMEA
17:30 SUMMARY & CLOSE OF DAY TWO
18:00 DRINKS RECEPTION
20:00 FOLLOWED BY DINNER
PANEL
CLOSING KEYNOTE KEY CASE STUDY
KEYNOTE
14:10 WE DO NOT LIVE IN A FLAT WORLD ANYMORE
KINDLY SPONSORED BY
Matthew Lord, Global Technology Risk Manager, Unilever
7th Annual CISO Executive Summit & Roundtable 2010 Madrid
“Excellent forum to confirm understanding & issues & to learn of different approaches” Group Information Security Director, Xchanging
9 – 11 June 2010, Hotel Wellington, Madrid
CISO Executive Roundtable
Friday 11th June 2010
The Ultimate ‘Hands On’ & Proactive Peer-Share
Environment to Re-Inspire You…
Lead CISO Roundtable Sponsor
Chaired by:
Charles V. Pask, Managing Director, ITSEC Associates Ltd.
Networking Opportunities - Build Trust-Based
Relationships at the CISO Summit in Madrid!
Meeting your security peers to exchange ideas & build trust-based
networks is an integral part of the CISO Executive Summit &
Roundtable. As such, MIS & Sponsors have set aside dedicated
time for networking, which will allow you to enjoy your time in
Madrid. Please note that all activities are all provisional to date &
are sponsorship-related.
Facilitated by:
Eddie Schwartz, Vice President, Chief Security Officer, NetWitness
Corporation
Marcus Alldrick, Chief Information Security Officer & Senior
Manager, Information Protection and Continuity, Lloyd's
Paul Wood MBE, Group Chief Security Officer, Aviva
Floris Van Den Dool, EALA Security Lead, Accenture
Michael Colao, Recently Global CISO & Director Information
Management, Dresdner Kleinwort
Julia Harris, Head of Information Security, BBC
The CISO Roundtable (11th June) is the unrivalled benchmarking
forum for open & interactive discussion on the hottest & most
critical challenges in information security. It is the ultimate chance
to gain inspiration & insights from industry leaders – held under
The Chatham House Rule. The CISO Roundtable 2009 is wellestablished
as the best place for heads of information security
from all corners of the world to discuss key security challenges &
strategy with peers to develop team expertise & professional
skills, as well as to advance debate & approaches for the
information security community at large.
The focus is on roundtable discussions & group work, with
sessions facilitated by established information security
practitioners & industry experts. You will meet global security
industry leaders & network with professionals who face a similar
set of challenges as you in a ‘hands on’, proactive & inspirational
environment.
Tuesday 8th June
Welcome Drinks Reception – meet peers to break the ice before
the summit!
Wednesday 9th June
Networking Lunch – Kindly Sponsored by
Drinks Reception – Kindly Sponsored by
Dinner at Real Madrid Stadium ‘Estadio Santiago
Bernabéu’ – Kindly Sponsored by
Thursday 10th June
Breakfast Briefing – Kindly Sponsored by
Networking Lunch - Still Available
Afternoon ‘Churros y chocolate’ Break &
Sponsored Prize Draw – Kindly Sponsored by
Drinks Reception & Tour - Still Available
Dinner in Madrid – Kindly Sponsored by
Friday 11th June
CISO Roundtable – Kindly Sponsored by
Held Under The Chatham House Rule - No press are permitted.
The entire session will be conducted as a ‘closed doors’ session,
allowing participants to discuss real life information security
incidents & benchmark proven & possible approaches.
Key topic areas of focus - will be determined by the input of
participants beforehand & a briefing document will be distributed
in advance to allow participants to fully contribute in the honest
sharing of ideas.
EXPANDED interactive layout for 2010 This year the seating will
be in true roundtable style – that is ‘horse-shoe’ shape & no
PowerPoint slides will be used (flipcharts only) - to allow for an
even more intimate, progressive & open exchange unobstructed by
microphones & spatial distance.
Notes from the session – each session has a dedicated ‘note
taker’ who will write up discussion outlines & conclusions for
distribution to all roundtable attendees following the event.
Agenda timings
09:00 Start; 11:00 Coffee Break; 13:00 Lunch;
14:45 Close of Day.
NEW - Spouse-Partner Programme in Madrid
Given the senior level of attendees, the strong networking focus
& the attractive locations chosen for the CISO Summits, many
CISOs traditionally chose to bring partners to this event or
arrange to stay on for the weekend. As such, MIS will organise a
spouse programme to take place Friday 13th June 2010, while
delegates will be attending the CISO Roundtable. This offers a
unique opportunity for spouses / guests to meet up & visit
Madrid’s world-class shops, cafes & museums as a group.
Moreover, participating CISOs therefore have no excuse or
distraction to leave the Roundtable debate! The itinerary will be
suited for individual needs & includes a guided visit of Madrid &
a tapas lunch in the city centre.
Email conferences@mistieurope.com for further details.
ASOCIACI ÓN ESPAÑOLA PARA EL FOMENTO DE LA SEGURIDAD DE LA INFORMACIÓN
7th Annual CISO Executive Summit & Roundtable 2010 Madrid
“The only IT Security event I will attend!” Head of I.S., Baille Grifford
9 – 11 June 2010, Hotel Wellington, Madrid
MIS Training Institute is delighted to bring you the 7th Annual CISO Executive Summit & Roundtable 2010 – now firmly
established as Europe’s premier event for information security directors. Renowned for uniting & inspiring senior peers, direct
experiences, challenges & approaches are shared via fresh case studies, dynamic debates & new high profile keynote sessions.
An intimate learning & high level networking forum, the CISO Summit is designed for people to share ideas & leave
you motivated & armed with new ideas to build on your information security strategy. Above all, the 3 days
facilitates the building of trust-based relationships with senior security peers in a convivial business & sociable
atmosphere. Sponsored dinners, receptions & local visits are therefore an integral part of the event experience. This
is a ‘must attend’ event for Chief Information Security Officers & senior technology & information risk professionals.
Core themes for CISO Summit & Roundtable 2010 include…
• Cyber Security Challenges & Preventing Data Loss
• Integrating Security into Core Business Strategy
• Information Security Risk Management
• Information Security Awareness & Providing Assurance
Don’t miss the progressive & open exchange at the CISO Roundtable 2010,
held under The Chatham House Rule, Friday 11th June…
• Hands-on; interactive; ‘closed doors’; ‘horse-shoe’ seating; no death by PowerPoint!
• New for 2010 ‘Spouse-Partner Programme’ in Madrid during the roundtable
5 Reasons Why Participants Attend (& Return to Year on Year!) MIS Training
Institute’s CISO Summits & Roundtables…
1. “The right people were in the room – ideal to meet peers & new people, quality participants!”
2. “A friendly, relaxed & professional atmosphere, not overcrowded, more intimate”
3. “Practical thoughts & impressive presentations on selected topics plus an amazing level of networking & interaction”
4. “Quality of speakers - professional, expert & diverse – who walk the walk not just talk the talk!”
5. “Open discussions, sharing of ideas & great debate with all attendees! The place to learn & exchange ideas
on current information security threats – the mix of training & debate avoids re-inventing the wheel”
What did attendees say about the last CISO
Executive Summit & Roundtable?
“One of the best conferences I attended bringing together
key industry players willing to discuss openly the issues
they face together” CSO, AVIVA
“The only IT Security event I will attend!”
Head of I.S., Baille Grifford
“Excellent forum to confirm understanding and issues and to
learn of different approaches”
Group Information Security Director, Xchanging
“For every CSO/CISO that's feeling lonely or frustrated with their
work, come to a MIS CISO Executive Summit & Roundtable and
discuss the issues. Get better with the best!”
CSO, Bank Credibom
“Unparalleled opportunity to hear and talk to well-respected
Information Industry leaders” Chief Security Advisor, Microsoft Ltd
Sponsorship & Exhibition Opportunities at the 7th Annual
CISO Executive Summit 2010 – Madrid
Attendees at MIS Training’s CISO Executive Summits are senior directors
of information security from across business & governmental sectors
internationally. This gathering of normally difficult to reach executives is
an excellent platform for companies to influence with brand profiling & to
ensure market position. Given MIS background in information security
training courses, delegates typically comprise of 98% ‘practitioners’ (e.g.
heads of information security/ chief information security officers, IT &
information risk managers & senior security professionals) rather than
vendors or consultancies. All sponsorship packages include: a number
of free client places, table top exhibition & speaking options.
For more information, please contact Sara Hook, Conference Director,
shook@mistieurope.com, Tel: +44 (0)20 7779 7200.
Gold Sponsors
Accenture’s security practice helps clients secure their data, protect identities & build trusted
relationships with their customers, constituents & partners, resulting in improved performance &
increased business value. Accenture’s approach to security helps client reduce costs, increase
profitability, reduce complexity & anticipate & prevent cyber attacks, leveraging world class
technology that addresses today’s changing threats & helps clients effectively prepare for the future. A global management
consulting, technology services & outsourcing company, Accenture combines unparalleled experience, comprehensive
capabilities across all industries & business functions, & extensive research on the world’s most successful companies to
help clients become high-performance businesses & governments. With approximately 177,000 people serving clients in
more than 120 countries, the company generated net revenues of US$21.58 billion for the fiscal year ended Aug. 31, 2009.
For more information about our security practice, please visit www.accenture.com/security
Aveska – offers a new approach to access governance that orchestrates people, process, policy, &
technology with business-friendly solutions that foster acceptance by business managers,
collaboration among all stakeholders, & accountability in all appropriate areas of the organization.
Our solutions: Establish and maintain the visibility of user access entitlements wherever they reside
within the enterprise’s information resources - Managers can easily see all access entitlements for which they are
accountable. Provide the context and processes that enable business managers to participate in governing user access -
Managers can readily understand the processes & why they exist, and they can execute them quickly & easily to keep up
with the rapid pace of change. Enforce policies to ensure that access is appropriate, compliance objectives are met &
business risks are avoided - Policy enforcement is automated & easy to monitor. Work in conjunction with existing security
enforcement technologies such as user provisioning - Seamless integration simplifies implementation & continuing operation
of all Aveksa products. www.aveksa.com
One-to-One Meetings Sponsors
ArcSight (NASDAQ:ARST) is a leading global provider of compliance and security management
solutions that protect enterprises and government agencies. ArcSight helps customers comply with
corporate and regulatory policy, safeguard their assets and processes, and control risk. The
ArcSight platform collects and correlates user activity and event data across the enterprise so that businesses can rapidly
identify, prioritize, and respond to compliance violations, policy breaches, cybersecurity attacks, and insider threats. For
more information, visit www.arcsight.com
Courion’s unique Access Assurance approach to identity, access and compliance management
ensures that only the right people have the right access to the right resources and are doing the right
things. Courion’s award-winning solutions are used by more than four hundred organizations and
over 9 million users worldwide to quickly and easily solve their most complex identity and access management (password
management, provisioning, and role management), risk and compliance challenges. The company’s business-driven
approach results in unparalleled customer success by ensuring users’ access rights and activities are compliant with policy
while supporting both security and business objectives. For more information, please visit our website at www.courion.com.
Silver Sponsors
Qualys, Inc. - is the leading provider of on demand IT security risk & compliance management
solutions – delivered as a service. Qualys’ Software-as-a-Service solutions are deployed in a
matter of hours anywhere in the world, providing customers an immediate & continuous view of
their security & compliance postures. The QualysGuard® service is used today by more than 3,500 organizations in 85
countries, including 40 of the Fortune Global 100 & performs more than 200 million IP audits per year. Qualys has the
largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic
agreements with leading managed service providers & consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2,
LAC, SecureWorks, Symantec, Tata Communications, TELUS & VeriSign. www.qualys.com
Information Security Solutions – is a specialist recruitment company, dealing with Information
Security, IT Risk, IT Audit & Business Continuity/Disaster Recovery. Many of the world's most
experienced security practitioners are exclusively registered with us & we have an extensive database
of Candidates within the Information Security industry. Our recruitment consultants all have a
professional qualification in this area, such as: MSc. in IT Security, CISSP or CISM. We are therefore fully conversant with
the specific requirements of our clients, enabling us to pre-select the most suitably experienced candidates for the role. We
pride ourselves on delivering an unparalleled level of customer service & are able to pre-select excellent candidates that
match your criteria. www.informationsecuritysolutions.com
Lead CISO Roundtable Sponsor
NetWitness® Corporation - is the world leader in real-time network forensics & automated threat
intelligence solutions, helping government & commercial organizations detect, prioritize &
remediate complex IT risks. NetWitness solutions concurrently solve a wide variety of information
security problems including: advanced persistent threat management; sensitive data discovery & advanced data leakage
detection; malware activity discovery; insider threat management; policy & controls verification & e-discovery. Originally
developed for the US Intelligence Community, NetWitness has evolved to provide enterprises around the world with
breakthrough methods of network content analysis & host-based risk discovery & prioritization. NetWitness customers
include Defense, National Law Enforcement & Intelligence Agencies, Top US & European Banks, Critical Infrastructure, &
Global 1000 organizations. NetWitness has offices in the U.S. and the U.K. & partners throughout North and South America,
Europe, the Middle East, and Asia. To download the freeware version of NetWitness Investigator, visit
download.netwitness.com
Bronze Sponsor
Verdasys provides Enterprise Information Protection (EIP) solutions that secure proprietary
& sensitive data enabling Global 2000 companies to successfully compete in today’s highly
collaborative & mobile environments. Digital Guardian, the leading EIP market solution, is a centrally managed data
security platform that discovers, classifies, monitors, controls & encrypts sensitive information. Verdasys
headquarters is located in Waltham, MA, USA. Regional Offices: London, Munich, Rome, Madrid, Athens, Tel Aviv,
Tokyo, Osaka, Taipei, Singapore & Shanghai. Verdasys, Inc. - 404 Wyman Street, Suite 320, Waltham, MA 02451,
+1.781.788.8180. www.verdasys.com
Cocktail Sponsor
British Telecom - a global networked IT services organisation with a long-established, respected reputation
for providing solutions that address all aspects of security & business continuity across all markets. It has
a comprehensive suite of security services for customers, based on a proven consultancy approach, deep
technical knowledge & extensive experience. BT's team includes world-leading security consultants with an unparalleled
resource of knowledge & skill. It has an in-depth understanding of both national & international standards, & is accredited by a
number of government organisations. BT has implemented security measures across its own global organisation where the
scale & complexity of the operation is matched by few other companies. www.bt.com
Lunch Sponsor
Everett - is a consultancy, systems integrator & solution support center with highly skilled professionals &
unique hands-on experience. Our inspiration is providing seamless access for individuals to ICT services in
a secure, governable, & personalised way. We firmly believe in a middleware solution to this requirement for a user centric & crossdomain
ICT environment. Embracing change, we train & deploy our knowledge workforce so that our clients can safely benefit from
innovative concepts & technologies early in their life-cycle. We are proud to work with leading organisations across Europe as their
consultancy, system integrator & support center for portal, identity & access management, compliance & application integration
solutions. Our commitment is to deserve our reputation as ‘trusted to know’. www.everett.nl
Breakfast Briefing Sponsor
nCircle - is the leading provider of automated security & compliance auditing solutions. More than 4,500
enterprises, government agencies & service providers around the world rely on nCircle's proactive solutions
to manage & reduce security risk and achieve compliance on their networks. nCircle has won numerous awards for growth, innovation,
customer satisfaction & technology leadership. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United
States & in London and Toronto. Additional information about nCircle is available at www.ncircle.com.
Association Partners
ISMS Forum Spain is the Spanish Association for the advancement of Information Security. As a non for
profit organization, our main aim is to promote information security in Spain by means of a specialized
forum in which companies, public and private entities and independent professionals of the field can
collaborate, share their experiences and get to know the latest advances and developments. ISMS Forum is the Spanish chapter of
ISMS International User Group (IUG). Among many other activities, ISMS Forum Spain organizes two International Conferences
every year, that have already become reference events in the Information Security sector. The VII International Conference “How to
innovate in times of crisis?” will take place on May 25th in Madrid. Spanish and international experts will discuss the most important
matters in information security today, such as competitiveness, efficiency and innovation, but also cloud computing, the role of
CISOs and the future of eAdministration. www.ismsforum.es
Information Security Forum - ISF is recognised as the world’s leading Information Security organisation
& independent industry authority. Through its members, the ISF brings together & harnesses the
knowledge & experience of over 300 major international business & government agencies to meet the
increasing demand for practical, business-driven solutions to information security & risk management problems. The Information
Security Forum is an independent, not-for-profit organisation, established in 1989. It is owned & governed by its members &
managed by a professional team. www.securityforum.org
(ISC)2 - The International Information Systems Security Certification Consortium, Inc. [(ISC)2®] is the internationally
recognised Gold Standard for certifying information security professionals. Founded in 1989, (ISC)2 has certified
over 54,000 information security professionals in 135 countries. The CISSP, CISSP-ISSEP“, CISSP-ISSAP“& SSCP
are among the first information technology credentials to meet the stringent requirements of ANSI/ISO/IEC Standard 17024. (ISC)2® is
the non-profit global leader in educating & certifying information security professionals throughout their careers. www.isc2.org
ISSA - UK, EMEA & Spain - The Information Systems Security Association (ISSA)® is a not-for-profit international
organisation of information security professionals & practitioners. It provides education forums, publications & peer
interaction opportunities that enhance the knowledge, skill & professional growth of its members. www.issa.org
ASIS International (ASIS) is the largest organisation for security professionals, with more than 35,000 members
worldwide. ASIS International will host the 9th European Security Conference in Lisbon, Portugal, on 18-21 April 2010 at
the Lisbon Congress Centre. This unique conference event will address a full spectrum of topics in security
management. More information at www.asisonline.org/lisbon
ISACA - Valencia, Belgium & London - ISACA’s membership – more than 65,000 strong worldwide – is
characterised by its diversity. Members live & work in more than 140 countries & cover a variety of
professional IT-related positions—to name just a few, IS auditor, consultant, educator, IS security
professional, regulator, chief information officer & internal auditor. ISACA has more than 170 chapters established in over 70
countries worldwide, & those chapters provide members education, resource sharing, advocacy, professional networking & a host of
other benefits on a local level. www.isaca.org
7th Annual CISO Executive Summit & Roundtable 2010 Madrid
“One of the best conferences I have attended, bringing together key industry players willing to discuss openly the issues they face together” CSO, AVIVA
9 – 11 June 2010, Hotel Wellington Madrid
5 Easy Ways to Register
Tel: +44 (0)20 7779 8944 Email: conferences@mistieurope.com
Fax: +44 (0)20 7779 8293 Web: www.mistieurope.com/CISO
Mail: Guy Cooper, MIS Training, Nestor House, Playhouse Yard, London
EC4V 5EX UK
Customer Information
(please print or attach business card)
Delegate 1 Name
Delegate 2 Name
Delegate 3 Name
Organisation
E-Mail Address (Required)
Address
Position
Position
Position
Bring a Guest for FREE!
Bring a colleague or security peer along with to the CISO Summit 2010 & they pay no fee!
To apply please email conferences@mistieurope.com, noting that the following terms & conditions
apply to this offer:
· The colleague or peer (Guest) must be able to demonstrate that they are currently practising as CISO, head of
information security, or in a senior information risk or corporate security related role. The Guest must not be working for
an organisation (or subsidiary, or as an independent consultant) that provides professional security product, vendor or
recruitment services, software development, outsourcing, ICT or consultancy / advisory services
· The offer only applies to attendees who have not pre-registered (or registered & cancelled) for the CISO Summit 2010
with MIS directly as reimbursements or credits are not possible
· This offer has a limited number of places available & includes entry to the 3-day event & networking activities. MIS
would not be responsible for any travel or accommodation costs or arrangements for the Guest
· The final decision is at the discretion of MIS Training Institute
The summit fees:
CISO Executive Summit & Roundtable, 9 - 11 June 2010 £1,995+16% Spanish VAT
* Please include your company VAT number ______________________
Country
Postcode
Telephone
Fax
The information you provide will be safeguarded by the Euromoney Institutional Investor Plc. group whose
subsidiaries may use it to keep you informed of relevant products and services. We occasionally allow
reputable companies outside the Euromoney Institutional Investor Plc. group to contact you with details of
products that may be of interest to you. As an international group we may transfer your data on a global
basis for the purposes indicated above. If you object to contact by telephone , fax , or email
please tick the relevant box. If you do not want us to share your information with other reputable companies
please tick this box
Payment Method
Pay Online at www.mistieurope.com
(all fees must be paid in advance of the event)
Cheque enclosed
Please invoice my company PO#
(payable to MIS Training)
Credit cards can be taken over the phone or online.
Please call +44 (0)20 7779 8153 or visit www.mistieurope.com/CISO
The summit fee includes:
• Entry to 3-Day Event • CPEs & Certificates
• Networking Functions - Dinners, Cocktail Receptions, Real Madrid Tour & Reception,
Plus Further Local Visits (all subject to final confirmation)
• Official Summit Materials on USB, Leather Portfolio & Web-link to All Updated Presentation Materials
About the Venue & Accommodation
Hotel Wellington Madrid, 5*
The 6th Annual CISO Executive Summit & Roundtable 2010
will take place at:
The Hotel Wellington, Velázquez, 8, 28001 Madrid
reservas@hotel-wellington.com,
Tel: + 34 914 231 407
www.hotel-wellington.com
Delegates are responsible for the arrangement & payment of
their own accommodation in Madrid. MIS Training Institute
has arranged the following discounted rates at The
Wellington Hotel:
Standard Double Room (for single or double use),
EUR170 per night
Superior Double Room (for single or double use), EUR190
per night
The prices above are per room per night, including buffet
breakfast, excluding 7% VAT
• Please book your accommodation directly with The
Hotel Wellington at
reservas@hotel-wellington.com
Tel: + 34 914 231 407
• MIS Training is not liable & responsible for any hotel
bookings. Limited rooms are available at this price so
please book early. We cannot guarantee availability.
• When making your booking with the hotel, please quote:
‘MIS Training Institute's 7th CISO Summit & Roundtable'
Hotel Wellington is a charming 5 star hotel in the centre of Madrid combining traditional style & a rich
history with completely refurbished & modern facilities. Situated right opposite the historic Retiro Park &
located at 8 Velázquez, in the stately Salamanca neighbourhood, known for its elegance, its location
couldn’t be better in relation to the numerous fashion boutiques, antique shops & restaurants throughout
Madrid. It is also within the Art Triangle, an area of Madrid where the most notable museums, such as
the Prado, the Thyssen & the Center of Art Reina Sofia, are located. The hotel is a popular choice for
businessmen & tourists. The conference room that will be used for the CISO Summit has natural light &
high-speed Wi-Fi. Hotel Wellington has an outdoor swimming pool & Jacuzzi.
www.hotel-wellington.com
Please include billing address if different from address given above
Please note that in completing this booking you undertake to adhere to the
cancellation policy and payment terms.
Signature
Approving Manager
Please send me information on:
Date
Position
ICT Security Africa Summit 2010
11 - 14 May 2010, Sarova Whitesands Hotel, Mombasa – Kenya
5th Annual Audit, Risk & Governance Africa Conference 2010
9 - 13 August 2010, The Riverside Hotel, Durban - South Africa
3rd Annual Security Africa Summit 2010
26 - 29 October 2010, Cape Town – South Africa
4th Annual Chief Security Officer (CSO) Summit 2010
1 - 3 December 2010, Vienna – Austria
3rd Annual CISO Executive Summit & Roundtable Middle East 2010
8 - 10 November 2010, UAE
Conferencia Latinoamericana: La Seguridad y Riesgo 2010, marzo 2011, Panamá
Cancellation Policy: Should a delegate be unable to attend, a substitute may attend in his or her place. A
credit or refund, minus 10% administration charge, is available if written notification is received by 20th
May 2010. Thereafter, no refunds will be given. MIS reserves the right to change or cancel this programme
due to unforeseen circumstances. Founded in 1978, MIS Training Institute is the international leader in
providing training & conferences to information security, audit, fraud & IT audit professionals. With offices
in the USA, UK, & Asia, MIS is a division of Euromoney Institutional Investor Plc (FTSE250) and is part of
the Daily Mail & General Trust (DMGT). www.mistieurope.com. To Register Call +44 (0) 20 779 8944, Fax
+44 (0) 20 7779 8293, Email: conferences@mistieurope.com or Visit www.mistieurope.com/CISO.
NEW for 2010! Spouse programme
Given the senior level of attendees, the strong networking focus & the attractive locations
chosen for the CISO Summits, many CISOs traditionally chose to bring partners to this
event or arrange to stay on for the weekend. As such, MIS will organise a spouse
programme to take place Friday 13th June 2010, while delegates will be attending the
CISO Roundtable. This offers a unique opportunity for spouses / guests to meet up & visit
Madrid’s world-class shops, cafes & museums as a group. The itinerary will be suited for
individual needs & includes a guided visit of Madrid & a tapas lunch in the city centre.
Email conferences@mistieurope.com for further details.
Register now at conferences@mistieurope.com, www.mistieurope.com/ciso, Tel: +44 (0)20 7779 8944