ABOUT THE SUMMIT

Learn the best case studies on the end to end cyber security implementation practices when working with third parties to ensure a truly resilient and secure supply chain network at the 3rd Annual Third Party & Supply Chain Cyber Security Summit.

 

  • How much of your data security is really under your control?
  • What is your risk management approach towards your suppliers?
  • How to secure your network and protect your sensitive data?

 

Led by the TOP information security professionals from leading companies the discussion will give you an opportunity to see the issue from the perspective of different industries & angles and identify the complex solution to be implemented.

Join us in Barcelona and build your end to end strategy!

WHO SHOULD ATTEND

Job title

  • Chief
  • Head
  • Director
  • Manager
  • Analyst
  • Consultant

Chiefs, Heads, Directors, Managers of:

  • Cyber & Information Security
  • 3rd Party & Vendor Management
  • Cyber & Information Risk
  • Supply Chain & Third Party Software Risks & Security
  • Application Security
  • Data Protection
  • IT Audit
  • Security Architect

Industry

  • Finance
  • Manufacturing
  • Telecoms
  • Software & IT
  • Retail
  • Chemicals
  • Conglomerate
  • Energy 
  • Engineering
  • Transportation

and everyone who is passionate about cyber security!

MEET SOME OF OUR SPEAKERS

Mehdi Chourib

Mehdi Chourib

CISO
Yazaki Europe Limited
Ray

Ray Stanton

Chief Security Officer
TDC Group
mohamed-saad

Mohamed Saad Mousa

Head of IS
IKEA Saudi Arabia
Vesa

Steve Williamson

Audit Account Director
GlaxoSmithKline
Nuno Teodoro

Nuno Teodoro

Global CISO
Truphone
mnardone

Massimo Nardone

CISO
Cargotec Corporation
Karpov

Anton Karpov

CISO
Yandex
tupala

Vesa Tupala

Director, Data Governance
Mandatum Life Insurance
Screen Shot 2018-09-25 at 08.59.20

Michael Herburger

Supply Chain Risk & Resilience
FH Upper Austria

IN A STUNNING AGENDA

DAY 1

  • null

    KEYNOTE

    CYBER RESILIENCE: NEW TRENDS & TOOLS

  • null

    CASE STUDY

    THIRD PARTY SECURITY EVALUATION AND AUDIT

  • null

    REFRESHMENTS & NETWORKING

  • null

    BREAKOUT SESSION I

    THIRD PARTY RISK MANAGEMENT

  • null

    LUNCH

  • null

    BREAKOUT SESSION II

    DATA PROTECTION

  • null

    NETWORKING WITH EXHIBITORS

  • null

    PANEL DISCUSSION

    CYBER SECURITY COMPLIANCE WHEN DEALING WITH THIRD PARTIES

  • null

    CASE STUDY

    DATA BREACH: PREPARATION & RESPONSE

  • null

    INTERACTIVE COCKTAIL RECEPTION

DAY 2

  • null

    KEYNOTE

    ESTABLISHING END-TO-END CYBER SECURITY ASSURANCE

  • null

    PANEL DISCUSSION

    INSIDER THREAT: HOW TO STRENGTHEN THE CORPORATE SECURITY AND MITIGATE THE RISKS

  • null

    REFRESHMENTS & NETWORKING

  • null

    CASE STUDY

    IOT DEPLOYMENT: SECURITY AND RISKS MITIGATION

  • null

    ROUND TABLE DISCUSSIONS BY INDUSTRY:

    • Finance
    • Manufacturing
    • Healthcare
    • Retail
  • null

    LUNCH

  • null

    ROUND TABLE DISCUSSION BY EXPERTISE:

    • Legal
    • Risk Management
    • IT Architecture
  • null

    CASE STUDY

    EMPOWERING SECURITY IN THE CLOUD-ENABLED SUPPLY NETWORKS

  • null

    CASE STUDY

    ENABLING TRANSPARENCY AND SECURITY WITH BLOCKCHAIN TECHNOLOGY

  • null

    WHAT HAVE WE LEARNT?

  • null

    END OF THE SUMMIT

MORE OPPORTUNITIES

Join the Summit as

MEDIA PARTNER






SPONSOR






STARTUP






*All collected information will be processed and used according to GDPR and our Privacy Policy

DOWNLOAD FULL BROCHURE NOW

Simply confirm your details in the form below to get the latest brochure emailed to your inbox:

  • Detailed summit agenda
  • Full speaker line-up
  • Discounts available
*All collected information will be processed and used according to GDPR and our Privacy Policy






SUMMIT SPONSORS

MEDIA PARTNERS

CSR-logo-RGB
cybersecurityjobsite-425x215
DFM_logo_blue
cdm_logo 180 x 95

LOCATION