www.cvisionintl.com
Open in
urlscan Pro
23.96.207.177
Public Scan
Submitted URL: https://www2.cvisionintl.com/e/913221/ank-2022-oct-18-cxo-tt-london-/7g1gc/226832668?h=Spq_7DDo00tJs1eaC2Rb3BXtTv-OTW5E6j0mWg...
Effective URL: https://www.cvisionintl.com/events/think-tank/2022-oct-18-cxo-tt-london/
Submission: On October 07 via manual from FR — Scanned from FR
Effective URL: https://www.cvisionintl.com/events/think-tank/2022-oct-18-cxo-tt-london/
Submission: On October 07 via manual from FR — Scanned from FR
Form analysis
4 forms found in the DOMPOST /events/think-tank/2022-oct-18-cxo-tt-london/
<form action="/events/think-tank/2022-oct-18-cxo-tt-london/" autocomplete="off" class="needs-validation" data-ajax="true" data-ajax-begin="sendBegin" data-ajax-complete="sendComplete" data-ajax-failure="sendFailure" data-ajax-loading="#spinner"
data-ajax-method="post" data-ajax-mode="before" data-ajax-success="sendLoginSuccess" enctype="multipart/form-data" method="post" novalidate="novalidate"><input class="return-url" id="loginModel_RedirectUrl" name="loginModel.RedirectUrl"
type="hidden" value="/events/think-tank/2022-oct-18-cxo-tt-london/?modal=attendspeaker">
<div class="validation-summary-valid text-danger p-1 my-2 text-center val-ul" data-valmsg-summary="true">
<ul>
<li style="display:none"></li>
</ul>
</div><input name="__RequestVerificationToken" type="hidden" value="qqAOHKoframchuCd4kV11vLt-RuY1-ZWIkP_LqtopN2_t2fXH9R7ZcLUs_wtpjGG5o25i4puBgY5daWQQ2KK_tSrIqqk7rIsPcInR82nq941">
<div class="send-error d-none text-danger font-weight-bold mb-2"></div>
<div class="form-label-group">
<input class="form-control text-box single-line" data-val="true" data-val-required="The Email Address field is required." name="loginModel.Username" placeholder="Email Address" required="True" type="text" value="">
<label for="loginModel_Username">Email Address</label>
<span class="field-validation-valid text-danger invalid-feedback" data-valmsg-for="loginModel.Username" data-valmsg-replace="true"></span>
</div>
<div class="form-label-group">
<input class="form-control text-box single-line" data-val="true" data-val-length="The field Password must be a string with a maximum length of 256." data-val-length-max="256" data-val-required="The Password field is required."
name="loginModel.Password" placeholder="Password" required="True" type="password" value="">
<label for="loginModel_Password">Password</label>
<span class="field-validation-valid text-danger invalid-feedback" data-valmsg-for="loginModel.Password" data-valmsg-replace="true"></span>
</div>
<input type="hidden" name="" class="is-current" value="false">
<div class="row">
<div class="col-md-12">
<script src="https://www.google.com/recaptcha/api.js"></script>
<div class="g-recaptcha mb-3" data-callback="reCaptchaVerify" data-expired-callback="reCaptchaExpired" data-sitekey="6LflQB0aAAAAAGFzRgY1HMkUYT7a-CWTyO7xtTQB" data-size="normal">
<div style="width: 304px; height: 78px;">
<div><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LflQB0aAAAAAGFzRgY1HMkUYT7a-CWTyO7xtTQB&co=aHR0cHM6Ly93d3cuY3Zpc2lvbmludGwuY29tOjQ0Mw..&hl=fr&v=vP4jQKq0YJFzU6e21-BGy3GP&size=normal&cb=7p2x79tna3v6"
width="304" height="78" role="presentation" name="a-qt9vu2zgv74j" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div><textarea id="g-recaptcha-response" name="g-recaptcha-response"
class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div>
</div><input data-val="true" data-val-required="Please check the "Not a robot" box" id="hidden-recaptcha" maxlength="500" name="hidden-recaptcha" type="hidden" value="">
</div>
</div>
<button class="btn btn-lg btn-primary btn-block rounded-pill btn-submit" disabled="" type="submit" idx="btnSubmit">Sign in</button>
<hr>
<div class="text-center">
<p> Don't have an account yet? <a href="/register/?ReturnUrl=%2fevents%2fthink-tank%2f2022-oct-18-cxo-tt-london%2f%3fmodal%3dattendspeaker">Create an account</a>
</p>
<p>
<a href="/forgotpassword/">Forgot your Password?</a>
</p>
</div>
<input name="ufprt" type="hidden"
value="CF1671BB1335EA31B100C46622562D57BF62A622790E2A7C3412E71FBEE9CCFC4870BC7DF23043B8FF9C6B95C31F8C634BE850FCCCC7ADA24C1FD6C77B418F53CD27F9FD6A049279AC942DC2D732557EA7585AAFC1B826E3CF29D7C7949085B93B1145A1AB6CDE8DBF348C1B4DCC6A7B3FC46962C295B7996B8FA29E71B8D71B">
</form>
<form id="EventRegistration" class="event-registration-form" novalidate="novalidate">
<div class="validation-summary-valid text-danger" data-valmsg-summary="true">
<ul>
<li style="display:none"></li>
</ul>
</div>
<input name="__RequestVerificationToken" type="hidden" value="Zxad10Df22q9ub498_6GFUwM7gUm6i-MisKFcevHITqDvnThrxd_z1RIMWWqbol_cdFIeaiPqtppPKyjQO66Wif6f6L4xPJOaUJdznS96hQ1">
<input data-val="true" data-val-required="The OccurrenceId field is required." id="OccurrenceId" name="OccurrenceId" type="hidden" value="8d7aa139-d739-48de-a650-ba2d739510d7">
<input value="" id="Source" name="Source" type="hidden">
<div class="row">
<div class="col-12 col-sm-12 col-md-12 col-lg-12 col-xl-6">
<div class="form-label-group">
<input class="form-control text-box single-line" data-val="true" data-val-required="The First Name field is required." id="FirstName" name="FirstName" placeholder="First Name" required="True" type="text" value="">
<label for="FirstName">First Name</label>
<span class="field-validation-valid text-danger" data-valmsg-for="FirstName" data-valmsg-replace="true"></span>
</div>
</div>
<div class="col-12 col-sm-12 col-md-12 col-lg-12 col-xl-6">
<div class="form-label-group">
<input class="form-control text-box single-line" data-val="true" data-val-required="The Last Name field is required." id="LastName" name="LastName" placeholder="Last Name" required="True" type="text" value="">
<label for="LastName">Last Name</label>
<span class="field-validation-valid text-danger" data-valmsg-for="LastName" data-valmsg-replace="true"></span>
</div>
</div>
</div>
<div class="row">
<div class="col-md-12">
<div class="form-label-group">
<input class="form-control text-box single-line" data-val="true" data-val-required="The Business Email field is required." id="BusinessEmail" name="BusinessEmail" placeholder="Business Email" required="True" type="text" value="">
<label for="BusinessEmail">Business Email</label>
<span class="field-validation-valid text-danger" data-valmsg-for="BusinessEmail" data-valmsg-replace="true"></span>
</div>
</div>
<div class="col-md-12">
<div class="form-label-group">
<input class="form-control text-box single-line" data-val="true" data-val-required="The Job Title field is required." id="JobTitle" name="JobTitle" placeholder="Job Title" required="True" type="text" value="">
<label for="JobTitle">Job Title</label>
<span class="field-validation-valid text-danger" data-valmsg-for="JobTitle" data-valmsg-replace="true"></span>
</div>
</div>
<div class="col-md-12">
<div class="form-group" style="position: relative; z-index: 3;">
<select class="ddl-company form-control form-control-lg select2-hidden-accessible" data-val="true" data-val-required="The Company field is required." id="Company" name="Company" required="True" data-select2-id="select2-data-Company"
tabindex="-1" aria-hidden="true">
<option value="" data-select2-id="select2-data-2-qq57"></option>
</select><span class="select2 select2-container select2-container--cvision" dir="ltr" data-select2-id="select2-data-1-uged" style="width: auto;"><span class="selection"><span class="select2-selection select2-selection--single" role="combobox"
aria-haspopup="true" aria-expanded="false" tabindex="0" aria-disabled="false" aria-labelledby="select2-Company-container"><span class="select2-selection__rendered" id="select2-Company-container" role="textbox" aria-readonly="true"><span
class="select2-selection__placeholder">Select Your Company</span></span><span class="select2-selection__arrow" role="presentation"><b role="presentation"></b></span></span></span><span class="dropdown-wrapper"
aria-hidden="true"></span></span>
<span class="field-validation-valid text-danger invalid-feedback" data-valmsg-for="Company" data-valmsg-replace="false">Company is Required</span>
<input data-val="true" data-val-number="The field CompanyId must be a number." data-val-required="The CompanyId field is required." id="CompanyId" name="CompanyId" type="hidden" value="0">
</div>
</div>
<div class="col-md-12">
<div class="form-label-group">
<input class="form-control text-box single-line" data-val="true" data-val-required="The Phone field is required." id="Phone" name="Phone" placeholder="Phone" type="text" value="">
<label for="Phone">Phone</label>
<span class="field-validation-valid text-danger" data-valmsg-for="Phone" data-valmsg-replace="true"></span>
</div>
</div>
<div class="col-md-12">
<p class="mb-3">By clicking the “Register" button, you are agreeing to the <a href="/privacy/">Privacy Policy</a> and <a href="/terms/">Terms of Use</a></p>
</div>
<div class="col-md-12">
<button type="submit" class="btn btn-lg btn-primary btn-block rounded-pill" id="btnSubmit1">Register</button>
</div>
</div>
</form>
POST /events/think-tank/2022-oct-18-cxo-tt-london/
<form action="/events/think-tank/2022-oct-18-cxo-tt-london/" autocomplete="off" class="needs-validation" data-ajax="true" data-ajax-begin="sendBegin" data-ajax-complete="sendComplete" data-ajax-failure="sendFailure" data-ajax-loading="#spinner"
data-ajax-method="post" data-ajax-mode="before" data-ajax-success="sendLoginSuccess" enctype="multipart/form-data" method="post" novalidate="novalidate"><input class="return-url" id="loginModel_RedirectUrl" name="loginModel.RedirectUrl"
type="hidden" value="/events/think-tank/2022-oct-18-cxo-tt-london/?modal=sponsor">
<div class="validation-summary-valid text-danger p-1 my-2 text-center val-ul" data-valmsg-summary="true">
<ul>
<li style="display:none"></li>
</ul>
</div><input name="__RequestVerificationToken" type="hidden" value="bkf_WidpEETrTYzqo-Hqu6sebvlF7PWlQyv2huSWiut8O8I3dT99hQ4zlFskwl22WI3SObBZmbfsVt05sOIzmbkFxCgucxXtLw_ZguWVnsQ1">
<div class="send-error d-none text-danger font-weight-bold mb-2"></div>
<div class="form-label-group">
<input class="form-control text-box single-line" data-val="true" data-val-required="The Email Address field is required." name="loginModel.Username" placeholder="Email Address" required="True" type="text" value="">
<label for="loginModel_Username">Email Address</label>
<span class="field-validation-valid text-danger invalid-feedback" data-valmsg-for="loginModel.Username" data-valmsg-replace="true"></span>
</div>
<div class="form-label-group">
<input class="form-control text-box single-line" data-val="true" data-val-length="The field Password must be a string with a maximum length of 256." data-val-length-max="256" data-val-required="The Password field is required."
name="loginModel.Password" placeholder="Password" required="True" type="password" value="">
<label for="loginModel_Password">Password</label>
<span class="field-validation-valid text-danger invalid-feedback" data-valmsg-for="loginModel.Password" data-valmsg-replace="true"></span>
</div>
<input type="hidden" name="" class="is-current" value="false">
<div class="row">
<div class="col-md-12">
<script src="https://www.google.com/recaptcha/api.js"></script>
<div class="g-recaptcha mb-3" data-callback="reCaptchaVerify" data-expired-callback="reCaptchaExpired" data-sitekey="6LflQB0aAAAAAGFzRgY1HMkUYT7a-CWTyO7xtTQB" data-size="normal">
<div style="width: 304px; height: 78px;">
<div><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LflQB0aAAAAAGFzRgY1HMkUYT7a-CWTyO7xtTQB&co=aHR0cHM6Ly93d3cuY3Zpc2lvbmludGwuY29tOjQ0Mw..&hl=fr&v=vP4jQKq0YJFzU6e21-BGy3GP&size=normal&cb=rv7nc36buh3p"
width="304" height="78" role="presentation" name="a-8yv3omyab7oq" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div><textarea id="g-recaptcha-response-1" name="g-recaptcha-response"
class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div>
</div><input data-val="true" data-val-required="Please check the "Not a robot" box" id="hidden-recaptcha" maxlength="500" name="hidden-recaptcha" type="hidden" value="">
</div>
</div>
<button class="btn btn-lg btn-primary btn-block rounded-pill btn-submit" disabled="" type="submit" idx="btnSubmit">Sign in</button>
<hr>
<div class="text-center">
<p> Don't have an account yet? <a href="/register/?ReturnUrl=%2fevents%2fthink-tank%2f2022-oct-18-cxo-tt-london%2f%3fmodal%3dsponsor">Create an account</a>
</p>
<p>
<a href="/forgotpassword/">Forgot your Password?</a>
</p>
</div>
<input name="ufprt" type="hidden"
value="4CE6D0698BC6D6E3F1BD1171707199603225712E98E53C1F549272C64BAAF0A3FE9C9B9045FD5B6CA31AE38C78B0544A36A50888F92B9C4B839AC2E48C2F84C25057CBC63DF88B2E5502344AFEBB3309A11E32180E067759A51A291ECE5774C8AFB99C3287DE2CCE7CC305DCE866D9B1326171BB788B703DC0B238F8B0293E71">
</form>
POST /events/think-tank/2022-oct-18-cxo-tt-london/
<form action="/events/think-tank/2022-oct-18-cxo-tt-london/" autocomplete="off" data-ajax="true" data-ajax-begin="subscribeBefore" data-ajax-complete="subscribeComplete" data-ajax-failure="sendFailure" data-ajax-loading="#spinner"
data-ajax-method="post" data-ajax-mode="before" enctype="multipart/form-data" method="post" novalidate="novalidate"><input name="__RequestVerificationToken" type="hidden"
value="hAmBgqDkyqwJ07qr66v-ApI62uQCOZF6a7pYRB0BwqhHmpPIZO915ksAT1i_hPWWAM9uuxJaBNx0TmfywSl1Ez2E6NArglk_BauU-uyQgdw1">
<div class="input-group mb-3 subscribe-form">
<div class="d-none">
<input id="subscribeModel_FirstName" name="subscribeModel.FirstName" type="text" value="">
</div>
<input class="form-control ml-5 ml-md-0" id="txtSubscribeEmail" name="subscribeModel.EmailAddress" placeholder="Email Address" required="" type="text" value="">
<div class="input-group-append">
<button class="btn btn-secondary" type="submit" id="btnFooterSubscribe"><i class="fas fa-paper-plane text-dark"></i></button>
</div>
</div>
<div class="newsletter-rc d-none">
<div class="row">
<div class="col-md-12">
<script src="https://www.google.com/recaptcha/api.js"></script>
<div class="g-recaptcha mb-3" data-callback="reCaptchaVerify" data-expired-callback="reCaptchaExpired" data-sitekey="6LflQB0aAAAAAGFzRgY1HMkUYT7a-CWTyO7xtTQB" data-size="normal">
<div style="width: 304px; height: 78px;">
<div><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LflQB0aAAAAAGFzRgY1HMkUYT7a-CWTyO7xtTQB&co=aHR0cHM6Ly93d3cuY3Zpc2lvbmludGwuY29tOjQ0Mw..&hl=fr&v=vP4jQKq0YJFzU6e21-BGy3GP&size=normal&cb=cahj2odbcxa9"
width="304" height="78" role="presentation" name="a-l3002zi7u50d" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div><textarea id="g-recaptcha-response-2" name="g-recaptcha-response"
class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div><input data-val="true" data-val-required="Please check the "Not a robot" box" id="hidden-recaptcha" maxlength="500" name="hidden-recaptcha" type="hidden" value="">
</div>
</div>
</div>
<input name="ufprt" type="hidden"
value="FBE4DE818E0E9D5D4C13E94BDB338CF15129C716FF69DFA21F7DE278CB682B6A97C611BD97583FD64143C10351B3CDDF531464420A2978B8D40F5DE5A6EAC6B116B35B3FFAAAF9F9AF29307C0A8922D56BFC568FCDDD32A3856A2172E6444A57B1A2F7D5BD44A8D715B73C2BD111FDE5104D9C04E38C9E0A2C2B8E702800A2AF4A920C4278B6A24977EA73708D4E7957">
</form>
Text Content
* Events * Visionaries CIO CISO CFO CMO * Partners * Content Library * Contact * Covid-19 * -------------------------------------------------------------------------------- * Login * Register THE FUTURE OF IT & CYBERSECURITY CXO THINK TANK OCTOBER 18, 2022 - LONDON, UK Add to Calendar Attend this Event Speakers Agenda Partners Become a Sponsor Attend this Event VISIONARIES Khadir Fayaz VP CISO, Cybersecurity CBRE THINK TANK SPEAKER Khadir Fayaz is a progressive Cyber Security Digital Executive Leader with more than 18 years of experience in driving large scale digital security initiatives, cyber resiliency programs and business information security engagements. Delivered successfully global digital security transformational programs with multi-million dollar investments. Transformed security as an enabler and accelerator for the business through frictionless services to meet both compliance & privacy requirements such as PCI DSS and GDPR. Dynamic, metrics-driven leader of international and virtual teams’ adept at integrating people, business processes, and technology assets into effective risk reduction strategies to elevate organizational security posture from external and internal threats. Significantly improved the risk culture and security maturity in some of the world’s largest PropTech, Learning, FMCG, Financial, Manufacturing, Technology Consulting, Hospitality & Travel companies. Built strong customer and business partner relationships, effective teams across the full spectrum of information security services. Hired and developed global talent, and operated truly globally having extensive hands-on experience in Asia Pacific, UK and USA. A highly sought-after speaker who has contributed immensely to the industry through tech start-up mentoring and holding non-executive director roles. Adrian Leung CISO & Data Protection Officer Europe Equifax William Davies Head of Information Security and Assurance Government Shared Services Cameron Brown Director of Cybersecurity and Data Risk Deloitte THINK TANK SPEAKER Cam is a cyber defense advisor and information security strategist who has worked for the United Nations, governments and law enforcement agencies, as well as leading multinational corporations. He has collaborated on multi-taskforce investigations and fact-finding missions on a global scale. Cam practices in the area of Risk Advisory in Europe with focus on Information Security, Cyber Governance, Security Intelligence, Adversary Profiling, Active Defense, Vulnerability Identification, Data Protection & Privacy (GDPR, Data Transfers and Controls, LEDP, ePrivacy, Standard Contractual Clauses, Data Protection Act) and Countermeasures to Insider Threats. Cam is also an author and contributor to books and articles on many aspects of cybercrime, data risk and information security, as well as a regular speaker on the subject at international conferences and seminars. He has led commentary on cybersecurity and cyberwarfare in the Financial Times, Forbes Special Reports, The Telegraph, Raconteur Reports, SC Magazine, IDG Connect, CSO Online, Computer Business Review, International Business Times, amongst others. In addition to investigating cybercrime offending, Cam has delivered testimony as an expert witness during criminal trials. He also practices as an international lawyer in the realms of Public Policy, Data Privacy, Regulatory Compliance, Transactional Risk, Incident and Crisis Management, Fraud Investigation, and Authentication of Electronically Stored Information. He holds bachelor and master level degrees and technical certifications from independent accreditation organisations [ISACA, (ISC)², CompTIA, IAPP, SANS Institute]. Cam enjoys helping individuals and organisations and values strong coffee in the morning. Colleagues describe him as a Pragmatic and Inspirational Leader. Leo Cunningham CISO Flo Health Inc. THINK TANK SPEAKER Leo has a successful track record working within different blue-chip companies and industries ranging from Start-ups/Scale-ups, Banking, FinTech, SaaS and eCommerce, providing insight, consultancy and strategy across global remits covering Information Security, Cyber Security, GRC, Auditing, Cloud and a multitude of compliance remits including PCI DSS, SOX and GDPR. At Flo Health, the number one health and wellbeing app. His team protects the data of 250 million users, equating to 300 billion data points. He is currently an advisor to multiple start-ups from the Palta Group. He has been instrumental in leading security efforts within HealthTech and FemTech. In June 2022, Flo Security delivered the industry’s first ISO 27001 certification. Leo is a multi-award winner. A Snyk influencer. A Keynote speaker worldwide and was added to the CISO Platform Top 100 Jimmy Jones Head Of Security ZARIOT THINK TANK SPEAKER Jimmy Jones is a telecoms cybersecurity expert and Head of Security at ZARIOT. Jimmy’s experience in telecoms spans over twenty years in which time he has built a thorough understanding of the industry working in diverse roles but all building from early engineering positions within major operators, such as WorldCom (now Verizon), and vendors including Nortel, Genband & Positive Technologies. In 2005 Jimmy started to focus on telecom security, eventually transitioning completely in 2017 to work for a specialist cyber security vendor. He now brings all his industry experience to deliver agile and secure digital transformation with ZARIOT. Deepak Uniyal Head of Risk Domains BNP Paribas Milos Pesic Global Head of Information and Cyber Security VertoFX Ltd THINK TANK SPEAKER A multi-lingual Global Head of Information & Cyber Security professional with a proven track record in coordinating, managing and delivering IT security projects through the full lifecycle. Demonstrates excellent time management and prioritisation to manage project workstreams, anticipate problems and implement action plans in highly regulated ISO environments. Confident communicating at all levels, including liaison at stakeholder management level and building relationships with external service providers. Remarkably composed and professional with the ability to remain calm under pressure, manage multiple priorities and support all phases of Information Security Plans and Policies. Recognised as an influential leader with an exceptional logical and inquisitive approach to problem-solving, through risk management, investigation and practical application, utilising a cross-functional skillset. An executive leader who aims to utilise over a decade of global experience and strategic planning to drive efficiency and profit for a forward-thinking business. Education/qualification: Information Security B.A. and Masters for Information Security at Royal Holloway, University of London, with thesis Protecting Users from Ransomware. Nassia Skoulikariti Director of IoT Apiro Data THINK TANK SPEAKER Nassia is a Digital Transformation Technologist with over 27 years of experience. Enabling growth in global organisations based in China, India, Europe and North America to innovate in the IT, Telco and IoT sectors. Nassia has experience guiding diverse technical and commercial teams globally. She is the founder of Apiro Data Ltd an End2End IoT platform and services company, the IoT Director for Mobile Ecosystem Forum, the VP of IoT at GTC . Nassia is coaching businesses to drive operational efficiency and increase revenue through thought-leading technology solutions with IoT, AI and Cloud services. Her passion is using technology to empower people to improve their lives through data driven decisions. Lately, her contribution has been to highlight IoT and Telco synergy and innovation for the future. She is a sought-after speaker and panellist at world-class IoT and Telco events, and you can follow her ideas and opinions via her industry articles. In her spare time, Nassia enjoys horse riding, helicopter flight training, kickboxing, and painting. Achal Lekhi Cyber Security Advisory Lead Royal Mail Group Ltd Philip Hoyer CTO Software BU Videojet Technologies THINK TANK SPEAKER Philip Hoyer CTO – Software BU at Videojet – a Danaher company, where, as chief connector of dots, he inspires the various software teams at Videojet to build software and IOT platforms the right way. Philip is an experienced technology executive in the security and identity space, previously also leading the Strategic Innovation function at HID Global, exploring machine - learning, frictionless access, Blockchain, securing the internet of things and augmented reality. He managed strategic alliances such as Microsoft and represented HID Global on standards bodies such as GlobalPlatform (Strategic Director and Chair of Identity Task Force), Smart Card Alliance, IETF and OATH. He is a recognised subject matter expert on Innovation, IoT, RFID / NFC, TSMs, Mobile Security, Identity, Access Control, Cloud Security and Payment Standards, especially in financial services and e-government, who regularly speaks at major conferences. He has over 25 years experience architecting, building and delivering IT solutions, much of which was gained working as a solutions architect for a large consultancy. He holds a first class honours degree in Software Engineering from Westminster University. Steven Gillham Cyber Security Consultant Metro Bank THINK TANK SPEAKER Steve is an experienced Cyber Security Specialist who has worked in many financial organisations. With over 15 years in Cyber Security and a further 25 years in IT in general giving Steve and wide knowledge based to build upon. Steve’s speciality is Vulnerability and Risk Management and is a mentor to junior members of the Security Teams. Simon Gooch Global Digital Identity Lead & Director of Security Accenture THINK TANK SPEAKER As CISO for Accenture’s CIO and Global Digital Identity Lead for the IT powering the Accenture business, I have a key role in securing the critical technology that runs the Accenture business. Accenture’s IT supports a 150B+ company with 780k people, in 120+ countries and 400+ office locations. Reporting to Accenture’s CIO and working directly with Accenture’s CISO, I have overall responsibility for the enablement of Accenture's digital identity vision. In this role, Simon leads the strategy through to implementation and run of all new Identity and Access Management services. Simon is also accountable for the security strategy, architecture and compliance for all IT services that power Accenture that are run by the office of the CIO. Ledum Maeba Head of Information Security Avanti HYLAS 2 Limited THINK TANK SPEAKER Ledum oversees all aspects of Security - Quality Assurance, Information / Cyber Security & Business Continuity Management for Avanti globally. He has successfully led the company through re-certification, surveillance, internal audits & implementation activities including training & consultancy. Ledum is a Certified Lead Auditor, Certified Internal Auditor, Certified Lead Implementer & Chartered Quality Professional. He previously worked at DHL, IT Governance, Connect Plus Services (M25 Motorway). Ledum is a graduate of Biochemistry & Computer Programming. Thomas Kinsella Co-Founder & COO Tines THINK TANK SPEAKER Thomas Kinsella is the Co-Founder and COO of Tines, a no-code automation platform for security teams. Before Tines, Thomas led security teams in companies like Deloitte, eBay, and DocuSign. As COO, Thomas is responsible for customer success, professional services, and more. Thomas has a degree in Management Science and Information Systems Studies from Trinity College in Dublin. Fox Ahmed Global Head of Cybersecurity & Technology and Data Protection Regulatory Risk BNP Paribas THINK TANK SPEAKER Fox Ahmed is the Global Head of Cybersecurity and Technology Regulatory Engagements at BNP Paribas. He has over 25 years’ experience working for Tier 1 banks with global responsibilities. Fox is currently responsible for ensuring the Group has an effective risk based approach in integrating Governance, Compliance and Regulatory requirements into programmes and digital initiatives with focus on Cybersecurity and Technology Risk Management. He is playing a crucial role in supporting the key digital strategies of the Group by enabling the management of risk at the speed and scale required in today’s digital world. Dr. David Movshovitz Co-Founder & CTO RevealSecurity THINK TANK SPEAKER Dr. David Movshovitz is an expert in software development and information security. David was previously the co-founder and VP R&D at Algotec Systems (acquired by Kodak), CTO and VP R&D of Magnifire (acquired by F5 Networks), and CTO and Co-Founder of Navajo Systems (acquired by Salesforce.com). David also headed an R&D team in the Israeli Defense Forces and is the recipient of the Israeli Defense Award. Dr. Movshovitz earned his PhD in Physics from Bar-Ilan University and teaches Information Technology, System Architecture, developing secure applications, and web security at the Inter Disciplinary Center (IDC) and Tel-Aviv University (TAU). Lino Gambella Chief Technology Officer Defenx THINK TANK SPEAKER Lino Gambella is a cyber security expert with over 20 years of experience. He is currently the Chief Technology Officer at Defenx Limited. Lino has a long standing relationship with Akamai technologies, first as a client and subsequently as a partner. He has a vast knowledge of Akamai solutions and uses them to custom fit perimeters around businesses ensuring maximum security. Lino is an advocate for the Zero Trust model and has helped many businesses adapt and implement this approach. He works closely with in-house technical teams to create an infrastructure that is reliable and secure. Richard Meeus Director, Security Technology & Strategy Akamai Technologies THINK TANK SPEAKER Richard Meeus has over 20 years of experience in designing and building secure solutions working as pre/post-sales, in addition to consulting roles. He has worked on some of the world's largest enterprise security solutions through Mirapoint, to being a key pre-sales component of Prolexic as it spearheaded the DDOS protection space. Become a Speaker OCTOBER 18, 2022 Add to Calendar ATTEND THIS EVENT Not available on October 18, 2022? View other dates for the Think Tank Attend this Event Become a Speaker Become a Sponsor AGENDA October 18, 2022 * October 18, 2022 * October 18, 2022 All times United Kingdom Time Download Agenda 12:30 PM-1:00 PM WELCOME & REGISTRATION -------------------------------------------------------------------------------- × You've participated in the Raffle × Ooppss... something went wrong, please try after sometime 1:00 PM-1:35 PM Keynote BEING EFFECTIVE.... SECURELY In the post pandemic era, remote employment is the new status quo. Employers are forced to implement and improve the digital workplace by providing productivity tools and accessibility to company resources. In this session, we will share case studies of successful digital workplace implementations, including how to deal with the inherent security risks of expanded accessibility to company resources. In this session you will learn from real working examples the keys to implementing a successful digital workplace including how to evaluate the potential ROI from the different security strategies available. -------------------------------------------------------------------------------- IN PARTNERSHIP WITH -------------------------------------------------------------------------------- × You've participated in the Raffle × Ooppss... something went wrong, please try after sometime 1:40 PM-2:35 PM Panel MONITORING AUTHENTICATED USERS IN BUSINESS APPLICATIONS TO DETECT IMPOSTERS AND ROGUE INSIDERS The risks posed by rogue insiders and external attackers make application detection a massive pain point for enterprises, especially in regards to core business applications. External attackers leverage stolen credentials to impersonate an insider and connect to applications, while at the same time insiders are not sufficiently monitored in SaaS and home-grown applications. Examples are a fraudster’s takeover of a checking account via social engineering, or a customer service agent modifying an insurance policy to add themselves as a beneficiary, or a salesperson downloading a report of all customers before switching to work at a competitor. Current detection solutions are application-specific and in most cases ineffective, therefore requiring a new approach. However, the problem goes beyond detection itself, because even after the enterprise receives a complaint or is otherwise suspicious, investigating these suspicions usually consists of manual sifting through tons of log data from multiple sources, which is time consuming and ineffective in many cases. This panel will explore the growing need for application detection and the problems with current rule-based techniques for application monitoring. Panelists will discuss potential solutions using real examples, such as the analysis of user journeys within the application and across applications to accurately detect malicious activities performed by authenticated users. Chair Cameron Brown Director of Cybersecurity and Data Risk Deloitte Cam is a cyber defense advisor and information security strategist who has worked for the United Nations, governments and law enforcement agencies, as well as leading multinational corporations. He has collaborated on multi-taskforce investigations and fact-finding missions on a global scale. Cam practices in the area of Risk Advisory in Europe with focus on Information Security, Cyber Governance, Security Intelligence, Adversary Profiling, Active Defense, Vulnerability Identification, Data Protection & Privacy (GDPR, Data Transfers and Controls, LEDP, ePrivacy, Standard Contractual Clauses, Data Protection Act) and Countermeasures to Insider Threats. Cam is also an author and contributor to books and articles on many aspects of cybercrime, data risk and information security, as well as a regular speaker on the subject at international conferences and seminars. He has led commentary on cybersecurity and cyberwarfare in the Financial Times, Forbes Special Reports, The Telegraph, Raconteur Reports, SC Magazine, IDG Connect, CSO Online, Computer Business Review, International Business Times, amongst others. In addition to investigating cybercrime offending, Cam has delivered testimony as an expert witness during criminal trials. He also practices as an international lawyer in the realms of Public Policy, Data Privacy, Regulatory Compliance, Transactional Risk, Incident and Crisis Management, Fraud Investigation, and Authentication of Electronically Stored Information. He holds bachelor and master level degrees and technical certifications from independent accreditation organisations [ISACA, (ISC)², CompTIA, IAPP, SANS Institute]. Cam enjoys helping individuals and organisations and values strong coffee in the morning. Colleagues describe him as a Pragmatic and Inspirational Leader. Panelists Jimmy Jones Head Of Security ZARIOT Jimmy Jones is a telecoms cybersecurity expert and Head of Security at ZARIOT. Jimmy’s experience in telecoms spans over twenty years in which time he has built a thorough understanding of the industry working in diverse roles but all building from early engineering positions within major operators, such as WorldCom (now Verizon), and vendors including Nortel, Genband & Positive Technologies. In 2005 Jimmy started to focus on telecom security, eventually transitioning completely in 2017 to work for a specialist cyber security vendor. He now brings all his industry experience to deliver agile and secure digital transformation with ZARIOT. Achal Lekhi Cyber Security Advisory Lead Royal Mail Group Ltd Philip Hoyer CTO Software BU Videojet Technologies Philip Hoyer CTO – Software BU at Videojet – a Danaher company, where, as chief connector of dots, he inspires the various software teams at Videojet to build software and IOT platforms the right way. Philip is an experienced technology executive in the security and identity space, previously also leading the Strategic Innovation function at HID Global, exploring machine - learning, frictionless access, Blockchain, securing the internet of things and augmented reality. He managed strategic alliances such as Microsoft and represented HID Global on standards bodies such as GlobalPlatform (Strategic Director and Chair of Identity Task Force), Smart Card Alliance, IETF and OATH. He is a recognised subject matter expert on Innovation, IoT, RFID / NFC, TSMs, Mobile Security, Identity, Access Control, Cloud Security and Payment Standards, especially in financial services and e-government, who regularly speaks at major conferences. He has over 25 years experience architecting, building and delivering IT solutions, much of which was gained working as a solutions architect for a large consultancy. He holds a first class honours degree in Software Engineering from Westminster University. Dr. David Movshovitz Co-Founder & CTO RevealSecurity Dr. David Movshovitz is an expert in software development and information security. David was previously the co-founder and VP R&D at Algotec Systems (acquired by Kodak), CTO and VP R&D of Magnifire (acquired by F5 Networks), and CTO and Co-Founder of Navajo Systems (acquired by Salesforce.com). David also headed an R&D team in the Israeli Defense Forces and is the recipient of the Israeli Defense Award. Dr. Movshovitz earned his PhD in Physics from Bar-Ilan University and teaches Information Technology, System Architecture, developing secure applications, and web security at the Inter Disciplinary Center (IDC) and Tel-Aviv University (TAU). -------------------------------------------------------------------------------- IN PARTNERSHIP WITH -------------------------------------------------------------------------------- × You've participated in the Raffle × Ooppss... something went wrong, please try after sometime 2:35 PM-2:50 PM NETWORKING BREAK -------------------------------------------------------------------------------- × You've participated in the Raffle × Ooppss... something went wrong, please try after sometime 2:50 PM-3:35 PM Fireside Chat THE GREATEST FEARS? The biggest fear is not the technology, it is the potential of human error that could expose your organization to a cyberattack. The majority of CISOs agree that an employee carelessly falling victim to a phishing scam is the most likely cause of a security breach. Most also agree that they will not be able to reduce the level of employee disregard for information security. How do we guard against human error without limiting employee efficiency and productivity? Chair Cameron Brown Director of Cybersecurity and Data Risk Deloitte Cam is a cyber defense advisor and information security strategist who has worked for the United Nations, governments and law enforcement agencies, as well as leading multinational corporations. He has collaborated on multi-taskforce investigations and fact-finding missions on a global scale. Cam practices in the area of Risk Advisory in Europe with focus on Information Security, Cyber Governance, Security Intelligence, Adversary Profiling, Active Defense, Vulnerability Identification, Data Protection & Privacy (GDPR, Data Transfers and Controls, LEDP, ePrivacy, Standard Contractual Clauses, Data Protection Act) and Countermeasures to Insider Threats. Cam is also an author and contributor to books and articles on many aspects of cybercrime, data risk and information security, as well as a regular speaker on the subject at international conferences and seminars. He has led commentary on cybersecurity and cyberwarfare in the Financial Times, Forbes Special Reports, The Telegraph, Raconteur Reports, SC Magazine, IDG Connect, CSO Online, Computer Business Review, International Business Times, amongst others. In addition to investigating cybercrime offending, Cam has delivered testimony as an expert witness during criminal trials. He also practices as an international lawyer in the realms of Public Policy, Data Privacy, Regulatory Compliance, Transactional Risk, Incident and Crisis Management, Fraud Investigation, and Authentication of Electronically Stored Information. He holds bachelor and master level degrees and technical certifications from independent accreditation organisations [ISACA, (ISC)², CompTIA, IAPP, SANS Institute]. Cam enjoys helping individuals and organisations and values strong coffee in the morning. Colleagues describe him as a Pragmatic and Inspirational Leader. Panelists William Davies Head of Information Security and Assurance Government Shared Services Steven Gillham Cyber Security Consultant Metro Bank Steve is an experienced Cyber Security Specialist who has worked in many financial organisations. With over 15 years in Cyber Security and a further 25 years in IT in general giving Steve and wide knowledge based to build upon. Steve’s speciality is Vulnerability and Risk Management and is a mentor to junior members of the Security Teams. Simon Gooch Global Digital Identity Lead & Director of Security Accenture As CISO for Accenture’s CIO and Global Digital Identity Lead for the IT powering the Accenture business, I have a key role in securing the critical technology that runs the Accenture business. Accenture’s IT supports a 150B+ company with 780k people, in 120+ countries and 400+ office locations. Reporting to Accenture’s CIO and working directly with Accenture’s CISO, I have overall responsibility for the enablement of Accenture's digital identity vision. In this role, Simon leads the strategy through to implementation and run of all new Identity and Access Management services. Simon is also accountable for the security strategy, architecture and compliance for all IT services that power Accenture that are run by the office of the CIO. Nassia Skoulikariti Director of IoT Apiro Data Nassia is a Digital Transformation Technologist with over 27 years of experience. Enabling growth in global organisations based in China, India, Europe and North America to innovate in the IT, Telco and IoT sectors. Nassia has experience guiding diverse technical and commercial teams globally. She is the founder of Apiro Data Ltd an End2End IoT platform and services company, the IoT Director for Mobile Ecosystem Forum, the VP of IoT at GTC . Nassia is coaching businesses to drive operational efficiency and increase revenue through thought-leading technology solutions with IoT, AI and Cloud services. Her passion is using technology to empower people to improve their lives through data driven decisions. Lately, her contribution has been to highlight IoT and Telco synergy and innovation for the future. She is a sought-after speaker and panellist at world-class IoT and Telco events, and you can follow her ideas and opinions via her industry articles. In her spare time, Nassia enjoys horse riding, helicopter flight training, kickboxing, and painting. -------------------------------------------------------------------------------- IN PARTNERSHIP WITH -------------------------------------------------------------------------------- × You've participated in the Raffle × Ooppss... something went wrong, please try after sometime 3:40 PM-3:55 PM Disruptor STAFF SHORTAGES We have always suffered from a shortage of good security employees. Is it any wonder we have trouble recruiting and motivating good security people? The shift to work from home that was accelerated by the start of the COVID pandemic has resulted in a sharp increase in cyberattacks. Companies of all sizes were simply unprepared for the sudden and massive switch to remote work. As a result, data exfiltration and leakage has increased most sharply. Phishing, ransomware, VPN breaches and other security events have all shot up as well. Inevitably the sheer persistence of these attacks led to more hours of work needed leading to staff burnout, often more severe at organizations that are still trying to fight present battles with yesterday’s tools. Many believe that a new approach is needed to prevent cybersecurity staff burnout increasing the demand for more automated solutions since yesterday’s tools are not nearly as successful at stopping attacks as state-of-the-art methods, in addition to increasing the workload for cybersecurity staff, using them also exposes organizations to major losses. Thomas Kinsella Co-Founder & COO Tines Thomas Kinsella is the Co-Founder and COO of Tines, a no-code automation platform for security teams. Before Tines, Thomas led security teams in companies like Deloitte, eBay, and DocuSign. As COO, Thomas is responsible for customer success, professional services, and more. Thomas has a degree in Management Science and Information Systems Studies from Trinity College in Dublin. -------------------------------------------------------------------------------- IN PARTNERSHIP WITH -------------------------------------------------------------------------------- × You've participated in the Raffle × Ooppss... something went wrong, please try after sometime 3:55 PM-4:10 PM NETWORKING BREAK -------------------------------------------------------------------------------- × You've participated in the Raffle × Ooppss... something went wrong, please try after sometime 4:10 PM-4:25 PM Disruptor ZERO TRUST NETWORK A zero trust approach to security has been steadily gaining steam for the last several years. The importance of this approach reached a new level with the May 2021 White House executive order requiring federal agencies to shift to this architecture by fall 2024. Ransomware continues to grow and clearly as remote work became the new norm, and e-commerce increased. Leaders need to establish a mature level of cyber resilience to better handle ransomware and other potential data breaches. Luckily, zero trust can play a critical part in that strategy as more and more businesses are realizing that to build customer trust they must establish zero tolerance for trust in their security strategy. Will Zero Tolerance for Trust redefine the state of security as government and private industry scrutinize their trusted relationships more, and re-evaluate the ‘who, what, why’ in 2022 more than any other year? -------------------------------------------------------------------------------- × You've participated in the Raffle × Ooppss... something went wrong, please try after sometime 4:30 PM-5:25 PM Panel RANSOMWARE/EXTORTIONWARE CISOs face a huge headache trying to understand how to know when they were attacked, what data attackers have corrupted? How quickly can they recover from the attack? And do they have to pay a ransom to get the data back? Ransomware remains a significant challenge for companies, not simply because it has become ubiquitous, but also because of the significant impact a single ransomware attack may have on a company and every other company or customer that relies on that company. Cybersecurity and risk management have always been vital for the flow of any business. However, the current condition of the global supply chain makes it exceptionally vulnerable to severe damage from an attack more so than usual. When the supply chain is barely getting by, criminals are more likely to assume they have leverage over businesses. A ransomware attacker may be more brazen and exercise higher demands than they might have a few years ago. Chair Cameron Brown Director of Cybersecurity and Data Risk Deloitte Cam is a cyber defense advisor and information security strategist who has worked for the United Nations, governments and law enforcement agencies, as well as leading multinational corporations. He has collaborated on multi-taskforce investigations and fact-finding missions on a global scale. Cam practices in the area of Risk Advisory in Europe with focus on Information Security, Cyber Governance, Security Intelligence, Adversary Profiling, Active Defense, Vulnerability Identification, Data Protection & Privacy (GDPR, Data Transfers and Controls, LEDP, ePrivacy, Standard Contractual Clauses, Data Protection Act) and Countermeasures to Insider Threats. Cam is also an author and contributor to books and articles on many aspects of cybercrime, data risk and information security, as well as a regular speaker on the subject at international conferences and seminars. He has led commentary on cybersecurity and cyberwarfare in the Financial Times, Forbes Special Reports, The Telegraph, Raconteur Reports, SC Magazine, IDG Connect, CSO Online, Computer Business Review, International Business Times, amongst others. In addition to investigating cybercrime offending, Cam has delivered testimony as an expert witness during criminal trials. He also practices as an international lawyer in the realms of Public Policy, Data Privacy, Regulatory Compliance, Transactional Risk, Incident and Crisis Management, Fraud Investigation, and Authentication of Electronically Stored Information. He holds bachelor and master level degrees and technical certifications from independent accreditation organisations [ISACA, (ISC)², CompTIA, IAPP, SANS Institute]. Cam enjoys helping individuals and organisations and values strong coffee in the morning. Colleagues describe him as a Pragmatic and Inspirational Leader. Panelists Adrian Leung CISO & Data Protection Officer Europe Equifax Fox Ahmed Global Head of Cybersecurity & Technology and Data Protection Regulatory Risk BNP Paribas Fox Ahmed is the Global Head of Cybersecurity and Technology Regulatory Engagements at BNP Paribas. He has over 25 years’ experience working for Tier 1 banks with global responsibilities. Fox is currently responsible for ensuring the Group has an effective risk based approach in integrating Governance, Compliance and Regulatory requirements into programmes and digital initiatives with focus on Cybersecurity and Technology Risk Management. He is playing a crucial role in supporting the key digital strategies of the Group by enabling the management of risk at the speed and scale required in today’s digital world. Leo Cunningham CISO Flo Health Inc. Leo has a successful track record working within different blue-chip companies and industries ranging from Start-ups/Scale-ups, Banking, FinTech, SaaS and eCommerce, providing insight, consultancy and strategy across global remits covering Information Security, Cyber Security, GRC, Auditing, Cloud and a multitude of compliance remits including PCI DSS, SOX and GDPR. At Flo Health, the number one health and wellbeing app. His team protects the data of 250 million users, equating to 300 billion data points. He is currently an advisor to multiple start-ups from the Palta Group. He has been instrumental in leading security efforts within HealthTech and FemTech. In June 2022, Flo Security delivered the industry’s first ISO 27001 certification. Leo is a multi-award winner. A Snyk influencer. A Keynote speaker worldwide and was added to the CISO Platform Top 100 -------------------------------------------------------------------------------- IN PARTNERSHIP WITH -------------------------------------------------------------------------------- × You've participated in the Raffle × Ooppss... something went wrong, please try after sometime 5:25 PM-5:30 PM CLOSING REMARKS -------------------------------------------------------------------------------- × You've participated in the Raffle × Ooppss... something went wrong, please try after sometime 5:30 PM-6:30 PM COCKTAIL HOUR -------------------------------------------------------------------------------- × You've participated in the Raffle × Ooppss... something went wrong, please try after sometime IN PARTNERSHIP WITH Become a Sponsor Having been deluged by a smorgasbord of "vendors" trying to get us to sponsor CISO events literally multiple times a week it was hard to cut through all the noise. C-Vision laid out an articulate plan for us to be much more targeted, presented a stronger ROI and on top have come through with the Results they Promised. They really have become an adjunct "team for hire" building trust with us all along the way. There is no second guessing on this relationship and consistently over-deliver. My kind of Partner. Mark Musselman CRO LogicHub I had the pleasure of joining the C-Vision International, Nordics CISO Council Roundtable with a wonderful group of cyber executives. We had a wonderful, insightful conversation and the whole experience was enjoyable. I made great new contacts and reconnected with existing contacts on really important topics that matter to CISO’s and all in cybersecurity. I’d highly recommend joining in any C-Vision event. Connie McIntosh Head of Security Assurance & Head of Solution Security Ericsson C-Vision has helped my company a great deal. They have trusted deep relationships that make the sales process a lot easier. Everyone wants to get in front of C-level execs today. C-Vision cuts through the noise to help build long lasting business relationships! Rob Dorney Senior Director of Sales - North America Cybersixgill C-Vision was really professional, responsive, listened and are very thoughtful in their approach. It showed from the information gathering stage, to the planning stage and then with execution. I call them a 'boutique' company - because they are very high touch and truly care about the customer and end result, and most importantly, the relationship building and next steps after the event. They do not overbook their calendar and it shows with their customer service. Our speakers (Senior Exec VP level) were impressed with the format, and who they brought to the table. We will be continuing to engage with them. I can't recommend them enough and with so many out there, it is hard to find the right fit! Marla Jaeger CMP | Marketing Programs Manager Demand Generation & Marketing Operations Palo Alto Networks Intimate, immersive experiences provided by a group of individuals always available to support our needs. Fantastic organization and very high-level executives. The promise was delivered! Maarten Ectors Chief Innovation Officer Legal & G C-vision's events combine relevant topics with a suitable audience. I found great value at my last attendance, and would definitely consider upcoming events. Bjørn R. Watne SVP & CISO Storebrand Thoughtful discussion among experienced leaders regarding current challenges and complexities, and valuable exchange of pragmatic approaches and best practices. Well organized and facilitated. Dorothy Yu Principal DY Partners, Ltd. A group very focused in bringing diversity to the discussion table Larry Whiteside Jr. Co-Founder ICMCP I love the engaging format of the councils. Very high level discussions and never a sales pitch. The C-Vision staff members are amazing. Jeffrey Vinson SVP CISO Harris Health System A very warm welcome and interesting speakers. I was very pleased to be among such a dynamic group. Allison Miller CISO Optum The process was very well organized by C-Vision. Perfect organization, honest and authentic speakers of high level. Paige Adams Group CISO Zurich Insurance Group 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. × 2022 OCT 18 CXO TT LONDON THINK TANK × LOGIN TO BECOME A SPEAKER *You must have an account to request to be a speaker * Email Address Password Sign in -------------------------------------------------------------------------------- Don't have an account yet? Create an account Forgot your Password? × THE FUTURE OF IT & CYBERSECURITY - 10/18 THINK TANK -------------------------------------------------------------------------------- × REQUEST RECEIVED Thank you for your submission! We will review your information and will let you know if the event is a good fit. If you are approved, you will receive an email confirmation with additional details. Close ATTEND THIS EVENT Something went wrong. Please try again after sometime * First Name Last Name Business Email Job Title Select Your Company Company is Required Phone By clicking the “Register" button, you are agreeing to the Privacy Policy and Terms of Use Register × LOGIN TO YOUR C-VISION ACCOUNT If you have a C-Vision account, please login to request a partnership of this event. Why Create an Account? - or - Let a C-Vision staff member contact you directly to set up your partnership, please email us at partners@cvisionintl.com × * Email Address Password Sign in -------------------------------------------------------------------------------- Don't have an account yet? Create an account Forgot your Password? This is the attendee info 125 S Wacker Dr. Suite 300 Chicago, IL 60606 +1 (773) 758-5451 info@cvisionintl.com Stay Informed Subscribe to C-Vision Event Alerts Thank you! Quick Links * Events * Contact Us * Partners * Careers Visionaries * CIO * CISO * CFO * CMO -------------------------------------------------------------------------------- Privacy Policy & GDPR Compliance Terms of Use Copyright ©2022 C-Vision International Ltd. width="1" height="1" style="display: none;" alt="websights"/>