Why International CISOS Summit Why you should attend the International CISOS Summit

This exclusive CISO event creates a perfect environment for the exchange of ideas and establishing a professional network with other CISOs.

Buy Ticket

Great Speakers

Our wonderful invited speakers are recognized industy leaders that will present on various topics that matters to today's CISOS.
No sales pitches!

01

Great Experience

Content, expert panels, extraordinary speakers, and fantastic attendees, will make for a great experience and provide the opportunity to meet new people and make new connections.

02

Networking

A well established network has become an important part of our personal and professional lives. Here, you have the opportunity to strengthen your network by meeting other peers and establishing new communication channels for the exchange of ideas.

03

Host City

Cartagena de Indias, with its wonderful nightlife, exuberant landscapes, and its beaches with its refreshing breeze and the warm waters of the Caribbean Sea, makes it one of the most popular destinations on the rise according to TRIPADVISOR.

04

Meet our Expert Speakers

Kevin Winter

CISO AMERICAS, Deloitte

Wendy Nather

Head, Advisory CISOs, Duo Sec (Now Cisco)

Dr. Andrea Little Limbago

Chief Social Scientist, Virtru

Pablo Breuer

Innovation Officer | Donovan Group | U.S. Special Operations Command

Elizabeth Wharton

VP, Strategy for Prevailion

Kai Roer

CEO, CLTRe

Stay current

Our expert speakers will provide insights that will help you protect your data and secure your business long term.

Schedule Details International CISOS Summit Agenda

Content focused on Information Security leadership and Strategy for securing the next generation of IT.

September 11

08:00 AM - 08:30 AM

Opening Ceremonies

Edgar Rojas

Welcome comments and innauguration

08:30 AM - 09:30 AM

How do I approach securing my organization - A CISOS Tale

Kevin Winter
Chief Information Security Officer Americas Deloitte

As the CISO for Deloitte Americas organization, my role is to work closely with regional Technology, Risk, and Cybersecurity leaders to implement solutions to reduce Deloitte's risk to vulnerabilities. In this presentation, I will share with you my vision on what I believe is the best approach. I will share how I communicate my vision across the organization, and how various controls are implemented and monitored to measure success.

I hope this presentation will raise some ideas and some interesting questions. Remember, all organizations are different, and there are different approaches, but at the end, we all have the same goal: help reduce risks to our organizations.

09:30 AM - 10:30 AM

Building Your Security Portfolio

Wendy Nather
Head, Advisory CISOs DuoSec (now Cisco)

With all the security technologies out there, how do you decide which ones are critical, and in which order do you bring them in? We'll use the Cyber Defense Matrix, created by the Chief Security Scientist at a large international bank, to look at ways to assess your portfolio, communicate it to your management, and even figure out how to trim what you don't need.

10:30 AM - 11:00 AM

Morning Break

Enjoy a nice cup of freshly brewed Colombian coffee; check your messages; interact with attendees, presenters, and sponsors.

11:00 AM - 12:30 PM

Alcavio Technologies Representative

Alcavio Technologies

Information coming soon.

12:30 PM - 02:00 PM

Lunch Break

Lunch will be served at hotel's restaurant.

02:00 PM - 03:00 PM

Applying Information Security Paradigms to Misinformation Campaigns: A Multidisciplinary Approach

Pablo Breuer
Innovation Officer | Donovan Group | U.S. Special Operations Command

A misinformation attack is the deliberate promotion of false, misleading, or mis-attributed information, often designed to change the beliefs of large numbers of people. Misinformation is an information security problem in part because information technology and the internet are how misinformation messages are generated, transmitted and received. Historically, large-scale misinformation (propaganda) has been the domain of nation-states, but the Internet has also enabled non-state actors to have effects formerly only available to nation-states. Additionally, the Internet has enabled nation-states to conduct influence campaigns in a new manner that is less attributable and can therefore be conducted without substantial risk of starting a war.

Power-motivated misinformation has been studied as an information security problem, information operations problem, a form of conflict, a social problem and a news source pollution. Each of these studies uses a different framing and ontology; we cover the adaptation of existing information security frameworks and principles into a framework and common ontology for these communities to share information about misinformation campaigns incidents and conduct componentwise response to them. We also describe the links between information operations, artefact-based data science and narrative analysis of misinformation campaigns.

03:00 PM - 04:00 PM

Facts and fiction of security culture - The how and what to measure in order to actually improve

Kai Roer
CEO, CLTRe

A journey through different ways of measuring security culture and awareness, how some of the metrics are useful, while others are a waste of resources. Learn what to measure, how to do it correctly, and how to use the results to improve the overall performance of your security culture program.

04:00 PM - 04:30 PM

Afternoon Break

Enjoy a nice cup of freshly brewed Colombian coffee; check your messages; interact with attendees, presenters, and sponsors.

04:30 PM - 05:30 PM

Nexus of Security and Privacy

Dr. Andrea Little Limbago
Chief Social Scientist, Virtru

Security and privacy have traditionally remained siloed. Security tends to focus on the technical implementation of protecting data and infrastructure, while privacy focuses on the legal and ethical considerations behind the storage, access, protection, and sharing of data. In many areas, this separation of the two is relevant and appropriate, but increasingly there is significant overlap in the area of unauthorized data access. A focus on this nexus can help streamline resources, strategies, and awareness to optimize both security and privacy. We'll discuss this growing overlap through real-world examples, detail the prevalence of and the various ways unauthorized data access impacts both security and privacy, and discuss how organizations can benefit by operating at the nexus of security and privacy to best handle the evolving compliance and threat landscapes.

05:30 PM - 06:30 PM

Welcome cocktail

Join us during our cocktail hour to celebrate our first day. Enjoy some local delicacies and sounds of Cartagena

Septiembre 12

08:00 AM - 08:30 AM

Start of Day 2

Edgar Rojas

Welcome to day 2 activities

08:30 AM- 10:00 AM

Exabeam Representative

Exabeam

Information coming soon.

10:00 AM - 10:30 AM

Morning Break

Enjoy a nice cup of freshly brewed Colombian coffee; check your messages; interact with attendees, presenters, and sponsors.

10:30 AM - 12:00 PM

Sailpoint Representative

Sailpoint

Information coming soon.

12:00 PM - 01:30 PM

Lunch Break

Lunch will be served at hotel's restaurant.

01:30 PM - 03:00 PM

Nozomi Networks Representative

Nozomi Networks

Information coming soon.

03:00 PM - 03:30 PM

Afternoon Break

Enjoy a nice cup of freshly brewed Colombian coffee; check your messages; interact with attendees, presenters, and sponsors.

03:30 PM - 04:30 PM

Minimizing Supply Chain Risk

Elizabeth Wharton
VP, Strategy for Prevailion

When every third-party and supply chain partner is an attack vector, maximizing threat visibility and resource utilization becomes key. Effective risk modeling for supply chain vulnerabilities enables internal security teams to focus on restoring systems rather than the breach blame game. Drawing on the City of Atlanta's 2018 ransomware incident and other local government breaches as a backdrop, this presentation will identify high-risk supply chain verticals and provide risk mitigation steps for internal planning processes.

04:30 PM - 06:00 PM

Smartfense Representative

Smartfense

Information coming soon.

06:00 PM - 06:30 PM

Closing Ceremonies

Cost to Attend: $300 USD

Includes:
- Access to all sessions
- Brunch and lunch 2 days (September 11 and 12)
- Welcome Cocktail (September 11)

Get your Ticket

Our Sponsors
Very proud to count with the support of these industry leaders

Our Partners
Very proud to count with the support of important private organizations and government agencies

How to Reach Radisson Hotel

Radisson Cartagena Ocean Pavillion Hotel

Carrera 9 #22-850, Cartagena, Bolivar Colombia

Ticket Information

Name: Edgar Rojas

Cell: +1 931 2127683

Email: erojas@tacticaledge.co

Agenda Information

Name: Edgar Rojas

Cell: +1 931 2127683

Email: erojas@tacticaledge.co

September 11 and 12, 2019

8 am to 6 pm

Ticket Information

Name: Edgar Rojas

Cel: +1 931 2127683

Email: erojas@tacticaledge.co

Agenda Information

Name: Edgar Rojas

Cell: +1 931 2127683

Email: erojas@tacticaledge.co