CISO Alliances Session Information

Date: Wednesday, 14th September 2022

Time: 9:00am – 15:15pm

Venue:  Victoria Island (Disclosed to participants only)

Location:  Victoria Island, Lagos, Nigeria

The Alliances chapter is a gathering consists of business risk, information and cyber security leaders who have been highlighted as being able to offer value in terms of content and influence. It is designed to form alliances and to drive progressive change in the business world and beyond.

The content and format is designed to talk together, learn better and experience more. 

Format: Invite only Security Leaders debating pertinent, real life issues through the form of open forums, workshops and  Panels.

Chatham House Rule will be applied

Outcomes:

  1. Depth achieved around business objectives where the opportunity of experience within the attendees is leveraged
  2. Benchmarking and verification of thought processes outside of existing networks i.e. the broader CISO Alliances community
  3. Industry progression and unity in impacting the challenges of the common business objectives
  4. Not corporate flag waiving or sales pitches.  We insist, do that elsewhere.

Theme:

Protecting the “Crown Jewels”

0Weeks0Days0Hours0Minutes0Seconds

Chapter Order of the Day

0900
Registration and Networking

Registration

0930
Chapter Opening

Welcome Remarks and Housekeeping

Session Leader: Phil Manny, Director – CISO Alliances

Master of Ceremonies: Tunde Dada, Group Head IT/ BCM – Inq. Digital (Formally Vodacom and Vodafone Company)

Session Outcome: Understand the purpose of the day, order of the day and your role throughout the day

0945
Session 1
Workshop

Session Moderator: Tunde Dada, Group Head IT/ BCM – Inq. Digital (Formally Vodacom and Vodafone Company)

Session: Group Workshop

Session Theme Title: Cyber Resilience

Session Overview and Synopsis:

We will kick start the day with a group workshop where we divide into sub-groups and debate:

  • How to build & sustain cyber resilience
  • What challenges we come up against
  • What can we do to reduce the risk for our organisations

Session Outcome: 

  • A collective response of best practice

1045
Session 2

Open Forum

Session Leader: John Mutama, West & East Africa Lead – Infoblox

Session Theme Title: Keeping the lights on

Session Overview and Synopsis:

Enterprises are investing heavily into initiatives such as deploying hybrid clouds, expanding security focus, implementing IoT, and rolling out comprehensive digital economy solutions. While these initiatives promise to increase agility, reduce risk, and improve productivity, one thing is often overlooked – the underlying security and core network service infrastructure.

Session Outcome: 

• Improving your organisations security posture
• The importance of cybersecurity automation.
• Keeping up to date with cybersecurity landscape

1115
Session 3
Open Forum

Session Moderator: Ifeyemi Ifekoya, CISO – Greenwich Merchant Bank

Session Theme Title: Addressing the role of CISO/ InfoSec Leader in practice – “Reality vs Regulator Requirements”

Session Overview and Synopsis:

Many can relate to the reality that InfoSec can often map out in a differing journey to an ideal utopia. Unique challenges can arise with regards to how to navigate the corridors based on differentiating organisation, size, budget, governance, and structure.

During the group discussion we will focus on 4 key areas:

• Cost
• Governance of Organisation
• Technology
• People

Session Outcomes and Takeaways:

  • Cost, Governance & Structure vs. Technology & Maturity
  • Sharing of experiences dealing with the various challenges
  • Tackling the ‘One Cap fits all’ approach

1200
Networking Lunch

Supported by:

1300
Session 4
Open Forum

Session Leader: Jimi Falaiye, Country Manager – Sophos

Session Theme Title: Achieving Superior Cybersecurity Outcomes

Session Overview and Synopsis:

The cybersecurity industry is experiencing a massive gap in talent and experience. As a result, organizations are struggling to build effective security operations (SecOps) programs to detect, investigate, and respond to threats before damage occurs.

As a result, organizations are increasingly looking towards managed detection and response (MDR) services to run their security operations program. According to Gartner, by 2025, 50% of organizations will be using MDR services.

However, the security services marketplace is relatively new to many, and can be filled with false claims and confusing technical jargon. Making an educated decision for many organizations is difficult.

Session Outcome:

This session will help give clarity by walking you through the key considerations when choosing an MDR service. It also enables you to see how MDR providers stack up against one another, helping you make an informed choice.

1330
Session 5
Open Forum

Session Leader: Abumere Igboa, CISO & DPO – Stanbic IBTC

Session Theme Title: Evolution of Data Protection Techniques, getting your Strategy right to combat Next Generation Cyber Threats.

Session Overview and Synopsis:

  • How to standardize security of sensitive data and corporate information
  • Ensure privacy of customers and employees sensitive data
  • Reduce the impact and risk of a successful data breach

Session Outcomes:

  • A comprehensive understanding of modern data protection approaches & techniques and strategic ways to sustaining compliance with data protection laws or regulations.

1415
Networking Break

1430
Session 6

Open Forum

Session Leader: Steve Uma, CIO & Head, Information Services and Technology – NSIA Insurance

Session Theme Title: Digital Transformation – Securing a never-ending journey….?

Session Overview and Synopsis:

Digital transformation in business is like evolution in nature — a never-ending process. ‘Organizations that claim to have finished transformation are either not well connected to their ecosystem or not well connected to their customer behavior’, said Shiva Ramani, CEO at San Jose, Calif.

With digital transformations, organizations deploy all kinds of new technology tools and services, departing from the old ways of service delivery leading to improved customer experience and efficiency.

These transformations may consist of cloud services, mobile devices and apps, remote workplaces, edge computing components, and the IoT. Hence organizations need to ensure that a comprehensive, effective cybersecurity strategy is part of the digital transformation program to ensure that valuable data is protected in the modern environment.

it’s imperative to take a security-focused approach when commencing a digital transformation program. Digital transformation programs may vary from one organization to another. It is therefore important to ensure that security is considered in all stages of the implementation process to help deliver a sustainable digital transformation program that is future ready whilst meeting the peculiar security needs of the organization.

Session Outcomes:

  • To explain why security is important  in Digital Transformation
  • To explain how to fuse security into the Digital Transformation Program
  • To explain how sustainable Security Transformation can be achieved during Digital Transformation

1515
Post Alliances Networking

Thank you