Sunday 29th September
-
Sunday 29th
15:00-16:00Delegate Registration
-
Sunday 29th
16:30-18:30The SABSA Institute Forum
The SABSA Institute (TSI) and the TSI Liaison Group (LG) update. The TSI Forum includes a question-and-answer session and an opportunity to meet and interact with The SABSA Institute Board of Trustees (Directors) and LG members.
Speaker(s)
Gareth Watters
Glen Bruce
Kate Mullin
Kirk Nicholls -
Sunday 29th
19:30-20:00Delegate Registration & Drinks Reception - sponsored by Killashee Hotel
-
Sunday 29th
20:00 onwardsCOSAC 2024 Welcome Dinner
Monday 30th September
-
Monday 30th
09:30-17:30COSAC Masterclasses are full-day, 09:30 - 17:30
-
Monday 30th
09:00-9:30Registration & Coffee
-
Monday 30th
09:30-17:30The 23rd COSAC International Roundtable Security Forum
Masterclass M1
The 2024 edition of the Forum will not be generated by artificial intelligence. Instead, the actual intelligence and experiences of the attending delegates will be focused to analyze and solve (not just admire) current and emerging information security issues, many more political or organizational than technical.
Speaker(s)
John O'Leary
The 8th COSAC Security Architecture Design-Off
Masterclass M2
Returning for a 8th year, this design-off will present a new and engaging set of challenges. In the spirit of hack-a-thons, this competition was born out of a desire to provide a venue for security architects to apply their skills in a safe environment.
Speaker(s)
Jason Kobes
William SchultzFutures Thinking and Cyber: Modelling Emerging Risks
Masterclass M3
For over a decade we have been undergoing digital transformation with rapidly evolving technology changing the way we live and work. That brings great opportunities for organisations but also bring new threats. This in turn brings challenges for budgeting and planning to manage the risk over multiple years. How do we predict investment to allow us to fully address the security challenges we may face to ensure that we are preparing for the future? Often the business or sales-people sit on 'happy island' when considering emerging technology landscapes whilst many security people sit in 'despondency dell'. This workshop will help us to develop the futures literacy needed to be able to plan for different emerging futures.
Speaker(s)
Siân John MBE
Lesley Kipling
Genevieve LiveleyResilience: From Hardware to Humans and Everything in Between V2
Masterclass M4
Building on last year’s success the team decided to upgrade the “ From Hardware to Humans and Everything in Between” course. Resilience is widely considered the antidote to many of the problems that plague cybersecurity. The problem is that resilience definitions vary, and solutions typically fail to address all aspects of resilience, thereby resulting in a significant variety in security profiles of “resilient solutions”.
Speaker(s)
Lynette Hornung
Dr. Connie Justice
Char Sample -
Monday 30th
11:05-11:30Morning Coffee
-
Monday 30th
13:00-14:00Lunch
-
Monday 30th
15:35-16:00Afternoon Tea
-
Monday 30th
18:30-19:00Drinks Reception
-
Monday 30th
19:00Dinner (sponsored by GDB Cyber Security Consulting) & Traditional Irish Music
Tuesday 1st October
-
Tuesday 1st
09:00-09:30Registration & Coffee
-
Tuesday 1st
09:30-10:20Where Do We Test From Here? Building An Evergreen Protected Security Ecosystem
Session 1A
Technical assurance and vulnerability management have been parallel but complementary functions in organisations for a number of years. Technical assurance has included: testing the security of a system including penetration testing, hardware assurance, and cryptographic testing; compliance driven testing including web application testing and PCI/DSS; and now regulatory testing required by schemes such as CBEST, TIBER, and DORA including full threat led red team testing.
Speaker(s)
Siân John MBE
Today’s CISO: Behind Closed Doors or Behind Bars
Session 1B
CISOs have been in the hot seat lately, as evidenced by charges levied by the U.S. Securities and Exchange Commission in October 2023 against Solarwinds and CISO Tim Brown for “fraud and internal control failures relating to allegedly known cybersecurity risks and vulnerabilities”, in that he overstated the cybersecurity practices and understated or failed to disclose known risks.
Speaker(s)
Todd Fitzgerald
Help! Business Requirements During the Energy Transition
Session 1S
Just a normal day for the security architects at a DSO (Distribution System Operator) being in the midst of the Energy Transition Race.
Time for an Enterprise Security Architecture upgrade.
The journey starts on the contextual layer of the Business, right?Speaker(s)
Raymond van Dijk
Rob Epskamp -
Tuesday 1st
10:25-11:15Turtles All The Way Down
Session 2A
System hardening plays a pivotal role in bolstering cybersecurity defenses, and the adoption of immutable operating systems coupled with containerization technologies offers a promising approach for organizations requiring flexible solutions, which can scale with the enterprise. This presentation delves into the benefits and challenges associated with utilizing an immutable operating system with multiple independent containers, while also examining the distinctions between various containerization technologies including separation kernel technologies, virtual machines, Docker containers, and Kubernetes containers.Speaker(s)
Rob Hale
A Clockwork CISO
Session 2B
In January of 2015 a qualified academic was appointed as the Finance Minister of Greece with a mandate to renegotiate a disastrous programme that had sent the deficit of Greece further into the red. Upon his second meeting with the “troika” (decision group) he was told by one of the powerbrokers of the Eurozone “Elections cannot be allowed to change an economic programme of a member state!”.
Speaker(s)
Steven Kintakas
Building Cloud Architectures Top-Down: Aligning with Business Motivations
Session 2S
While major cloud providers offer comprehensive reference architectures for implementing functional technical structures such as landing zones, these models often lack direct alignment with core business motivations. This misalignment frequently results in architectures developed from the bottom up, focusing on technical specifications rather than strategic business outcomes.Speaker(s)
Rob Campbell
-
Tuesday 1st
11:15-11:35Morning Coffee
-
Tuesday 1st
11:35-12:25Laying The Groundwork for Quantum Resilience
Session 3A
Quantum Computing is going to be the next disruptor that has a potential of turning security upside-down. I like to draw a parallel with AI and ML, that were discussed and researched for many years, until a sudden breakthrough that has rapidly accelerated the adoption and resulted in disruption we see today.
Speaker(s)
Anton Tkachov
The New KPI On the Block: Outcome-Driven Metrics
Session 3B
If you’ve been keeping up, the latest buzz in the IT and cybersecurity world is the adoption of Outcome-Driven Metrics (ODMs). These metrics aim to measure the effectiveness of specific investments in a way that bridges the communication gap with the boardroom. Their purpose is to enable stakeholders to directly link cybersecurity investments to the levels of protection delivered. Importantly, ODMs are designed to be easily explainable to non-IT executives, using clear and simple language.
Speaker(s)
Karel Koster
The Information Security Program Framework – What You Didn’t Know You Needed
Seesion 3S
Now that your SASBA security architecture is effectively managing and governing the risks to your organization and enhancing the business value, what does it actually look like? Is it something that anyone can easily recognize and understand their responsibilities in relation to what has been implemented or is it operating “under the covers” and is assumed to be mostly technology? Your SABSA security architecture is now operating as your Information Security Program and you need something to “glue” all the various artifacts, processes and responsibilities together into a framework that you can see and easily manage.
Speaker(s)
Glen Bruce
-
Tuesday 1st
12:30-13:20The Path from Offsite Backups to Real Resilience (via COSAC)
Session 4A
“Do you have offsite backups?”
I’d answered this due diligence question many times before, always with the same answer – encrypted backups, on tape, stored offsite, in a dedicated third-party storage facility. But when I saw it last year, I realised this answer and even the question were out of date. These days almost everything we do is offsite with a major cloud provider.Speaker(s)
Gordon Jenkins
Annual Reports: Security by Obscurity on Steroids
Seesion 4B
According to the Dutch Corporate Governance Code, Supervisory Boards should take care to consider the impact of new technologies and cybersecurity on their long-term value creation strategy, and include cybersecurity, supply chain dependencies and data protection in their risk management.
Speaker(s)
Esther Schagen-van Luit
The Impact of Cyber Trends on Security Architecture into 2025
Session 4S
In the fast-paced world CxOs are generally seeing their cyber security position improving in their organisations, but continue to face considerable challenges. A number do not see that increasing the security technology foot-print in their business as the answer, and staff attrition, and rapid adoption of the cloud continue to cause great concern and uncertainty.
Speaker(s)
Jon Cassam
Sophia Mexi-Jones -
Tuesday 1st
13:20-1400Lunch
-
Tuesday 1st
14:00-14:50From Compliance Management Towards Risk Management
Session 5A
A case study of the Dutch Government
The legislation and regulations for the use of Cloud applications for the Dutch Government have changed significantly in recent years. While in the past it was not done to store or process data in the cloud, the current policy is based on Cloud for certain confidential data, as long it is done in a secure manner. One of the conditions set is that a targeted risk assessment takes place and the correct measures are taken to protect the data.Speaker(s)
Edwin Vos
Cyber Misfits and the SABSA Founders Bursary
Session 5B
Recipients of the Bursary award share their personal experiences embarking into their cyber journey and how the Bursary helped shape their career transition and welcome them into a global community.
Sharing the love. In 2020, Ghariba Bourhidane and Clara Grillet started career transitioning in cybersecurity by following courses. In 2022, their cyber career go deeper and was boosted by receiving the first ever SABSA Founders Bursary award.
Sharing the love. In 2020, Ghariba Bourhidane and Clara Grillet started career transitioning in cybersecurity by following courses.Speaker(s)
Ghariba Bourhidane
Clara GrilletReimagining A Robust Supply Chain Security Architecture Leveraging SABSA
Session 5S
Global supply chains are undergoing massive strains in 2024 due to geopolitical conflicts, rapid technological evolution and regulatory changes that pose challenges to organizations irrespective of the industries they operate in. The extended supply chain for hardware suppliers and service providers spans several countries and continents while the sprawl of software components and open-source projects further increase the sophisticated nature of supply chain attacks.
Speaker(s)
Pradeep Sekar
-
Tuesday 1st
14:55–15:45Empowering Colleagues, Securing Success
Session 6A
Admiral Group Plc is a UK-based insurance group that provides a range of insurance products and financial services to over 9 million customers worldwide. In 2018, Admiral embarked on its cloud journey to achieve its strategic vision of becoming a data-driven organisation and leveraging its customer base and data for a competitive advantage. In this talk, I will share how we built, secured, and scaled our capabilities, and discuss the challenges we faced,
Speaker(s)
James Chinn
How to Nurture Effective Security Teams While Tapping into Diverse Talent Pipelines
Session 6B
This presentation aims to demonstrate the benefits of onboarding diverse profiles to security teams. It is part of a continuous effort to formulate a framework which helps security teams perform better while optimising diverse skill sets already present in the organisation. This presentation will provide proof-of-concept on how an internal talent pipeline has given professional growth opportunities to staff with the relevant transferable skills while also making the security teams more effective.
Speaker(s)
Rosanna Kurrer
Modelling Uncertainty and Building Cyber Resilience
Session 6S
The ever increasing reliance on technology has drastically shifted how organisations function. The interconnectedness and convergence of the digital solutions, together with the business opportunities they bring, increase the number of critical failure points. The latter explains why regulators, across the globe, have been particularly active in this topic and consequently resilience has become the latest global hot topic in many sectors.
Speaker(s)
Dimitrios Delivasilis
-
Tuesday 1st
15:45-16:05Afternoon Tea
-
Tuesday 1st
16:05–16:55True Threat Intelligence – What You REALLY Want To know
Session 7A
In the complex field of cybersecurity, the term "threat intelligence" often becomes a catch-all, encompassing everything from basic incident reports to in-depth vulnerability analyses. My presentation, "True Threat Intelligence - What You REALLY Want to Know," aims to clarify this ambiguity by distinguishing the various layers of what is generally classified under threat intelligence. More critically, it zeroes in on the essence of what constitutes "true threat intelligence"—a nuanced, actionable insight that goes far beyond the surface-level accumulation of data.
Speaker(s)
Mark Rasch
The Cybersecurity Alchemist
Session 7B
Alchemy: the art of purifying the impure by imitating and accelerating the operations of nature in order to perfect matter. How do alchemists transform base metals into gold? The metaphorical aim of the alchemist is the purification of the soul, the progressive metamorphoses of the spirit. The alchemist's journey in Paulo Coelho's book is transmutation: elevating the imperfect to perfection. The main character of the book travels and lives according to the different cultures and traditions of each visited country. He eventually returns to his starting point but completely changed, grows up, conscious and strong. A real human firewall!
Speaker(s)
Ghariba Bourhidane
You Can Fix Stupid: Automating to Reduce Risk
Session 7S
In a world where cyber threats are evolving at an alarming rate, organizations are expected to do more with less, employees are given ever increasing workloads, and human error remains a significant contributor to data errors and security breaches, automation emerges as a crucial solution.
Speaker(s)
Ashling Lupiani
-
Tuesday 1st
17:00–17:50Revolutionising Threat Modelling with Emerging Technologies
session 8A
In the traditional landscape, threat modelling has been a predominantly manual and meticulous process, demanding substantial expertise and time. However, the advent of cutting-edge technologies is set to transform this scenario radically.
Speaker(s)
Jon Cassam
Sophia Mexi-JonesIt Takes A Village: Raising Cybersecurity Capability Across the Enterprise
Session 8B
The shortage of cyber security skills is well known and this is only getting worse. So what can we do about it?
Speaker(s)
Paul Dorey
Achieving life Goals Without Joining A Cult or Losing Friends
Session 8S
How security architecture can help you keep your new year’s resolutions and other lifestyle objectives.Speaker(s)
Clara Grillet
-
Tuesday 1st
17:50-18:10Refreshments
-
Tuesday 1st
18:10–19:00The Smart Practitioner’s Guide To getting Stuff Done
Plenary 9P
DOING WHAT YOU CAN WITH WHAT YOU’VE GOT WHERE YOU ARE
This paper proposes an unconventional yet highly effective approach to helping information security teams deliver better security outcomes by blending the organisational, technical, and process reality that surrounds them with human-centric methodologies, including design thinking and negotiation techniques drawn from the practice of conflict resolution.Speaker(s)
Anne Leslie
-
Tuesday 1st
19:15-1945Drinks Reception
-
Tuesday 1st
19:45COSAC 2024 Gala Dinner (sponsored by The SABSA Institute) & Race Night
Wednesday 2nd October
-
Wednesday 2nd
09:00-09:30Registration & Coffee
-
Wednesday 2nd
09:30-10:20NYETwork Warfare: the End of Civilisation As We Know It
Session 10A
“Everything was destroyed, and few out of many returned home.” - Thucydides
Two years ago, we discussed whether the Russian offensive included all-out cyber, or if the combatants were husbanding their resources. Last year, we noted that 50-year-old tanks and munitions work well in battle, whereas cyber weapons have a shelf life closer to milk than to wine.Speaker(s)
G. Mark Hardy
Bridging The Gap: Fostering Collaboration Between Security & Technical Teams
Session 10B
Do you suffer from a team that can't seem to talk to each other? Can you cut the air with a knife when entering your security meetings? Do people audibly sigh whenever you mention raising a ticket or inquire about its status? If so, then this session is for you.
Speaker(s)
Dan Schoemaker
Building An Adaptive Security Architecture
Session 10S
The presentation addresses 3 trends currently challenging the cybersecurity operating model.
• Customer expectations are shifting - Digital natives think in terms of customer journeys, and they want safe but low-friction experiences along the way.
• Threats are evolving - There are now new ways to exploit human nature and decision making, using technologies like AI. Lastly,
• Regulations are fragmenting - Countries recognise the value of data and are taking a stronger, more localised, position on how to protect it.Speaker(s)
Steven Bradley
Ben Stephen Woods -
Wednesday 2nd
10:25-11:15Towards Secure AI
Session 11A
The hype cycle continues to thrive as illustrated by recent press coverage and political attention regarding the “existential threat” posed by AI, particularly LLMs and generative AI. Inevitably some people are asking how do we secure AI? This session considers AI-related risks and their potential evolution. To address these risks, we need to consider what governance and security mean in an AI context.
Speaker(s)
Hugh Boyes
If Socrates Was A CISO or Worse..Your Business Stakeholder
Session 11B
The nature of the cyber security risk is both complex and broad, and present in almost any part of digital operations making it a top non-financial risk. On a daily basis stakeholders are being faced with decisions on how to proceed with the implementation of the business strategy whilst providing a commensurate level of protection against ever evolving cyber threats and ensuring critical products and services operate within the desired risk thresholds.
Speaker(s)
Dimitrios Delivasilis
MZ OmarjeeEmbedding Architecture to Keep Up With the Pace of Change
Session 11S
The IT organisation around our team is making key structural and governance changes, including re-aligning to business value stream structures, migrating from waterfall processes to Agile change delivery, and introducing a new control framework. And these are just some examples.
Speaker(s)
Gordon Jenkins
-
Wednesday 2nd
11:15-11:35Morning Coffee
-
Wednesday 2nd
11:35–12:25It Is Not A Duck: How OT Differs from IT
Session 12A
The idea for this came to me today (March 21st) after having visited a dutch conference. It has been lingering in the back of my mind for some time but having seen the call for speakers in my Linkedin-feed this morning I decided to put it forward. On my way home I even came up with a title.
Speaker(s)
Jan van Kemenade
Recovering Personal Privacy Through Web Decentralisation
Session 12B
Outside China, Apple and Google control more than 95 percent of app store market share with the Apple App Store holding nearly 2 million and Google’s Play store holding nearly 3.5 million. The impact of this proliferation of apps and their everyday routine use, together with other web interactions, means that users’ personal data is spread widely on suppliers’ servers throughout the Internet.
Speaker(s)
Andy Clark
The Grammar of Attributes, Requirements & ESA
Session 12S
‘Words mean things’, as Drill Sergeant once enthusiastically bellowed at me after failing to communicate effectively. I came to understand this was because of the lethal consequences of the profession he was training me for.
Speaker(s)
Kirk Nicholls
-
Wednesday 2nd
12:30– 3:20Contextual Trust: Trust In the Untrustable World of Connected and Autonomous Vehicles
Session 13A
The Connected and Autonomous Vehicle (CAV) sector is rapidly evolving, presenting unparalleled opportunities for integration and third-party data utilisation. This evolution, however, introduces significant challenges, particularly regarding the integrity and reliability of vehicle-generated data. The stakes are high: compromised data could lead to accidents, traffic disruptions, hinder emergency services, and more. This session delves into the technologies underpinning CAVs, upcoming enhancements, potential threats, and necessary controls. It will explore the intricate web of supply chain relationships, the data exchanged between stakeholders, and how these factors contribute to the sector's security posture.
Speaker(s)
Rob Campbell
Telegram & Discord, A Wretched Hive of Scum and Villainy
session 13B
In the sprawling digital landscape, platforms like Telegram and Discord have become pivotal arenas for threat actor communications, offering a blend of anonymity and accessibility that is highly attractive to the cybercriminal underworld. This session, entitled "Telegram and Discord - A Wretched Hive of Scum and Villainy," will peel back the layers of these digital ecosystems to reveal the dynamics of threat actor communities.
Speaker(s)
Mark Rasch
Seamlessly Traversing Shifting Boundaries
Session 13S
The ability to cross boundaries is one of the most natural human behaviours, in fact, it is so natural and normal that we don’t even give it a second thought.
Speaker(s)
Jaco Jacobs
-
Wednesday 2nd
13:20-14:00Lunch
-
Wednesday 2nd
14:00–14:50Computer Crime Prosecutions As A tool To Stifle Dissent
Session 14A
In an era where digital information flows freely, the boundary between public interest journalism and computer hacking has become increasingly blurred. This session will delve into the controversial prosecution of Timothy Burke, a journalist from Tampa, Florida, who faced legal repercussions for his investigative work exposing hypocrisy in Fox News' broadcasts, including interviews between Tucker Carlson and Kanye West. His case serves as a stark example of how governments and corporations are leveraging computer crime laws to suppress dissent and penalize whistleblowers and journalists.
Speaker(s)
Mark Rasch
What Are You Doing, Dave?
Session 14B
As organizations increasingly rely on technology to conduct their operations, the intersection of artificial intelligence (AI) and cybersecurity emerges as both a promising avenue for defense and a looming threat.
Speaker(s)
Rob Hale
Previewing Security in ArchiMate 4.0
Session 14S
Since its first publication as a standard in 2009, ArchiMate® has become the most widely adopted notation for describing enterprise architecture but, through to the current version 3.2, support for the security perspective has been informal and under-developed.
Speaker(s)
Steven Bradley
-
Wednesday 2nd
14:55–15:45Cybercrime – Does it Pay?
Session 15A
Our goal as security practitioners is to stop bad things from happening to the organization we have chosen to protect. When this happens and law enforcement is able to finally catch the bad actors, what actually happens?
Speaker(s)
John Ceraolo
Security Awareness Training for Generative AI
Session 15B
Generative AI is remarkable for its ability to utilize extensive data to answer complex questions. However, in a business context, not all data should be accessible to everyone.
Speaker(s)
Karel Koster
John O'LearyUsing the SABSA Enhanced NIST Cybersecurity Framework
Session 15S
What is the best way to leverage the NIST Cybersecurity Framework (CSF) 2.0 when implementing or updating a SABSA developed security architecture? The NIST CSF 2.0 is a significant upgrade to the de-facto global framework for managing cybersecurity threats but it still lacks several of the essential elements for a robust cybersecurity program.
Speaker(s)
Glen Bruce
-
Wednesday 2nd
15:45-16:05Afternoon Tea
-
Wednesday 2nd
16:05 – 16:5510 years, 10 cases, 10 Lessons Learned
Session 16A
In this highly graphical session, I will present a mostly anonymised journey across the threat landscape that businesses have had to endure over the last decade.
Speaker(s)
Stephen Bowes
The Key Challenges of Adapting AI Governance Into Europe’s Data Protection Framework
Session 16B
In the digital age, the proliferation of Artificial Intelligence (AI) technologies has transformed the way we interact, work, and conduct business. From personalized recommendations to autonomous decision-making systems, AI has permeated various facets of society, promising efficiency, innovation, and convenience. However, with these advancements come concerns regarding privacy, data protection, and ethical use of AI.
Speaker(s)
Valerie Lyons
Dynamic Business Security Architecture
Session 16S
In the evolving landscape of business security, the integration of MITRE ATT&CK® framework plays a pivotal role in enhancing organizational resilience against cyber threats. Our approach leverages the MITRE ATT&CK® from understanding adversary motives to the implementation of mitigation strategies and ensuring robust protection mechanisms.
Speaker(s)
Mikko Larikka
-
Wednesday 2nd
16:55-17:15Refreshments
-
Wednesday 2nd
17:15–18:05Anthony Sale Memorial Session - The Spy in the Coffee Machine
Plenary 17P
Overtly Tony Sale was known for his outstanding engineering talents which he used to rebuild the WW2 code breaking Colossus and create the National Museum of Computing at Bletchley Park. However, during the Cold War Tony toiled secretly supporting MI5’s efforts to identify covert radio transmissions in the UK, signals which were used by hostile intelligence services working to undermine the UK Government and its allies.
Speaker(s)
Andy Clark
-
Wednesday 2nd
18:10–19:00The COSAC Rump Session
Plenary 18P
The COSAC “rump” has for many years been a hugely popular plenary session at COSAC. The Rump is an informal rapid-fire session in which participants give very short presentations on recent results, work in progress, and any other topic of interest to the COSAC community. Presentations may be purely technical, entirely management oriented in nature, or of any combination of approaches or perspectives.
Speaker(s)
David Lynas
-
Wednesday 2nd
19:15–19:45Drinks Reception (sponsored by David Lynas Consulting)
-
Wednesday 2nd
19:45Dinner (sponsored by David Lynas Consulting) & COSAC Prize Night
Thursday 3rd October
-
Thursday 3rd
09:00-09:30Registration & Coffee
-
Thursday 3rd
09:30-1230COSAC Workshops are half-day, 09:30 - 12:30 & 13:30 - 16:30
-
Thursday 3rd
09:30-1230The COSAC Risk Workshop Series: Risk Aggregation & Compound Risk
Workshop W1
The purpose of the risk workshop is to explore the hard parts of understanding risk. We have previously conducted workshops in Ireland and Australia on how to understand and model risk, how to explain and display risk to stakeholders, and how to think like our adversaries to identify threats that we would otherwise miss.
Speaker(s)
Jason Kobes
William SchultzThe 2nd COSAC Lab
Workshop W2
This year, I propose the second edition of the COSAC LAB.
For the year 2024, the lab will use a new approach based on the lessons learned from the first edition performed in 2023.Speaker(s)
Ghariba Bourhidane
Incident Response Exercise Design Workshop
Workshop W3
Do you want to learn to build a functional incident response exercise?
Perhaps you’d like to have clear and measurable exercise goals and performance reporting. The kind that will endear you to your training team and produce clear and actionable reporting. Good news, we can do that together. After all it’s dangerous to go alone.Speaker(s)
Kirk Nicholls
So You Want to Be a CISO
Workshop W4
Building on a workshop at COSAC APAC – a workshop from the viewpoint of two CISO’s from different continents.
Speaker(s)
Harley Aw
Kathleen Mullin -
Thursday 3rd
11:15-11:35Morning Coffee
-
Thursday 3rd
12:30-13:30Lunch
-
Thursday 3rd
13:30-16:30Security for the Gobsmacked Human
Workshop W5
They’ve had enough. They just get used to one environment and some SOB changes it. And we security geeks want to add change to the change. No wonder they growl at us. Complex, ever-evolving work environments turn communities of competent, veteran users into fumbling rookies who make new-guy mistakes, some of which impact security.Speaker(s)
John O'Leary
Digital Transformation Masterclass
Workshop W6
An intriguing session that will attempt to re-orient the mindset required to undergo a Digital Transformation. In an unusual manner (not about just technology or apps) session will provide real world insight and experiences
Speaker(s)
MZ Omarjee
Beyond the Script: Using Improv to Enhance Tabletop Exercises
Workshop W7
Cybersecurity is known as the department of “NO” while SABSA uses business opportunity risk to transform it to “YES”. This session leverages improvisational skills to increase the engagement, imagination, and impact of tabletop exercises.
Speaker(s)
Ashling Lupiani
Kathleen MullinThis is the Way! Using SABSA to Transform a Global Managed Security Services Provider
Workshop W8
In late 2022 I was assigned to lead a team mandated with creating and implementing a strategy to transform the Managed Security Services business of a global organization that provides end-to-end security services. This organization operates more than twenty delivery centres globally and has grown, organically and through acquisition, to more than 3000 delivery centre employees.
Speaker(s)
Jaco Jacobs
-
Thursday 3rd
16:30-16:45Afternoon Tea
-
Thursday 3rd
16:45Conference Close - COSAC Chairman's Closing Remarks
COSAC
Patrons
A completely new COSAC experience pushing the boundaries of cybersecurity further than ever before. Smart people, inspiring guest speakers and a ton of passion. Become a COSAC Patron and gain access like no other.
Become a patronContact
Get in contact with us by email, phone or just stay social and connect with us on LinkedIn & Twitter