Sunday 29th September
- 
                  Sunday 29th
 15:00-16:00Delegate Registration 
- 
                  Sunday 29th
 16:30-18:30The SABSA Institute ForumThe SABSA Institute (TSI) and the TSI Liaison Group (LG) update. The TSI Forum includes a question-and-answer session and an opportunity to meet and interact with The SABSA Institute Board of Trustees (Directors) and LG members. Speaker(s)Gareth Watters 
 Glen Bruce
 Kate Mullin
 Kirk Nicholls
- 
                  Sunday 29th
 19:30-20:00Delegate Registration & Drinks Reception - sponsored by Killashee Hotel 
- 
                  Sunday 29th
 20:00 onwardsCOSAC 2024 Welcome Dinner 
Monday 30th September
- 
                  Monday 30th
 09:30-17:30COSAC Masterclasses are full-day, 09:30 - 17:30 
- 
                  Monday 30th
 09:00-9:30Registration & Coffee 
- 
                  Monday 30th
 09:30-17:30The 23rd COSAC International Roundtable Security ForumMasterclass M1The 2024 edition of the Forum will not be generated by artificial intelligence. Instead, the actual intelligence and experiences of the attending delegates will be focused to analyze and solve (not just admire) current and emerging information security issues, many more political or organizational than technical. Speaker(s)The 8th COSAC Security Architecture Design-OffMasterclass M2Returning for a 8th year, this design-off will present a new and engaging set of challenges. In the spirit of hack-a-thons, this competition was born out of a desire to provide a venue for security architects to apply their skills in a safe environment. Speaker(s)Futures Thinking and Cyber: Modelling Emerging RisksMasterclass M3For over a decade we have been undergoing digital transformation with rapidly evolving technology changing the way we live and work. That brings great opportunities for organisations but also bring new threats. This in turn brings challenges for budgeting and planning to manage the risk over multiple years. How do we predict investment to allow us to fully address the security challenges we may face to ensure that we are preparing for the future? Often the business or sales-people sit on 'happy island' when considering emerging technology landscapes whilst many security people sit in 'despondency dell'. This workshop will help us to develop the futures literacy needed to be able to plan for different emerging futures. Speaker(s)Resilience: From Hardware to Humans and Everything in Between V2Masterclass M4Building on last year’s success the team decided to upgrade the “ From Hardware to Humans and Everything in Between” course. Resilience is widely considered the antidote to many of the problems that plague cybersecurity. The problem is that resilience definitions vary, and solutions typically fail to address all aspects of resilience, thereby resulting in a significant variety in security profiles of “resilient solutions”. Speaker(s)
- 
        
- 
                  Monday 30th
 11:05-11:30Morning Coffee 
- 
                  Monday 30th
 13:00-14:00Lunch 
- 
                  Monday 30th
 15:35-16:00Afternoon Tea 
- 
                  Monday 30th
 18:30-19:00Drinks Reception 
- 
                  Monday 30th
 19:00Dinner (sponsored by GDB Cyber Security Consulting) & Traditional Irish Music 
Tuesday 1st October
- 
                  Tuesday 1st
 09:00-09:30Registration & Coffee 
- 
                  Tuesday 1st
 09:30-10:20Where Do We Test From Here? Building An Evergreen Protected Security EcosystemSession 1ATechnical assurance and vulnerability management have been parallel but complementary functions in organisations for a number of years. Technical assurance has included: testing the security of a system including penetration testing, hardware assurance, and cryptographic testing; compliance driven testing including web application testing and PCI/DSS; and now regulatory testing required by schemes such as CBEST, TIBER, and DORA including full threat led red team testing. Speaker(s)Today’s CISO: Behind Closed Doors or Behind BarsSession 1BCISOs have been in the hot seat lately, as evidenced by charges levied by the U.S. Securities and Exchange Commission in October 2023 against Solarwinds and CISO Tim Brown for “fraud and internal control failures relating to allegedly known cybersecurity risks and vulnerabilities”, in that he overstated the cybersecurity practices and understated or failed to disclose known risks. Speaker(s)Help! Business Requirements During the Energy TransitionSession 1SJust a normal day for the security architects at a DSO (Distribution System Operator) being in the midst of the Energy Transition Race. 
 
 Time for an Enterprise Security Architecture upgrade.
 
 The journey starts on the contextual layer of the Business, right?Speaker(s)
- 
        
- 
                  Tuesday 1st
 10:25-11:15Turtles All The Way DownSession 2A
 System hardening plays a pivotal role in bolstering cybersecurity defenses, and the adoption of immutable operating systems coupled with containerization technologies offers a promising approach for organizations requiring flexible solutions, which can scale with the enterprise. This presentation delves into the benefits and challenges associated with utilizing an immutable operating system with multiple independent containers, while also examining the distinctions between various containerization technologies including separation kernel technologies, virtual machines, Docker containers, and Kubernetes containers.Speaker(s)A Clockwork CISOSession 2BIn January of 2015 a qualified academic was appointed as the Finance Minister of Greece with a mandate to renegotiate a disastrous programme that had sent the deficit of Greece further into the red. Upon his second meeting with the “troika” (decision group) he was told by one of the powerbrokers of the Eurozone “Elections cannot be allowed to change an economic programme of a member state!”. Speaker(s)Building Cloud Architectures Top-Down: Aligning with Business MotivationsSession 2S
 While major cloud providers offer comprehensive reference architectures for implementing functional technical structures such as landing zones, these models often lack direct alignment with core business motivations. This misalignment frequently results in architectures developed from the bottom up, focusing on technical specifications rather than strategic business outcomes.Speaker(s)
- 
        
- 
                  Tuesday 1st
 11:15-11:35Morning Coffee 
- 
                  Tuesday 1st
 11:35-12:25Laying The Groundwork for Quantum ResilienceSession 3AQuantum Computing is going to be the next disruptor that has a potential of turning security upside-down. I like to draw a parallel with AI and ML, that were discussed and researched for many years, until a sudden breakthrough that has rapidly accelerated the adoption and resulted in disruption we see today. Speaker(s)The New KPI On the Block: Outcome-Driven MetricsSession 3BIf you’ve been keeping up, the latest buzz in the IT and cybersecurity world is the adoption of Outcome-Driven Metrics (ODMs). These metrics aim to measure the effectiveness of specific investments in a way that bridges the communication gap with the boardroom. Their purpose is to enable stakeholders to directly link cybersecurity investments to the levels of protection delivered. Importantly, ODMs are designed to be easily explainable to non-IT executives, using clear and simple language. Speaker(s)The Information Security Program Framework – What You Didn’t Know You NeededSeesion 3SNow that your SASBA security architecture is effectively managing and governing the risks to your organization and enhancing the business value, what does it actually look like? Is it something that anyone can easily recognize and understand their responsibilities in relation to what has been implemented or is it operating “under the covers” and is assumed to be mostly technology? Your SABSA security architecture is now operating as your Information Security Program and you need something to “glue” all the various artifacts, processes and responsibilities together into a framework that you can see and easily manage. Speaker(s)
- 
        
- 
                  Tuesday 1st
 12:30-13:20The Path from Offsite Backups to Real Resilience (via COSAC)Session 4A“Do you have offsite backups?” 
 
 I’d answered this due diligence question many times before, always with the same answer – encrypted backups, on tape, stored offsite, in a dedicated third-party storage facility. But when I saw it last year, I realised this answer and even the question were out of date. These days almost everything we do is offsite with a major cloud provider.Speaker(s)Annual Reports: Security by Obscurity on SteroidsSeesion 4BAccording to the Dutch Corporate Governance Code, Supervisory Boards should take care to consider the impact of new technologies and cybersecurity on their long-term value creation strategy, and include cybersecurity, supply chain dependencies and data protection in their risk management. Speaker(s)The Impact of Cyber Trends on Security Architecture into 2025Session 4SIn the fast-paced world CxOs are generally seeing their cyber security position improving in their organisations, but continue to face considerable challenges. A number do not see that increasing the security technology foot-print in their business as the answer, and staff attrition, and rapid adoption of the cloud continue to cause great concern and uncertainty. Speaker(s)
- 
        
- 
                  Tuesday 1st
 13:20-1400Lunch 
- 
                  Tuesday 1st
 14:00-14:50From Compliance Management Towards Risk ManagementSession 5AA case study of the Dutch Government 
 
 The legislation and regulations for the use of Cloud applications for the Dutch Government have changed significantly in recent years. While in the past it was not done to store or process data in the cloud, the current policy is based on Cloud for certain confidential data, as long it is done in a secure manner. One of the conditions set is that a targeted risk assessment takes place and the correct measures are taken to protect the data.Speaker(s)Cyber Misfits and the SABSA Founders BursarySession 5BRecipients of the Bursary award share their personal experiences embarking into their cyber journey and how the Bursary helped shape their career transition and welcome them into a global community. 
 
 Sharing the love. In 2020, Ghariba Bourhidane and Clara Grillet started career transitioning in cybersecurity by following courses. In 2022, their cyber career go deeper and was boosted by receiving the first ever SABSA Founders Bursary award.
 
 Sharing the love. In 2020, Ghariba Bourhidane and Clara Grillet started career transitioning in cybersecurity by following courses.Speaker(s)Reimagining A Robust Supply Chain Security Architecture Leveraging SABSASession 5SGlobal supply chains are undergoing massive strains in 2024 due to geopolitical conflicts, rapid technological evolution and regulatory changes that pose challenges to organizations irrespective of the industries they operate in. The extended supply chain for hardware suppliers and service providers spans several countries and continents while the sprawl of software components and open-source projects further increase the sophisticated nature of supply chain attacks. Speaker(s)
- 
        
- 
                  Tuesday 1st
 14:55–15:45Empowering Colleagues, Securing SuccessSession 6AAdmiral Group Plc is a UK-based insurance group that provides a range of insurance products and financial services to over 9 million customers worldwide. In 2018, Admiral embarked on its cloud journey to achieve its strategic vision of becoming a data-driven organisation and leveraging its customer base and data for a competitive advantage. In this talk, I will share how we built, secured, and scaled our capabilities, and discuss the challenges we faced, Speaker(s)How to Nurture Effective Security Teams While Tapping into Diverse Talent PipelinesSession 6BThis presentation aims to demonstrate the benefits of onboarding diverse profiles to security teams. It is part of a continuous effort to formulate a framework which helps security teams perform better while optimising diverse skill sets already present in the organisation. This presentation will provide proof-of-concept on how an internal talent pipeline has given professional growth opportunities to staff with the relevant transferable skills while also making the security teams more effective. Speaker(s)Modelling Uncertainty and Building Cyber ResilienceSession 6SThe ever increasing reliance on technology has drastically shifted how organisations function. The interconnectedness and convergence of the digital solutions, together with the business opportunities they bring, increase the number of critical failure points. The latter explains why regulators, across the globe, have been particularly active in this topic and consequently resilience has become the latest global hot topic in many sectors. Speaker(s)
- 
        
- 
                  Tuesday 1st
 15:45-16:05Afternoon Tea 
- 
                  Tuesday 1st
 16:05–16:55True Threat Intelligence – What You REALLY Want To knowSession 7AIn the complex field of cybersecurity, the term "threat intelligence" often becomes a catch-all, encompassing everything from basic incident reports to in-depth vulnerability analyses. My presentation, "True Threat Intelligence - What You REALLY Want to Know," aims to clarify this ambiguity by distinguishing the various layers of what is generally classified under threat intelligence. More critically, it zeroes in on the essence of what constitutes "true threat intelligence"—a nuanced, actionable insight that goes far beyond the surface-level accumulation of data. Speaker(s)The Cybersecurity AlchemistSession 7BAlchemy: the art of purifying the impure by imitating and accelerating the operations of nature in order to perfect matter. How do alchemists transform base metals into gold? The metaphorical aim of the alchemist is the purification of the soul, the progressive metamorphoses of the spirit. The alchemist's journey in Paulo Coelho's book is transmutation: elevating the imperfect to perfection. The main character of the book travels and lives according to the different cultures and traditions of each visited country. He eventually returns to his starting point but completely changed, grows up, conscious and strong. A real human firewall! Speaker(s)You Can Fix Stupid: Automating to Reduce RiskSession 7SIn a world where cyber threats are evolving at an alarming rate, organizations are expected to do more with less, employees are given ever increasing workloads, and human error remains a significant contributor to data errors and security breaches, automation emerges as a crucial solution. Speaker(s)
- 
        
- 
                  Tuesday 1st
 17:00–17:50Revolutionising Threat Modelling with Emerging Technologiessession 8AIn the traditional landscape, threat modelling has been a predominantly manual and meticulous process, demanding substantial expertise and time. However, the advent of cutting-edge technologies is set to transform this scenario radically. Speaker(s)It Takes A Village: Raising Cybersecurity Capability Across the EnterpriseSession 8BThe shortage of cyber security skills is well known and this is only getting worse. So what can we do about it? Speaker(s)Achieving life Goals Without Joining A Cult or Losing FriendsSession 8SHow security architecture can help you keep your new year’s resolutions and other lifestyle objectives. Speaker(s)
- 
        
- 
                  Tuesday 1st
 17:50-18:10Refreshments 
- 
                  Tuesday 1st
 18:10–19:00The Smart Practitioner’s Guide To getting Stuff DonePlenary 9PDOING WHAT YOU CAN WITH WHAT YOU’VE GOT WHERE YOU ARE 
 
 This paper proposes an unconventional yet highly effective approach to helping information security teams deliver better security outcomes by blending the organisational, technical, and process reality that surrounds them with human-centric methodologies, including design thinking and negotiation techniques drawn from the practice of conflict resolution.Speaker(s)
- 
        
- 
                  Tuesday 1st
 19:15-1945Drinks Reception 
- 
                  Tuesday 1st
 19:45COSAC 2024 Gala Dinner (sponsored by The SABSA Institute) & Race Night 
Wednesday 2nd October
- 
                  Wednesday 2nd
 09:00-09:30Registration & Coffee 
- 
                  Wednesday 2nd
 09:30-10:20NYETwork Warfare: the End of Civilisation As We Know ItSession 10A“Everything was destroyed, and few out of many returned home.” - Thucydides 
 
 Two years ago, we discussed whether the Russian offensive included all-out cyber, or if the combatants were husbanding their resources. Last year, we noted that 50-year-old tanks and munitions work well in battle, whereas cyber weapons have a shelf life closer to milk than to wine.Speaker(s)Bridging The Gap: Fostering Collaboration Between Security & Technical TeamsSession 10BDo you suffer from a team that can't seem to talk to each other? Can you cut the air with a knife when entering your security meetings? Do people audibly sigh whenever you mention raising a ticket or inquire about its status? If so, then this session is for you. Speaker(s)Building An Adaptive Security ArchitectureSession 10SThe presentation addresses 3 trends currently challenging the cybersecurity operating model. 
 
 • Customer expectations are shifting - Digital natives think in terms of customer journeys, and they want safe but low-friction experiences along the way.
 
 • Threats are evolving - There are now new ways to exploit human nature and decision making, using technologies like AI. Lastly,
 
 • Regulations are fragmenting - Countries recognise the value of data and are taking a stronger, more localised, position on how to protect it.Speaker(s)
- 
        
- 
                  Wednesday 2nd
 10:25-11:15Towards Secure AISession 11AThe hype cycle continues to thrive as illustrated by recent press coverage and political attention regarding the “existential threat” posed by AI, particularly LLMs and generative AI. Inevitably some people are asking how do we secure AI? This session considers AI-related risks and their potential evolution. To address these risks, we need to consider what governance and security mean in an AI context. Speaker(s)If Socrates Was A CISO or Worse..Your Business StakeholderSession 11BThe nature of the cyber security risk is both complex and broad, and present in almost any part of digital operations making it a top non-financial risk. On a daily basis stakeholders are being faced with decisions on how to proceed with the implementation of the business strategy whilst providing a commensurate level of protection against ever evolving cyber threats and ensuring critical products and services operate within the desired risk thresholds. Speaker(s)Embedding Architecture to Keep Up With the Pace of ChangeSession 11SThe IT organisation around our team is making key structural and governance changes, including re-aligning to business value stream structures, migrating from waterfall processes to Agile change delivery, and introducing a new control framework. And these are just some examples. Speaker(s)
- 
        
- 
                  Wednesday 2nd
 11:15-11:35Morning Coffee 
- 
                  Wednesday 2nd
 11:35–12:25It Is Not A Duck: How OT Differs from ITSession 12AThe idea for this came to me today (March 21st) after having visited a dutch conference. It has been lingering in the back of my mind for some time but having seen the call for speakers in my Linkedin-feed this morning I decided to put it forward. On my way home I even came up with a title. Speaker(s)Recovering Personal Privacy Through Web DecentralisationSession 12BOutside China, Apple and Google control more than 95 percent of app store market share with the Apple App Store holding nearly 2 million and Google’s Play store holding nearly 3.5 million. The impact of this proliferation of apps and their everyday routine use, together with other web interactions, means that users’ personal data is spread widely on suppliers’ servers throughout the Internet. Speaker(s)The Grammar of Attributes, Requirements & ESASession 12S‘Words mean things’, as Drill Sergeant once enthusiastically bellowed at me after failing to communicate effectively. I came to understand this was because of the lethal consequences of the profession he was training me for. Speaker(s)
- 
        
- 
                  Wednesday 2nd
 12:30– 3:20Contextual Trust: Trust In the Untrustable World of Connected and Autonomous VehiclesSession 13AThe Connected and Autonomous Vehicle (CAV) sector is rapidly evolving, presenting unparalleled opportunities for integration and third-party data utilisation. This evolution, however, introduces significant challenges, particularly regarding the integrity and reliability of vehicle-generated data. The stakes are high: compromised data could lead to accidents, traffic disruptions, hinder emergency services, and more. This session delves into the technologies underpinning CAVs, upcoming enhancements, potential threats, and necessary controls. It will explore the intricate web of supply chain relationships, the data exchanged between stakeholders, and how these factors contribute to the sector's security posture. Speaker(s)Telegram & Discord, A Wretched Hive of Scum and Villainysession 13BIn the sprawling digital landscape, platforms like Telegram and Discord have become pivotal arenas for threat actor communications, offering a blend of anonymity and accessibility that is highly attractive to the cybercriminal underworld. This session, entitled "Telegram and Discord - A Wretched Hive of Scum and Villainy," will peel back the layers of these digital ecosystems to reveal the dynamics of threat actor communities. Speaker(s)Seamlessly Traversing Shifting BoundariesSession 13SThe ability to cross boundaries is one of the most natural human behaviours, in fact, it is so natural and normal that we don’t even give it a second thought. Speaker(s)
- 
        
- 
                  Wednesday 2nd
 13:20-14:00Lunch 
- 
                  Wednesday 2nd
 14:00–14:50Computer Crime Prosecutions As A tool To Stifle DissentSession 14AIn an era where digital information flows freely, the boundary between public interest journalism and computer hacking has become increasingly blurred. This session will delve into the controversial prosecution of Timothy Burke, a journalist from Tampa, Florida, who faced legal repercussions for his investigative work exposing hypocrisy in Fox News' broadcasts, including interviews between Tucker Carlson and Kanye West. His case serves as a stark example of how governments and corporations are leveraging computer crime laws to suppress dissent and penalize whistleblowers and journalists. Speaker(s)What Are You Doing, Dave?Session 14BAs organizations increasingly rely on technology to conduct their operations, the intersection of artificial intelligence (AI) and cybersecurity emerges as both a promising avenue for defense and a looming threat. Speaker(s)Previewing Security in ArchiMate 4.0Session 14SSince its first publication as a standard in 2009, ArchiMate® has become the most widely adopted notation for describing enterprise architecture but, through to the current version 3.2, support for the security perspective has been informal and under-developed. Speaker(s)
- 
        
- 
                  Wednesday 2nd
 14:55–15:45Cybercrime – Does it Pay?Session 15AOur goal as security practitioners is to stop bad things from happening to the organization we have chosen to protect. When this happens and law enforcement is able to finally catch the bad actors, what actually happens? Speaker(s)Security Awareness Training for Generative AISession 15BGenerative AI is remarkable for its ability to utilize extensive data to answer complex questions. However, in a business context, not all data should be accessible to everyone. Speaker(s)Using the SABSA Enhanced NIST Cybersecurity FrameworkSession 15SWhat is the best way to leverage the NIST Cybersecurity Framework (CSF) 2.0 when implementing or updating a SABSA developed security architecture? The NIST CSF 2.0 is a significant upgrade to the de-facto global framework for managing cybersecurity threats but it still lacks several of the essential elements for a robust cybersecurity program. Speaker(s)
- 
        
- 
                  Wednesday 2nd
 15:45-16:05Afternoon Tea 
- 
                  Wednesday 2nd
 16:05 – 16:5510 years, 10 cases, 10 Lessons LearnedSession 16AIn this highly graphical session, I will present a mostly anonymised journey across the threat landscape that businesses have had to endure over the last decade. Speaker(s)The Key Challenges of Adapting AI Governance Into Europe’s Data Protection FrameworkSession 16BIn the digital age, the proliferation of Artificial Intelligence (AI) technologies has transformed the way we interact, work, and conduct business. From personalized recommendations to autonomous decision-making systems, AI has permeated various facets of society, promising efficiency, innovation, and convenience. However, with these advancements come concerns regarding privacy, data protection, and ethical use of AI. Speaker(s)Dynamic Business Security ArchitectureSession 16SIn the evolving landscape of business security, the integration of MITRE ATT&CK® framework plays a pivotal role in enhancing organizational resilience against cyber threats. Our approach leverages the MITRE ATT&CK® from understanding adversary motives to the implementation of mitigation strategies and ensuring robust protection mechanisms. Speaker(s)
- 
        
- 
                  Wednesday 2nd
 16:55-17:15Refreshments 
- 
                  Wednesday 2nd
 17:15–18:05Anthony Sale Memorial Session - The Spy in the Coffee MachinePlenary 17POvertly Tony Sale was known for his outstanding engineering talents which he used to rebuild the WW2 code breaking Colossus and create the National Museum of Computing at Bletchley Park. However, during the Cold War Tony toiled secretly supporting MI5’s efforts to identify covert radio transmissions in the UK, signals which were used by hostile intelligence services working to undermine the UK Government and its allies. Speaker(s)
- 
        
- 
                  Wednesday 2nd
 18:10–19:00The COSAC Rump SessionPlenary 18PThe COSAC “rump” has for many years been a hugely popular plenary session at COSAC. The Rump is an informal rapid-fire session in which participants give very short presentations on recent results, work in progress, and any other topic of interest to the COSAC community. Presentations may be purely technical, entirely management oriented in nature, or of any combination of approaches or perspectives. Speaker(s)
- 
        
- 
                  Wednesday 2nd
 19:15–19:45Drinks Reception (sponsored by David Lynas Consulting) 
- 
                  Wednesday 2nd
 19:45Dinner (sponsored by David Lynas Consulting) & COSAC Prize Night 
Thursday 3rd October
- 
                  Thursday 3rd
 09:00-09:30Registration & Coffee 
- 
                  Thursday 3rd
 09:30-1230COSAC Workshops are half-day, 09:30 - 12:30 & 13:30 - 16:30 
- 
                  Thursday 3rd
 09:30-1230The COSAC Risk Workshop Series: Risk Aggregation & Compound RiskWorkshop W1The purpose of the risk workshop is to explore the hard parts of understanding risk. We have previously conducted workshops in Ireland and Australia on how to understand and model risk, how to explain and display risk to stakeholders, and how to think like our adversaries to identify threats that we would otherwise miss. Speaker(s)The 2nd COSAC LabWorkshop W2
 This year, I propose the second edition of the COSAC LAB.
 
 For the year 2024, the lab will use a new approach based on the lessons learned from the first edition performed in 2023.Speaker(s)Incident Response Exercise Design WorkshopWorkshop W3Do you want to learn to build a functional incident response exercise? 
 
 Perhaps you’d like to have clear and measurable exercise goals and performance reporting. The kind that will endear you to your training team and produce clear and actionable reporting. Good news, we can do that together. After all it’s dangerous to go alone.Speaker(s)So You Want to Be a CISOWorkshop W4Building on a workshop at COSAC APAC – a workshop from the viewpoint of two CISO’s from different continents. Speaker(s)Harley Aw 
 Kathleen Mullin
- 
        
- 
                  Thursday 3rd
 11:15-11:35Morning Coffee 
- 
                  Thursday 3rd
 12:30-13:30Lunch 
- 
                  Thursday 3rd
 13:30-16:30Security for the Gobsmacked HumanWorkshop W5
 They’ve had enough. They just get used to one environment and some SOB changes it. And we security geeks want to add change to the change. No wonder they growl at us. Complex, ever-evolving work environments turn communities of competent, veteran users into fumbling rookies who make new-guy mistakes, some of which impact security.Speaker(s)Digital Transformation MasterclassWorkshop W6An intriguing session that will attempt to re-orient the mindset required to undergo a Digital Transformation. In an unusual manner (not about just technology or apps) session will provide real world insight and experiences Speaker(s)Beyond the Script: Using Improv to Enhance Tabletop ExercisesWorkshop W7Cybersecurity is known as the department of “NO” while SABSA uses business opportunity risk to transform it to “YES”. This session leverages improvisational skills to increase the engagement, imagination, and impact of tabletop exercises. Speaker(s)This is the Way! Using SABSA to Transform a Global Managed Security Services ProviderWorkshop W8In late 2022 I was assigned to lead a team mandated with creating and implementing a strategy to transform the Managed Security Services business of a global organization that provides end-to-end security services. This organization operates more than twenty delivery centres globally and has grown, organically and through acquisition, to more than 3000 delivery centre employees. Speaker(s)
- 
        
- 
                  Thursday 3rd
 16:30-16:45Afternoon Tea 
- 
                  Thursday 3rd
 16:45Conference Close - COSAC Chairman's Closing Remarks 
COSAC
Patrons
      A completely new COSAC experience pushing the boundaries of cybersecurity further than ever before. Smart people, inspiring guest speakers and a ton of passion. Become a COSAC Patron and gain access like no other.
Become a patronContact
Get in contact with us by email, phone or just stay social and connect with us on LinkedIn
