Agenda at a glance


Sunday, 23 September
Afternoon Arrivals and Check In 14:00
Welcome Drinks and Dinner 18:00 - 22:00
Monday, 24 September
Coffee and Breakfast 07:30 - 08:30
Informative Sessions, Panel Discussions and One–to–One Meetings 09:00 - 17:00
Our Headline Sponsor Will Treat You to a Night out in gorgeous Montreux! 18:30 - 22:30
Tuesday, 25 September
Coffee and Breakfast 07:30 - 08:30
Informative Sessions, Case Studies and One–to–One Meetings 09:00 - 16:40
Evening Transfers and Departures from Lausanne or Geneva Airport 17:00



Full Agenda

Sunday, 23rd September

18:30 – 22:00
Afternoon arrivals and check-in
Welcome drinks followed by dinner

Monday, 24th September

07:30 – 08:30
Breakfast and Coffee


09:00 – 17:00
Informative Sessions, Panel Discussions & One–to–One Meetings


KEYNOTE: The Battle of Cajamarca: Past Meets Present
Paul Raines, CISO and Acting Chief Technology Officer, United Nations Development Programme
What can an event that happened almost 500 years ago in an obscure location in South America teach us about cybersecurity? Mr. Raines will present the events of the battle of Cajamarca in 1532 and engage the audience in drawing out the lessons from that battle and how they might be applied to cybersecurity. The past meets the present in this interesting keynote address that marries technology with history.

Security Noncompliance and Unrest
Peter Lidell, Global CISO, Maersk Oil and Gas A/S (Energy Division)
In the past 20 years information security (and risk management) has gone from a “don’t want to have” to a “nice to have” to a “need to have” and after 9/11 and especially the $300+ millions Notpeyta Malware attack, to a “must have”.

• What is underneath that “must have”? Is there a foundation of accountability, collaboration and trust with the business or is it just another compliance scam running amok?
• When businesses say yes to security, do they really mean it?
• Are the right people tasked to make businesses safer and resilient from cyber-crime and vandalism, or are we our own worst enemy?
• Is the word “cyber”, and how much its used, a symptom of incompetence or good security marketing?
• Are we content with the current and future security evolution, and can an evolution accomplice what we have been tasked to do?
• Are we too western in our thinking and approach to security and how to implement it?
• Do you do Yoga..?
Let Peter Lidell, Global CISO from a Fortune 500 company, challenge your thinking. You may or may not agree with his thoughts and ideas, but you will have to think during his session: and you may just look at things differently next time!

The Business of Cyber Risk: Cyber Security and Our Constant Journey of Relevance
This presentation shows how business risk manifests itself into the cyber world, and will highlight how cyber and IT security leaders can demonstrate the business value of an effective cyber and IT security strategy. 

A Cyber security strategy is both dynamic and competitive when it comes to meeting the ever-changing threats from hackers. Each company, industry, and location will have different threat profiles; the security strategy must evolve in a flexible and dynamic way to adapt to the changing threat landscape.

PANEL DISCUSSION: How to Make Choices and What (Not) to do When Facing Budget Constraints

Chair: Thom Langford, CISO, Publicis Group
- Hippolyte Fouque, Cyber Security Account Executive, Darktrace
- Dimitri Chichlo, Senior IT Security Advisor, Union Bancaire Privee
CASE STUDY: Building Security Culture that Sticks

Bjørn Watne, Chief Security Officer, Storebrand
Which key actions should you take to align security culture with the board, with management and throughout your organisation?

Hypotheses versus "The Real World": A case study of actions performed to enhance security culture within the Storebrand Group, and lessons learned along the way.


18:30  22:30
Our headline sponsor will treat you to a night out in picturesque Montreux!

Tuesday, 25th September

07:30 – 08:30
Breakfast and Coffee

09:00 – 17:00
Presentations, Games & One–to–One Meetings

Role-Based Access Control Implementation 
Dimitri Chichlo, Senior IT Security Advisor, Union Bancaire Privee
CASE STUDY: Axel Springer 
Henning Christiansen, CISO, Axel Springer SE  
Can you apply the techniques used by a media industry CISO into your business?
Henning Christiansen shows how Axel Springer SE, a corporation in which half it's 15,000 employees work in independent organisations across Europe, tackles information security. Take onboard Axel Springers strategies on:
• Threat and risk management
• Transparency being King – how this can be achieved
• What you can’t measure, you can’t manage – how to measure and monitor the security
• How Axel Springer addresses the shortage of expertise and resources

THE CISO <<Poker Game>> (TM)

Benjamin Ducos, Global Security & Digital Transformation Executive, AXA

How do Chief Security Executives navigate through increasingly complex and stormy weathers to deliver superior value to their organisations? Those CISOs have clear vision of the leadership factors they want to mobilise to help their organisation compete and win the race. Join us for some fun with CISO Poker and help security executives refine priorities according to business value creation. A lively group session fostering real time conversations and valuable exchanges between peers.

Revisiting your Weakest Link(s): The Future of 3rd Party and Supply Chain Due Diligence 
Jelena Zelenovic Matone, Senior Lead, Information Security, European Stability Mechanism

This presentation will address current risks and challenges and promote tips for securing data across business partners, suppliers, and other third parties. Attendees will learn the steps data owners should assume to secure their supply chains & 3rd parties against risks of cyber-attacks/data breaches, such as:
• Risk assessment
• Legal considerations
• Controls & continuous monitoring
• Exit strategies

Risks and Benefits of Migrating a Security Operations Center to the Cloud
Viktor Polic, CISO, International Labour Organization 
• What are data protection related risks, operational risks, contractual risks and how to mitigate them?
• What are the main benefits, and do they outweigh risks?
• Adapt your information security strategy and program to prepare for migration to the Cloud

PANEL DISCUSSION: The Hidden Costs and Unexpected Consequences of Moving the SOC to the Cloud

Chair: Thom Langford, CISO, Publicis Group

- Viktor Polic, CISO, International Labour Organization

- Muyiwa Olufon, Senior Manager, Global Information security, Adidas

- Pal Goran Stensson, Infrastructure Manager, Operational Security Services, IKEA

- Frank Lange, Principle Security Architect, Anomali


Evening transfers and departures from Lausanne or Geneva airport 


*Agenda and speakers are subject to change.



Anomali 200x110

Darktrace 200x110


InfosecMagazineLogo Main FullColour