CSX Europe 

VIDEO HIGHLIGHTS

CSX 2018 Europe
CSX 2018 Europe Watch Now >>

CSX 2017 Euro Video
CSX 2017 Euro Video Watch Now >>

 

KEYNOTE SPEAKERS

Opening Keynote Speaker

James LyneJames Lyne
Cyber Security Expert, Global Head of Security Research at Sophos
More >>

 

Closing Keynote Speaker

Keren ElazariKeren Elazari
Strategic Cyber Security Analyst, Author & Researcher
More >>

 

Opening Leadership Brief

Chris DimitriadisChris Dimitriadis, Ph.D., CISA, CISM, CRISC
Past chair of ISACA’s Board of Directors and group director of Information Security for INTRALOT
More >>

 

Closing Leadership Brief

Leonard OngLeonard Ong, CISA, CISM, CGEIT, CRISC
ISACA Board Director & Associate Director at MSD International (Singapore)
More >>

 

CONFERENCE REPORT

Review highlights from last year’s CSX Conferences.

Download 2017 Report >>

 

Attend the Cybersecurity Event Designed for You

Be part of a dynamic and collaborative learning event coming
29–31 October—CSX 2018 Europe.

Register Now

CSX 2018 enables you to:

  • Stay on top of the latest cybersecurity trends, further your cyber career, and make new connections with professionals around the world.
  • Join a global conversation with professionals facing the same challenges as you at the nexus—where all things cybersecurity meet.
  • Embrace fresh insights, better understand your enemy and discover solutions that will help you safeguard the future of your organisation.
  • Go from prevention and protection to possibilities that will add to your personal value and enterprise’s competitive advantage.

CSX 2018 Conference Brochure NOW AVAILABLE

Download the 2018 Conference Brochure below.

Interact with attendees from Europe and around the world. Experience unique opportunities to gain hands-on skills and invaluable knowledge in the dynamic fields of cybersecurity and information security. Cybersecurity doesn’t go on holiday and it doesn’t sleep. You need to be aware of the most effective tactics and tools to meet the ever-growing threat. CSX 2018 Europe offers keynote speakers and sessions that dive deep into what you need to know now.

Make plans today to join the thought (and action) leaders in cybersecurity 29-31 October 2018 in London, UK, one of Europe’s major hubs for business, technology and cybersecurity.

This is a great opportunity to amplify your knowledge and earn up to 32 CPE credits! Brought to you by ISACA’s globally respected Cybersecurity Nexus™ (CSX), which is dedicated to helping professionals like you build timely knowledge and effective cyber skills.

Be part of this one-of-a-kind experience:

“If you want to stay up to date on cybersecurity, this is the conference to attend.”
“A melting pot of global security professionals identifying future cyber challenges to address them today.”

Volunteer Opportunities | CSX Europe

Volunteers are still needed for spots at the conference! Sign up here and take advantage of the volunteer discount!

Countdown to
CSX 2018 Europe
10/29/2018

32

CPEHOURS

Earn up to 32 CPE hours by attending this conference.

 

CONFERENCE VENUE

Stay in the Heart of the Conference Action at the
Intercontinental London - The O2

See the Event Destination tab for more information.

 


Follow @ISACANews and join the CSX Europe conversation by using the hashtag #CSXEURO.
Like ISACA on Facebook to stay informed.
Join the ISACA (Official) LinkedIn group and start a discussion about CSX Europe today.



Don't Miss Out!

  • Join your colleagues.
  • Expand your networking opportunities.
  • Build a stronger IT community.
  • Increase your member and vendor contacts.
  • Interact with speakers who provide insight on IT audit and related topics.

Return to the office motivated to contribute to your enterprise's success and immediately apply what you learned.

 


  Thank You to Our 2018 Premium Sponsors!

Adobe

Huntsman Security

Accellion

Esentire

OneTrust

Digital Shadows

One Identity

SAI Global

 

2018 CONFERENCE PROGRAM

As the program is developed, we will continue to add information to this page – check back frequently for updates!

Tracks for 2018

CSX Europe 2018 is ISACA’s industry-leading cyber event for cybersecurity, information security, information systems, business and government professionals. Explore the latest cybersecurity threats, challenges and opportunities facing today’s enterprises at CSX Europe.

New Ideas

Do you have a topic that you think should be offered at this conference? We want to know! Tell us about it by submitting your idea on Twitter using #CSXEuro!

As the program is developed, we will continue to add information to this page – check back frequently for updates!


Workshops

Space will be limited for these workshops, so be sure to reserve your spot and register today!

2-Day Workshops; Pre-Conference (14 CPE)

Saturday, 27 October – Sunday, 28 October 2018

The Cybersecurity Nexus Cyber Hunt is a live competition which pits participants against each other in a race against themselves and the clock to respond to a multipronged attack while concurrently conducting a penetration test against diverse asset sets. Participants will need to leverage capabilities from all cybersecurity domains, Identify, Protect, Detect, Respond, and Recover, in an attempt to outwit and outsmart other competitors and achieve the highest score!

 

 

Opening Keynote Speaker

James LyneThe Next Big Hacking Challenge

James Lyne
Cyber Security Expert, Global Head of Security Research at Sophos

James is a self-professed 'massive geek' and has technical expertise spanning a variety of the security domains from forensics to offensive security. He has worked with many organisations on security strategy, handled a number of severe incidents and is a frequent industry advisor. James is a certified instructor at the SANS Institute and is often a headline presenter at industry conferences.

James firmly believes that one of the biggest challenges we face is… More >>

 

Closing Keynote Speaker

Keren ElazariThe Future Of Cybersecurity – From A Friendly Hacker's Perspective

Keren Elazari
Strategic Cyber Security Analyst, Author & Researcher

Keren Elazari is an internationally acclaimed security researcher, author and strategic analyst, with years of experience in the international cyber security industry. Since 2000, Keren has worked with leading Israeli security firms, government organizations, Big 4 firms, advised Fortune 500 and groundbreaking startup companies, helping global organizations navigate complex cyber security issues. Elazari’s independent research work and writing about emerging security issues has been featured…More >>

 

Tuesday General Session Panel

Culture of Cybersecurity

Based on new research from ISACA and CMMI Institute, this much-needed discussion will examine how—or whether—organizations are incorporating a culture of cybersecurity at every level. What are the most important steps to building a cybersecurity culture? How can you embed cybersecurity awareness at every level? Organizations with strong, robust cyber cultures are risk-aware and focus on building and supporting the capabilities of the people, processes and technologies of their cyber programs, both from the bottom up and from the board of directors down. Get the latest data and guidance on this topic from renowned business and cybersecurity leaders. More >>


CONFERENCE SCHEDULE AT-A-GLANCE


Saturday, 27 October

Time  

8:00 – 17:00

Registration Desk Open

9:00 – 17:00

WS1—Cybersecurity Fundamentals
WS2—CSX Penetration Testing Overview


Sunday, 28 October

Time  

8:00 – 18:30

Registration Desk Open

9:00 – 17:00

WS1—Cybersecurity Fundamentals
WS2—CSX Penetration Testing Overview

17:30 – 18:30

Welcome Reception


Monday, 29 October

Time  

7:30 – 17:15

Registration Desk Open

7:30 – 19:15

Innovation Exchange Open

7:30 – 8:30

Coffee & Tea Service

8:30 – 9:30

Opening General Session
Leadership Brief | Chris Dimitriadis
Keynote Address | James Lyne | The Next Big Hacking Challenge

9:30 – 10:00

30 Minute Morning Networking Break

10:00 – 11:00

111–Cyber Hunt, Session 1
112–Designing a Simple & Effective ISMS
113–Hacking Closed Networks
114–How to Build Valuable CSIRTS/SOC’s with Constrained Budgets

11:00 – 11:15

15 Minute Movement Break

11:15 – 12:15

121–Cyber Hunt, Session 2
122–8 Controls: 85% Reduction in Risk
123–Cyber Resiliency: Up Against the Upcoming & Unknown Threats
124–The Ocean is Full of Phish

12:15 – 13:30

Group Lunch

13:30 – 14:30

131–A Path to Achieving Network Security ZEN
132–Cyber Risk: It’s All About People
133–GDPR Article 28: Operationalising 3rd and 4th Party Vendor Risk Management
134–Cybersecurity as A Critical Business Need in Payments

14:30 – 14:45

15 Minute Movement Break

14:45 – 15:45

141–Five Ways for Securing SD-Wan
142–Cybersecurity Capability & Resilience
143–Threat Intelligence Sharing: Trusted Circles & ISAC’s
144–DevSecOps-Bringing the Security-The Missing Link in Delivering on the Promise of Business Velocity and Quality to DevOps

15:45 – 16:15

30 Minute Networking Break

16:15 – 17:15

151–So Apparently the Blockchain Fixes Everything … Hacking the Blockchain
152–Prepare Against Ransomware
153–Breaches 2013-2018: What Can We Learn?
154–IoT Privacy Maturity Framework & Solutions

17:15 – 19:15

Networking Reception and Certification Exam Top Score Presentation

17:30 – 18:00

SS1—How to Protect your Crown Jewels
SS2—Big Things Have Small Beginnings: How Advanced Cyber Actors Exploit Trivial Network Infrastructure Issues
SS3—Successfully Automating 3rd Party Risk Measurement

18:15 – 18:45

SS4—Adobe’s Open Source CCF Enables Quick Adoption of New Compliance Standards
SS5—Cyber Attack Trends from the Threatscape
SS6—Developing a GDPR-Ready Incident & Breach 72-Hour Action Plan


Tuesday, 30 October

Time  

7:30 – 17:15

Registration Desk Open

7:30 – 16:15

Innovation Exchange Open

7:30 – 8:30

Coffee & Tea Service

8:30 – 9:30

Culture of Cybersecurity Panel

9:30 – 10:00

30 Minute Morning Networking Break

10:00 – 11:00

211–Cybersecurity Performance: A Quantitative Approach
212–Integrating Data Protection Aspects into Development of Cyber Physical Systems
213–Gaining Ground on the Cyber Attacker: Building a Cyber Resilient Business
214–Introducing COBIT 2019

11:00 – 11:15

15 Minute Movement Break

11:15 – 12:15

221–FinTechs Between the Rise & the Challenge
222–DPIA in Practice
223–Information Coming Soon
224–Why Awareness Efforts Fail

12:15 – 13:30

Group Lunch

13:30 – 14:30

231–No Silver Bullets: Cybersecurity in the Cognitive Era
232–Crypto Agility: Security Event Response
233–Cyber Warfare & The New Threat to Security
234–Challenges in Cybersecurity Program Development

14:30 – 14:45

15 Minute Movement Break

14:45 – 15:45

241–New Approach to Data Centric Security
242–Do You Protect Your Machine Identities?
243–A Framework for Choosing an ISMS
244–Impact of GDPR on Third Party and M&A Security

15:45 – 16:15

30 Minute Networking Break

16:15 – 17:15

251–Blockchain: Everyone Is Selling, But Is It Right?
252–Third Party Risk Management
253–The Supply Chain: A Major Threat?
254–Information Coming Soon


Wednesday, 31 October

Time  

7:30 – 12:30

Registration Desk Open

7:30 – 8:30

Coffee & Tea Service

8:30 – 9:30

311–Trends in Application Security: Good & Bad Decisions
312–Cyber Crisis Management, Part 1
313–The Art of Red Teaming Without Insulting
314–Are You at Risk from a Cybersecurity Breach and a GDPR Fine?

9:30 – 9:45

15 Minute Movement Break

9:45 – 10:45

321–The Coming Security & Privacy Risks Behind BCI Solutions
322–Cyber Crisis Management, Part 2
323–The Five P’s of Breach Response
324–Creating Adaptable Security Awareness Program in a Global Corporation

10:45 – 11:00

15 Minute Movement Break

11:00 – 12:15

Closing Keynote | Keren Elazari | The Future Of Cybersecurity – From A Friendly Hacker's Perspective

 

Continuing Professional Education Credits

To maintain ISACA certifications, certification holders are required to earn 120 CPE credit hours over a three-year period in accordance with ISACA’s continuing professional education (CPE) policy. Attendees can earn up to 32 CPE credits; 18 by attending CSX Europe 2018, 14 for the pre-conference workshops. ISACA conferences are Group Live and do not require any advanced preparation.

Please note that the session scanners at the Conference do not track CPE credit hours. You will still need to allocate your CPE hours in “My ISACA” following the conference. Certificates of Attendance will be accessible via your MyISACA account. To view your certificate, log into your account and navigate to the “myDOWNLOADS & CERTIFICATES” tab. There you will find a “MY CPE CERTIFICATES” section where all of your ISACA event CPE Certificates will live.

Your Certificate of Attendance details the maximum number of CPE hours you could have earned by attending this event. CPE policies for each ISACA certification, as well as details on how to report your CPE hours, are available here on ISACA’s website. Reporting can also be done by submitting information on the annual renewal invoice.

Conference Registration Fees


ONSITE REGISTRATION RATE
Register and pay after Friday, 19 October 2018
Member US $1,950 Non-member US $2,150

Two-Day Workshop
Member: US $850 Non-Member: US $1,050
   

Cancellation Deadline:

Friday, 28 September 2018

 

 


Registration and Payment Policy

Registration submissions for this conference and any additional workshops are not processed, and a seat is not confirmed or reserved, until full payment is received. All submissions not paid in full will be placed on a waitlist and priority will be given to paid registrants in a payment first-come, first-serve basis. Space is limited, so it is highly recommended that payment is provided at the time of submission to guarantee a seat within the conference and all related events.

Registration rate is determined by the date payment is received by ISACA HQ and current membership status. Please plan accordingly, as it may take 10 or more business days for a wire transfer or mailed check to reach ISACA. Should we receive payment after a registration rate deadline, your account will be adjusted to reflect the current due amount. Entrance to the conference and all related events is contingent upon full payment.

Discounts for the Conference are available, detailed below. To verify eligibility for any of these discounts, please contact https://support.isaca.org or +1.847.660.5505. Note that discounts cannot be applied retroactively. All discounts are applied to the main conference registration fee, and cannot be applied to workshop registrations.

You must be 21 years of age or older to attend this event.

Group Discounts

ISACA offers discounts to organizations sending 4 or more employees to a single conference. Group registrations must be processed in a single registration transaction. Please contact the ISACA Conference department for more details at +1.847.660.5505 or https://support.isaca.org; cannot be combined with any other registration discount offerings.

Government Discounts

ISACA offers a $350 conference registration discount to government employees. Please contact the ISACA Conference department for more details and eligibility verification at +1.847.660.5505 or https://support.isaca.org; cannot be combined with any other registration discount offerings.

Academic and Student Discounts

ISACA offers a $350 discount to academic institution employees and students. Please note that you must be an ISACA Student member in order to receive the student discount; additional membership and qualification details can be found here. For additional registration details and eligibility verification, please contact ISACA’s Conference Department at +1.847.660.5505 or https://support.isaca.org; cannot be combined with any other registration discount offerings.

Cancellation Policy

All cancellations must be received by the published deadline to receive a refund of registration fees. A cancellation charge of US $295 will be subtracted from conference refunds, and US $50 per workshop from workshop refunds. No refunds can be given after the date specified. Attendee substitution is permitted at any time until the conference. If a nonmember is substituting a member, then there will be additional nonmember fees.

NOTE: Registration is contingent upon full payment of the registration fee. To guarantee registration, conference fees must be received by the published deadline. It may take 10 or more business days for a wire transfer or mailed check to reach ISACA, so please plan accordingly. If, for any reason, ISACA must cancel a course or event, liability is limited solely to the registration fees paid. ISACA is not responsible for other expenses incurred, including travel and accommodation fees. For more information regarding administrative policies, please contact the ISACA conference department.
Phone: +1.847.660.5505
Fax: +1.847.253.1443
https://support.isaca.org


Payment Methods

  1. Pay online at www.isaca.org/invoices
  2. Mail your payment to:
    ISACA
    1055 Paysphere Circle
    Chicago, IL 60674 USA
  3. Bank Wires—send electronic payments in US dollars to:
    Bank of America
    135 S. LaSalle St.
    Chicago, IL 60603
    ABA #0260-0959-3
    ISACA Account #22-71578
    S.W.I.F.T. code BOFAUS3N
    * Please include attendees name on the Advice of Transfer.

 

Disclaimer

ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.

Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.


Not a member of ISACA? Join today!

When you register for the conference as a nonmember, the difference between member and nonmember conference fees can be applied towards ISACA membership. This means you can become a member at the international and chapter level for little to no additional cost; it just depends on your local chapter dues. To take advantage of this great offer, check the box on the registration form. For more information about ISACA membership, visit the web site at www.isaca.org/membership or contact the membership department at membership@isaca.org.

NOTE: This offer expires 30 days after completion of the event. Nonmembers pay the nonmember conference fee when registering.


Consent Language for Photos, Audio and Video Recordings Taken at Events or for Marketing Purposes

I agree irrevocably and free of charge that ISACA or any third party who is acting on ISACA’s behalf may create images, videos and/or sound recordings of me (“works”) at the event for marketing purposes. For these purposes, the granting of rights in the works also includes the rights to adapt, reproduce, distribute, perform, making available to the public, broadcast, retransmit or sublicense the works to ISACA’s affiliates. The granting of rights in the works also includes all current and future media, goes beyond the repetition of an event and is not restricted to time or territory. View ISACA’s Privacy Notice >>


Dress

Business casual is appropriate for this and all ISACA conference events.

Conference Venue

Intercontinental London - The O2

The riverside InterContinental® London - The O2 hotel stands out in the buzzing Greenwich Peninsula, with 453 luxury rooms, a beauty spa and a ballroom for up to 3,000. Spectacular Canary Wharf views are best enjoyed over cocktails in Eighteen Sky Bar, one of several dining destinations in the new hotel. The O2 arena is steps away and the Emirates Air Line zips over the Thames to ExCel London. The Thames Clipper and the Jubilee line offer fast links to London’s West end and London City Airport.

Waterview Drive, Greenwich Peninsula, London UK
44.203.7405411

Click here to reserve your room today!


For any travel or visitor-related information regarding London, please visit VisitLondon.com.

A valid credit card authorized to pay for your room and tax, plus a one night deposit per guest room.

The riverside InterContinental® London - The O2 hotel stands out in the buzzing Greenwich Peninsula as one of the most exciting luxury hotel additions in the past year. Featuring chic, granite bathrooms, the hotel’s contemporary rooms offer complimentary Wi-Fi, smart TVs and desks. The hotel is a 10 minutes' walk from the North Greenwich tube station and 6 miles from the Tower of London. The Thames Clipper and the Jubilee line offer fast links to London’s West end and London City Airport.

In addition to being the center of all CSX 2018 Europe Conference activities, spectacular Canary Wharf, City of London and Greenwich views can be enjoyed over cocktails in Eighteen Sky Bar, or from one of several dining destinations in the hotel. The legendary O2 arena is steps away via a covered walkway as is the soaring Emirates Air Line , which transports you over the River Thames to ExCel London and the restaurants and cafes of the redeveloped Royal Victoria Dock.


Help Us to Help You!

For the best possible experience, ISACA strongly encourages all conference delegates to stay at the host hotel. It is the most convenient location for attendees to be able to participate in all conference activities at a reasonable price. Also, every reservation made for those attending ISACA events will help us to fulfill our commitment to the hotel, which in turn allows ISACA to continue to keep the cost of the conference fees and membership dues as low as possible.

Thank You to Our 2018 Sponsors!

 

  Gold

Adobe


Make It an Experience.
Only Adobe gives everyone — from emerging artists to global brands — everything they need to design and deliver exceptional digital experiences.

 

Huntsman Security


Huntsman Security provides cyber technology to monitor the data, networks and systems of governments and business; while at the same time complying with the increasing regulatory demands for effective controls: Huntsman Security’s “Executive Cyber Scorecard” delivers a reporting facility that allows business stakeholders to instantly see how they are tracking against the most common cyber defence stress points.

 

 

  Silver

Accellion


Knowing that your sensitive digital assets are protected…even as you share them with the outside world.

 

Esentire

eSentire® is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organisations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Centre (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events. Protecting more than £3 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. For more information, visit www.esentire.com and follow @eSentire.

 

OneTrust

OneTrust is the global leader in privacy management and marketing compliance software. More than 1,500 customers, including 200 of the Global 2,000, use OneTrust to comply with data privacy regulations across sectors and jurisdictions, including the EU GDPR, ePrivacy (Cookie Law) and the California Consumer Privacy Act. The comprehensive platform is based on a combination of intelligent scanning, regulator guidance-based questionnaires, automated workflows and developer plugins to automatically generate the record keeping required for an organisation to demonstrate compliance to regulators and auditors.

 

 

  Bronze

Digital Shadows


Digital Shadows enables organisations to manage digital risk by identifying and eliminating threats to their business and brand. We monitor for digital risk across the widest range of data sources within the open, deep and dark web to deliver tailored threat intelligence, context and actionable remediation options that enable security teams to be more effective and efficient.

 

One Identity


One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure digital transformation. Our design and integration philosophy is that our solutions must add agility and efficiency to an organization as well as secure its digital assets. We help you #GetIAMRight

 


SAI Global


SAI Global helps organisations proactively manage risk to create trust and achieve business excellence, growth, and sustainability. The Company’s integrated risk management solutions are a combination of leading capabilities, services, and advisory offerings that operate across the entire risk lifecycle allowing businesses to focus elsewhere. Together, these tools and knowledge enable clients to develop an integrated view of risk. www.sai360.com

 

 

Supporting Sponsors

Baffle

CMMI

Turnkey

 

 

For Sponsorship Opportunities

Please contact: 

Sean Stringer
Director, Sponsorship
Phone: +1.847.660.5729
Fax: +1.847.253.1443
sstringer@isaca.org


  Exhibitor and Sponsorship Information

 

 

Questions

Contact ISACA's Learning Solutions Department:
Tel: +1.847.660.5670
Fax: +1.847.253.1443
Click here to submit a question.

Media Inquiries

Contact the ISACA Communications Department:
Tel: +1.847.660.5512 or
+1.847.660.5564
news@isaca.org

Please address Sponsorship questions to: sstringer@isaca.org