Forum agenda
9:00
Registration and welcome coffee
Plenary session. ENHANCING BUSINESS CONTINUITY: UPHOLDING SUSTAINABILITY IN AN EVOLVING DIGITAL LANDSCAPE
Experts will delve into strategies and models aimed at ensuring sustainable development in the digital realm. While economic, business, and public administration processes are accelerating rapidly, organizations confront challenges posed by emerging digital risks and widespread cyber attacks worldwide. Amidst these dynamic conditions, it becomes imperative to synergize the collective efforts of government, business entities, and digital solution providers.
10:00
Welcome speech by General partner
11:45
Coffee-break and networking
12:00
ENGAGING WITH REGULATORY AUTHORITIES: INFORMATION SECURITY STANDARDS AT THE STATE LEVEL DIALOGUE.
The session will adopt a discussion format featuring a regulator representative. Emphasis will be placed on dissecting legal stipulations concerning technical, organizational, and legal measures for safeguarding personal data. Attendees will gain practical insights into implementing robust, regulation-compliant strategies, understanding the intricate landscape of information security while adhering to legal requirements. The session will delve into the ramifications of these requirements on business processes and explore methods for preparing for regulatory inspections.
12:30
DIGITIZATION OF ORGANIZATIONAL SYSTEMS AND PROCESSES: APPROACHES TO SOLUTION SELECTION.
Exploring Current Trends, Challenges, and Opportunities in Digital Transformation.

This session will delve into the intricacies of selecting optimal solutions and provide practical recommendations for crafting effective digital transformation strategies.

Participants will engage in discussions on key threats and potential weaknesses in the digitization process.
Hall 1
Hall 2
INCIDENT DETECTION AND RESPONSE IN RESOURCE-CONSTRAINED ENVIRONMENTS.
Throughout the session, participants will concentrate on efficient approaches to identify and manage cyber incidents within the constraints of limited budgetary and technical resources.
13:30
BUINDING IT INFRASTRUCTURE: NAVIGATING THE SECURE HYBRID INFRASTRUCTURE CHALLENGES.
The session is dedicated to exploring strategies and methods for constructing a robust IT infrastructure crucial for the seamless digitalization of systems and processes within an organization.

Participants will engage in discussions about the future trajectory of hybrid cloud infrastructure, delving into topics such as cloud security and its profound implications across various industries, including the public sector, energy, financial services, healthcare, and more.

This inclusive discussion invites CISOs, CIOs, representatives from telecoms, data centers, cloud solution providers, and IT and cybersecurity vendors.
Hall 1
Hall 2
ADVANCING INFORMATION SECURITY: CONTEMPORARY APPROACHES IN THE ESG ERA.
14:10
Master-class
Speaker:
Hall 1
Hall 2
Assel Ucoklar
Business Development manager Infosec, Data Matrix Corp
Lunch
14:30
DEVSECOPS AND BEST PRACTICES IN SECURE DEVELOPMENT.
The imperative of ensuring code security and establishing dependable development processes has become integral to every organization. In this session, participants will engage in discussions surrounding successful secure development practices, methodologies, principles, and approaches to the implementation of DevSecOps.
15:30
STRATEGIC BUSINESS APPROACH TO INFORMATION SECURITY: FOSTERING EFFECTIVE COLLABORATION BETWEEN CIO, CISO, AND TOP MANAGEMENT.
The session will explore the nuances of fostering effective collaboration between IT and information security functions, with a focus on the pivotal role of the Chief Information Security Officer (CISO) in shaping the overall digital strategy of the company. Discussions will also delve into approaches for justifying and maximizing return on investment in information security amidst resource constraints at the board level. Additionally, the session will cover tools designed to protect key business processes and the CISO's capability to influence these processes from a security perspective.
Hall 1
Hall 2
Coffee-break and networking
16:30
ARCHITECTING AN INTEGRATED INFORMATION SECURITY SYSTEM IN AN ORGANIZATION: STRATEGIC FRAMEWORKS AND SOLUTION SELECTION APPROACHES.
During the session, participants will share experiences and engage in discussions on approaches to constructing a comprehensive system for safeguarding organizations and managing risks. Exploring strategic perspectives, attendees will evaluate diverse methods for seamlessly integrating technology, processes, and human factors, with the goal of establishing a sustainable and efficient security system.
17:00
BUSINESS INSIGHTS INTO SECURITY OPERATIONS CENTERS (SOC).
Throughout the session, participants will gain insights into seamlessly integrating the Security Operations Center (SOC) into corporate strategy. The discussions will delve into ROI considerations, analyzing both the direct and indirect benefits of investments in information security. Additionally, the session will explore prevailing trends in the realm of security threats, examining how the SOC can adapt and effectively counteract them. The focus will be on business-oriented approaches.

This discussion welcomes the active participation of CISOs, CIOs, representatives from telecoms, and IT and cybersecurity vendors, fostering a collaborative exploration of strategies to align the SOC with broader business objectives.
Hall 1
Hall 2
Conclusion of the business agenda. Evening reception.
18:00
Contacts
Speaker enquiries:
Delegate enquiries:
Forum producer
Anna Kugal
a.kugal@as-conf.com
+ 7 777 060-92-91

SPEX manager
Nick Lee
n.lee@as-conf.com
+44 7468129185

ТОО "AdamSmith Eurasia (Адам Смит Евразия)"
Delegate enquiries:
Client Service Manager
Natalia Evdokimova
N.Evdokimova@as-conf.com
+7 7273 10-62-04

ANY QUESTIONS?