When cybersecurity becomes national security
4th & 5th March 2025 • London, UK
Regardless of sector, CISOs are now directly, together, responsible for safeguarding the economy, critical infrastructure and the citizen. So why are they still not properly resourced and promoted?
Securing total digital dependency
As the US Department of Homeland Security puts it, “Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.”
That cyberspace in turn relies upon a disparate community of security professionals tasked with securing businesses, critical infrastructure, core services and the information our economies and democracies require to function. CNI is mostly in private hands and the public sector supply chain is too. The entire edifice now relies on the weakest link.
While companies and governments now often acknowledge this in statements, many still seem to act as though cybersecurity is only a compliance and regulatory necessity. And many CISOs feel that while they have responsibility for security, they do not have the corresponding authority and budget to ensure that it is delivered. This makes them the fall guys for security while board-level CTOs and CIOs dodge the bullets.
This situation cannot continue. Organisations of all kinds have to accept that they are now entirely dependent on several layers of in-house and off-prem digital infrastructure as well as that of their supply chains.
They are one attack away from having their digital and connected OT and physical systems disabled and critical data encrypted or stolen.
At this e-Crime and Cybersecurity Congress we will be looking at what is actually required to secure a world in which digital dependency is inescapable.
What do security and resilience programmes that can truly deliver measurable risk mitigation as well as business continuity look like?
How are CISOs hired, remunerated and empowered in organisations that take security seriously from the top down?
What balance of point solutions and security embedded in monolithic application suites are best practice organisations using?
How are CISOs and their engineering colleagues working together to secure complex OT environments?
How is threat intelligence being used to drive real business risk mitigation?
And how are organisations securing their weakest links – email and third-parties?