Cyber Security Summit

Securing Tomorrow: Innovations in Security Operations, AI, and Cloud Protection

Madrid, Spain

The cybersecurity landscape is increasingly complex, with organizations facing a dynamic array of threats that require a comprehensive understanding of the latest practices and technologies. Key areas of focus include security operations, application and cloud security, AI-driven security solutions, network security, and supply chain vulnerabilities.

In the realm of security operations, the emphasis is on discovering best practices and innovative strategies to manage security operations in a rapidly evolving threat landscape. Optimizing the Security Operations Center (SOC) for maximum efficiency and resilience is crucial as organizations strive to stay ahead of sophisticated cyber threats.

AI in cybersecurity represents a transformative area of innovation, where the latest advancements in AI-driven security technologies are explored. From advanced threat detection to automated response systems, AI offers powerful tools to enhance cybersecurity defenses. However, understanding the benefits and potential risks associated with AI in cybersecurity is essential for effective implementation.

Network security remains a cornerstone of organizational cybersecurity efforts. The latest trends and technologies, including zero trust architecture, next-generation firewalls, and intrusion detection systems, are vital to maintaining a secure network infrastructure. These technologies help organizations defend against increasingly sophisticated network-based attacks.

Supply chain vulnerabilities are also a significant concern, with risks associated with third-party vendors and suppliers becoming more prominent. Identifying and mitigating these risks is crucial for strengthening supply chain security and ensuring that external partners do not become weak links in an organization’s cybersecurity defenses.

Overall, the cybersecurity landscape demands constant vigilance, innovation, and a deep understanding of emerging technologies and strategies. The Cyber Security Summit provides an essential platform for professionals to stay informed, exchange knowledge, and develop the skills needed to protect their organizations in this rapidly changing environment.

Join us at the Cyber Security Summit, where industry leaders and experts will come together to explore the forefront of cybersecurity. The event will delve into critical areas such as security operations, application and cloud security, AI-driven security solutions, and network security. This summit will be essential for cybersecurity professionals, IT leaders, and anyone dedicated to safeguarding their organization against emerging cyber threats. Don't miss the opportunity to stay ahead in the dynamic world of cybersecurity.

Discover best practices and innovative strategies for managing security operations in a rapidly evolving threat landscape. Learn how to optimize your SOC for maximum efficiency and resilience. Gain insights into securing applications and cloud environments, addressing vulnerabilities, and implementing robust security measures to protect critical assets. Explore the latest advancements in AI-driven security technologies, from threat detection to automated response systems. Understand the benefits and potential risks associated with AI in cybersecurity. Learn about the latest trends and technologies in network security, including zero trust architecture, next-gen firewalls, and intrusion detection systems. Identify and mitigate risks associated with third-party vendors and suppliers to strengthen supply chain security.


#Cyber25CSOIDC 


Overview

Join us at the Cyber Security Summit, where industry leaders and experts will come together to explore the forefront of cybersecurity. The event will delve into critical areas such as security operations, application and cloud security, AI-driven security solutions, and network security. This summit will be essential for cybersecurity professionals, IT leaders, and anyone dedicated to safeguarding their organization against emerging cyber threats. Don't miss the opportunity to stay ahead in the dynamic world of cybersecurity.


Discover best practices and innovative strategies for managing security operations in a rapidly evolving threat landscape. Learn how to optimize your SOC for maximum efficiency and resilience. Gain insights into securing applications and cloud environments, addressing vulnerabilities, and implementing robust security measures to protect critical assets. Explore the latest advancements in AI-driven security technologies, from threat detection to automated response systems. Understand the benefits and potential risks associated with AI in cybersecurity. Learn about the latest trends and technologies in network security, including zero trust architecture, next-gen firewalls, and intrusion detection systems. Identify and mitigate risks associated with third-party vendors and suppliers to strengthen supply chain security.

Why Attend?
  • Gain invaluable insights from industry leaders and experts at the forefront of cybersecurity.
  • Explore critical areas such as security operations, application and cloud security, AI-driven security solutions, and network security.
  • Learn best practices, innovative strategies, and cutting-edge technologies to optimize your security operations.
  • Secure critical assets and leverage AI for threat detection and response.
  • Network with peers and ensure your organization remains resilient against emerging cyber threats

Agenda

9:30

Welcome Coffee & Networking

9:50

Bienvenida al evento

10:00

Opening

10:15

IDC Keynote Speaker

10:30

Panel: Efficient Strategies for Security Operations and Compliance

11:10

Sesión de Pentera: La estrategia de un CISO para la Validación de Seguridad Continua

11:22

Networking Coffe Break

12:00

Ciberseguridad Estratégica: Claves para Fortalecer la Defensa Empresarial desde la Experiencia Real

12:12

End User Panel: Strengthening the Talent of the Future | Closing the Cybersecurity Skills Gap End User Panel

12:47

Uniway Session

12:54

Panel. Defending the Future: Zero Trust and Advanced Safety Netting

13:24

Entrevista con el ganador del CISO del Año 2024

13:44

Networking Lunch Break​

15:00

IDC Session

15:15

Más allá de la detección: Protección y respuesta Inteligente ante brechas de seguridad empresariales

15:22

El acceso privilegiado en el centro de toda estrategia de ciberseguridad

15:27

Panel: Protecting Critical Assets: Cloud and Application Security

16:15

Closing Keynote

16:30

Networking Drink

Speakers

Federico Juste de Santa Ana

Segundo Comandante del Mando Conjunto del Ciberespacio

Joel Stradling

Research Director, Security, IDC Europe

Esther Macías

Directora editorial de Foundry España (ComputerWorld/CIO/CSO/DealerWorld)

Juan Montalvo

CISO, WiZink Bank

Juan Cobo

Global CISO, Ferrovial

Francisco García Lázaro

CISO, Palladium Hotel Group

Daniel Liberal

SEMEA Field CTO, Wiz

Luis Pedroche Montes

Business Development Manager para soluciones ManageEngine

Firas Atassi

CISO, Seur

Álvaro Lancho

Security Client Solution Lead en Avanade Iberia

Fernando Muñoz

Director de CIO Executive Council, Foundry

Andrés Romero

Head of Information Security Governance and Architecture (Regional ISO)- Team Leader, Mercedes Benz AG

Ana Gómez

Corporate Security - Cybersecurity senior manager, BBVA

Laura Parra

Global CISO, Cellnex Telecom

Maica Aguilar

Gerente de Seguridad, Ferrovial

Sergio Ruiz

responsable técnico, Uniway

Mario Moreno

Coordinador editorial de ComputerWorld y CSO

José Carlos Herrera

CISO Europe, Sigma

Enrique Cervantes

Director de Seguridad e Infraestructura Tecnológica, CESCE

Jesús Mérida

Chief Information Security Officer, Iberia

Olga Forné

Global CISO, Grupo Abertis

Miquel Castelló

Customer Solutions Advisor, Softeng

Roger Gallego

Iberia Sales Manager, Delinea

Rafael Ceres

Global CISO, Iberdrola

Alberto López

Global Head of IT and Cybersecurity, Solaria Energía y Medio Ambiente

Enrique Miranda

CISO, Ferrovial Energy

Antonio Fernandes

Cybersecurity Manager - CISO, Financiera Maderera

Carlos Tortosa

Director de grandes cuentas de ESET España

Elena Cerrada

Country Manager Spain & Portugal, SailPoint

Nieves Feijóo Álvarez

Directora Eventos IDC & Foundry

Mark Child

Associate Research Director, Security, IDC Europe

Fernando de Pablo Martín

Director General de la Oficina Digital del Ayuntamiento de Madrid.

Vicente Gea

Experto en concienciación en ciberseguridad, SOSAFE

Marcelo Castro Escalada

Principal Solutions Engineer, DEVO

Javier Tobal

CISO, Astara

Jesús Abascal

Chief Information Security Officer, Plenitude España

Victor Neves

Sales Director - IBERIA para SecurityScorecard

David González

Global CISO & CTO, COREN

Francisco Javier Farfán

Chief Information Security Officer (CISO) Burger King Iberia

David Moreno

Director de Tecnología y Seguridad, TENDAM

Javier Sánchez Salas

CISO, Engie España

Rafael García del Poyo

Partner. Head of the IT/IP Law Department, Osborne Clarke

View All Speakers

Partners

Platinum Partner
Platinum Partner
Platinum Partner
Emerald Partner
Emerald Partner
Emerald Partner
Emerald Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Exhibit Partner

Venue

Hotel Mandarín Oriental Ritz

Plaza de la Lealtad, 5. 28014 Madrid

Key Topics

Security Operations

Discover best practices and innovative strategies for managing security operations in a rapidly evolving threat landscape. Learn how to optimize your SOC for maximum efficiency and resilience.

Application and Cloud Security

Gain insights into securing applications and cloud environments, addressing vulnerabilities, and implementing robust security measures to protect critical assets.

AI in Cybersecurity

Explore the latest advancements in AI-driven security technologies, from threat detection to automated response systems. Understand the benefits and potential risks associated with AI in cybersecurity.

IDC Analysts

Knowledge Hub

Identity Security 2024: Mapping the Threats and Goals

The efficient management of identities and access has become central to digital business. It determines the speed and agility with which an organization is able to operate or pursue new goals; it underpins employee productivity and enables operational efficiencies; and it is key to security, privacy, and compliance. Most organizations have deployed identity and access management (IAM) solutions to handle their operational demands effectively.

Learn More

Ransomware in EMEA - The Threats and Defenses

Ransomware attacks have been one of the most high-profile scourges of business over the past decade — and the threat shows no signs of abating. If anything, it has become more prevalent as “ransomware as a service” has lowered the entry barrier for threat actors. Innovation by cybercriminals keeps security teams on high alert. When governments and security agencies advise organizations not to pay ransom, attackers may switch to extortionware approaches.

Learn More

The Critical Role of Governments in EU Cyber-Resilience

Cybersecurity threats continue to increase. According to ENISA’s 2023 Threat Landscape report, there were around 2,580 observed incidents in the EU between July 2022 and June 2023. In the previous reporting period, there were less than 800. ENISA reported that 19% of events targeted public administrations, by far the largest industry.

Learn More

Not the right event for you?

Don't worry! There are plenty of other events to choose from. Simply sign up for event invitations and we'll send you a notification whenever we add a new event that matches your interests.

Contact Us

Maite Narvaez

Senior Conference Specialist

+34 91 787.2159

IDG

IT executives worldwide rely on IDG’s technology events to discover new ideas, trends, and solutions. Leveraging 60 years of IDC’s market intelligence and Foundry’s media brands (CIOCSOComputerworldInfoWorldNetwork WorldARNReseller NewsChannelPartnerChannel AsiaITWorld), these events offer powerful learning and networking experiences.

Held in more than 30 countries, they foster networking, collaboration, engagement, and knowledge sharing among industry leaders and professionals. Each event is meticulously curated to provide valuable insights and meaningful connections through analysts and editor-led content, global perspectives, case studies presented by the world’s leading tech companies and a range of interactive formats including expert panels, live demos, roundtables, 1:1 meetings and workshops.

Loading...