- Rebooting an outdated security strategy – how far should you go?
- Exploring 4 technologies to transform security – AI, quantum computing, identity management and ubiquitous connectivity
- How to identify deficits in your strategy and incorporate into your risk management program
Head of Cyber Threat Prevention
10:40AM - Day 1
09:50AM - Day 1