Confirmed CIO & CISO Edge Colombia Agenda

SCHEDULE DETAILS Information of Event Schedules

World is committed to making participation in the event a harassment free experience for everyone, regardless of level of experience, gender, gender identity and expression

9 am

Conference Welcome Speech

Stakeholder Management & How To Build Trust

Stakeholder Management is an essential part of the CIO role. The CIO must effectively communicate with stakeholders to understand their needs, align technology initiatives with business goals, and ensure that IT projects and initiatives deliver value to the organization. It also involves identifying potential risks/concerns and addressing them to minimize impact to the organization. Stakeholder management is also important for the CIO role as it helps to foster collaboration and innovation within the organization. By bringing together diverse perspectives and ideas from different stakeholders, the CIO can identify new opportunities for leveraging technology to drive business growth and improve operational efficiency. Stakeholders include anyone who has an interest or impact on the organization's IT strategy, such as customers, employees, shareholders, and other departments within the organization. CIOs can build trust with stakeholders by communicating effectively, delivering on promises, being responsive, transparent, a good listener, showing leadership and showcasing results

CISO and CIO Panel Discussion: Enterprise Security is a Business Problem, Not an IT Problem

Creating and managing a secure organization is quickly becoming a business nightmare.

Increasing levels of automation have increased vulnerability to security breaches. It's not just the infrastructure that needs attention; Companies also have to deal with insider threats and human errors, which make up more than half of security breaches.

Employees need to be aware of appropriate security issues and policies that must be implemented. How prepared are companies to face this challenge? Are they aware of the risks they face? Our panel of enterprise security experts will discuss these points and more.

Coffee & 1-2-1 Business Meetings

From Crisis to Cohesion: Collaboration Strategies in Cybersecurity Incidents

I will talk about the importance of collaboration and teamwork in incident response, the specific challenges and scenarios that arose during the incident, explain why collaboration between different departments and teams is crucial and what benefits a coordinated response brings. and cohesive, I will also talk about the key components of collaboration and some lessons learned during an incident.

Technological Innovation New Business Horizons

Have you seen how your organization currently faces the challenge of seeing how its products or services remain current? Accelerated innovation!! A useful conversation on how to deal with it.

Coffee & 1-2-1 Business Meetings

How Can I Build A Cyber Resilient Model In My Organisation?

In a landscape where security breaches and cyber attacks are more recurrent, it is imperative that organisations take a proactive and strategic approach to safeguarding their digital assets and maintaining business continuity in the event of security incidents. Through the NIST 800-160 standard we will explore how a CISO can define a roadmap to strengthen their security posture through cyber resilience techniques and approaches.

Latest Trends in Strengthening Cybersecurity in Latin American Digital Payments.

I will discuss the importance of collaboration and teamwork in incident response, the specific challenges and scenarios that arose during the incident, why collaboration between different departments and teams is crucial and what benefits a coordinated and cohesive response brings, the key components of collaboration and some lessons learned during an incident.

1 pm

Networking Lunch & Speakers VIP Lunch

From Vulnerability Management to Continuous Exposure Management

With attacks regularly going undetected, improving security posture is an ever-growing priority. But often security and IT teams are not aligned on which of the thousands of CVEs, misconfigurations and at-risk identities are a priority for remediation, what can be done about any fixes that IT teams can't do, and how to ensure that completed fixes work as intended. Join this session to learn how organizations mature their security posture by looking at their environment through the lens of an attacker, giving them a common language for discussing, and prioritizing measurable risk reduction.

Innovation & Technology As Enablers Of The Beauty Industry Revolution To Create More Personalized, Inclusive & Sustainable Experiences

How to leverage innovation and technology for business transformation. I would like to share our experience at L'Oréal, the world's No. 1 beauty company to be the leader in beautytech by providing more personalized, inclusive and sustainable experiences

The Importance Of Cybersecurity For Operation Technologies (OT)

Convergence of IT and TO, IIOT, cyber security challenges for industrial control systems

Coffee & 1-2-1 Business Meetings

Five Core Aspects To Enable Business From Technology & Cybersecurity

Technology and cyber risk management are two disciplines that are often viewed in the industry as mutually exclusive, especially for digital businesses. However, it is possible to successfully manage technology by enabling the business and with effective control of cyber risk. In this session we will talk about 5 critical success factors to achieve this

Cyber Security In Fintech

This is a talk to show what the "Approach" that a security team in a FINTECH company must have, whose agility cannot but be accompanied by cybersecurity. What is the role of the BISOS within this new scheme where "Time to market" is favored.

Coffee & 1-2-1 Business Meetings

Evolution Of The Digital Bank Through Digital Transformation & The Exploitation Of Data

The contribution of digital transformation provides the necessary agility so that the activities carried out within the operation are improved in minimizing errors, reducing waste, and improving productivity, having as a strategic asset the exploitation of data, which has been fundamental. for decision-making at the corporate level, which will allow us to anticipate the needs of customers, in order to know them in terms of their preferences, offering a better service

Transformation Of Government Entities From The Business Architecture Guidelines Case Of The Superintendency of Family Allowance

This session will talk about the power of data in decision making within the Enterprise organization

5 pm

Pub Quiz & Happy Hour

Connect with us​

CIO Edge Colombia

Our Enterprise Edge events are premier digital strategies forums transforming the future of the digital enterprise ecosystem, attended by the world’s biggest brands, C-Level executives congregate to discuss the future of IT & Digital Business covering topics including Enterprise IT, Customer Engagement, AI/Robotics, IT Security, Innovation, Disruption & Analytics.

Speaker & Delegate Enquiries

Name: Kurt Large

Email: kurt@enterprise-edge.com

Sponsorship Enquiries

Name: Craig Shipley

Email: craig@enterprise-edge.com