Strategic approaches towards IT Compliance | The matrix between Legal, IT Compliance, Organizational Infrastructure and IT Compliance requirements – the challenges of navigating an always changing framework | (BYOD) Bring-your-own-device policy backed up by technical controls: Flexibility vs. Security |The future of IT Compliance – towards the next generation security layers

Regulatory Affairs and Compliance Certifications | Regulatory Bodies – navigating the increasing requirements and complexities | ISO/IEC 27701:2019 – what does the next level of Information Security Management Systems (ISMS) mean and what are the challenges in achieving it?

Legacy IT & Applications | Assessing the vulnerabilities of Legacy IT due to lack of updates, maintenance and skilled workforce | Challenges and risks related to the integration with newer systems

IIoT Platform 4.0 | The risk of peripheral devices: Configuration, Maintenance and Updates | Security requirements ecosystem along the value chain

IT Security & IT Governance | Progressing into the next level of APIs – how to leverage the threats and benefits? | Ensuring automated software updates and patches | Shadow IT – data loss, unpatched vulnerabilities and compliance issues

Public Cloud Services | IT Compliance in the Cloud and the ISO 27018 standardization | Passwordless access and biometrics | Testing & automation – the Shift Left Paradigm in Software Development

Data Protection & Data Privacy | Moving beyond GDPR and bullet proofing Data Privacy through appropriate staff training | Building security controls to ensure the confidentiality of data – Confidentiality, Integrity and Accessibility | Third-party risk management – developing a risk-based approach in the process of evaluating partners and vendors

Control & Monitoring: Tools & Systems | The challenges of matching your own risks with the myriad of solutions available | Balancing between the risk threats and the efficient resource allocation

Emerging Technologies | Artificial Intelligence and Machine Learning as a source of risk | Balancing between AI and Human Activity – what are the costs and the risks associated?

Internal & external IT Compliance Audits | Cross department collaboration and stakeholders involved in the process | Building an IT Compliance culture to boost audit confidence | Audit defense strategies | Sovereign handling of audits – tips and tricks from practice