Meet the Speakers
Greg Van Der Gaast
Chief Technologist - Security
Greg has a diverse 25-year background in Information Security, with a range of engaging stories and insightful perspectives from his career: A former teenage hacker that achieved notoriety by breaking into a nuclear weapons facility, an undercover FBI and DoD operative, a cutting edge technical consultant, a business-minded CISO building Information Security programs for startups and Fortune 500's alike, an author, and an international speaker.
Rob Sims
Chief Technologist – Hybrid Platforms
With an impressive track record spanning over two decades in the tech sector, Rob has held many diverse roles, ranging from internal IT positions to professional services, architecture, and finally, his current position as Chief Technologist for CDW. Throughout his career journey, Rob has demonstrated a unique talent for simplifying complex challenges into clear and actionable business outcomes. As a seasoned leader, coach, mentor and inspirational speaker, he brings a wealth of experience and a broad perspective that extends across countries, sectors and industries. His engagement with C-Suite executives ensures that he effectively communicates the business value inherent in technology products and services.
Scott Manson
Director of Cyber Security for UK and Ireland, Cisco
As the Director of Cyber Security for UK and Ireland, Scott – with more than 18 years ICT experience – leads a team focused on Cisco's vision to deliver intelligent cyber security for the real world, providing one of the industry's most comprehensive advanced threat protection portfolios of solutions across the broadest set of attack vectors. Manson's role also focuses on empowering customers to securely create and deliver value as every country, city and company becomes digital.
6 Reasons To Attend
The Content
It’s time to stop doing cyber security – and start doing business securely.
Resiliency should not just be about how fast you can recover but rather a holistic journey where security is built into the fabric of your business - reducing exposure and avoiding the breach altogether. Truly uncovering the root cause and not just deploying more tools to cover the gaps. It’s a fundamentally different approach