Quentin Descat

Head Global Cardiovascular – Commercial Launch Brands Lead

CASE STUDY

The Employer Experience Proposition

Global Internal Benchmark for key HR Metrics. Key HR Metrics are aggregated and shared globally between different regions so each region can compare their own results with others within Sony. This is a good use case of how own data is utilised and leveraged in a global scale.

Quentin Descat

Head Global Cardiovascular – Commercial Launch Brands Lead

CASE STUDY

The Employer Experience Proposition

Global Internal Benchmark for key HR Metrics. Key HR Metrics are aggregated and shared globally between different regions so each region can compare their own results with others within Sony. This is a good use case of how own data is utilised and leveraged in a global scale.

Speakers

Sample of Keynote Speakers and their Case Studies

Quentin Descat

Head Global Cardiovascular – Commercial Launch Brands Lead

CASE STUDY

The Employer Experience Proposition

Global Internal Benchmark for key HR Metrics. Key HR Metrics are aggregated and shared globally between different regions so each region can compare their own results with others within Sony. This is a good use case of how own data is utilised and leveraged in a global scale.

Слайдшоу

Jonathan Robinson

Director Insider Threat

CASE STUDY

Insider Threat

— Overview of what a modern Insider Threat programme looks like — balance of risk

— Case study: Building Haleon’s programme from scratch

— Data Loss Prevention — benefits and limitations

— The changing environment: Collaboration tools, Shadow IT, hybrid working, AI, etc

In this session, I’ll explore the critical role of being the bridge between product and technology, where true product development excellence happens. Drawing on my experience in transformation, including agile transformation and large-scale delivery, I’ll share how connecting vision with execution, and people with purpose leads to better collaboration, stronger outcomes, and more impactful products — the cornerstone of product and agile excellence.

Show More

Steve Williamson

Audit Account Director, Information Security and Data Privacy

CASE STUDY

Gain Insights Into Your Cyber Risk Exposure Through Internal Audit

Internal Audit is the third line of defence, their purpose is to provide assurance to the Board that Enterprise Risks adequately managed, i.e. in accordance with the organisation’s risk appetite. Cyber Security has been elevated to be the top risk for most companies. The threat landscape is continually evolving, and companies’ digital footprints continue to expand. With such a complex risk environment, the most practical approach is to ensure the most valuable assets are protected against the most likely threats by deploying multiple layers of control. This presentation will outline how Internal Audit evaluates cyber defences by evaluating how much risk reduction is being achieved from the deployed controls.

Pre-Start Phase:

1.Patient Safety Review:

  • Assess patient demographics, drug specifics, AE (Adverse Event) incidence rates, available resources, and programme design fundamentals
  • Integrate multifaceted support resources, including call centres, educational materials, and digital tools

2.Contracting Essentials:

  • Determine the need for standalone PVAs (Pharmacovigilance Agreements) or safety clauses
  • Critical contract elements: Include audit rights, clear definitions, mandatory training, AE reporting procedures, contact details, and reconciliation processes

3.AE Training and Vendor Setup:

  • Implement comprehensive AE training protocols
  • Establish a robust vendor monitoring strategy with clear KPIs, defined monitoring frequency, and audit readiness

During the Programme:

1.Vendor Performance and AE Monitoring:

  • Conduct regular vendor reviews to ensure compliance with contractual obligations
  • Maintain ongoing reconciliation and monitor AE trends to identify any emerging issues

Post Completion:

1.Study Reporting:

  • Prepare a comprehensive study report summarising outcomes, key learnings, and areas for improvement
Show More

Jean-Marie Mele

Group Chief Information Security Officer

CASE STUDY

The Human Factor: Why Employees are the Weakest Link in Cybersecurity

What are Early Warning Indicators (EWIs)?
– Proactive signals that help identify potential financial distress in clients before it becomes critical
– Used by banks to monitor credit risk, liquidity issues, and operational challenges
Why are EWIs Important?

In an evolving landscape where customer expectations continually rise, understanding and proactively addressing customer needs is no longer optional—it’s essential. This session explores how empathy-driven customer experience (CX), combined with strategic automation and cutting-edge AI, can radically enhance efficiency, agent performance, and customer loyalty. Leveraging real-world insights and innovative frameworks, discover practical ways to future-proof your contact centre operations.

Show More

Nicol Daňková

Head of SOC

CASE STUDY

Incident Response Playbooks. The Importance of Post-Incident Reviews

Have you ever felt a deja vu while dealing with a Security Incident? Have you ever felt like you have dealt with this situation in the past and had such a struggle already? Then you could most likely fall into the big category of CSIRTs, which is being generously overseen at the last point of Security incident lifecycles. Lessons Learned — in this talk, we will go through the best practices, how to be well prepared for them, and how they should be organised. Also, you will see various examples of things that went well or way worse.

In today’s rapidly evolving digital landscape, the banking sector faces increasingly sophisticated cyber threats. As banks continue to innovate and expand their digital services, ensuring robust cybersecurity measures is more critical than ever. This presentation, titled “Evolving Cybersecurity in the Banking Sector: Strategies for Adapting to Emerging Threats,” will explore the latest trends in cyber threats, discuss effective strategies for mitigating risks, and highlight best practices for maintaining security in an ever-changing environment. Join us as we delve into the challenges and solutions that are shaping the future of cybersecurity in banking.

Show More

José Hermida

Head of IT Cyber Defense Technologies

CASE STUDY

SIEM Beyond Logs: Driving Security Strategy at Scale

In today’s complex environments, a one-size-fits-all SIEM is no longer realistic. Security, compliance, and visibility needs vary across organisations — and even within them.

In today’s rapidly evolving digital landscape, businesses must innovate to stay ahead. AI is no longer just an advantage — it’s a necessity for optimising operations, enhancing decision-making, and driving growth. This presentation explores how AI transforms business operations through:

Show More
Thumbnail 1
Thumbnail 2
Thumbnail 3
Thumbnail 4
Thumbnail 5

Jonathan Robinson

Director Insider Threat

CASE STUDY

Insider Threat

— Overview of what a modern Insider Threat programme looks like — balance of risk

— Case study: Building Haleon’s programme from scratch

— Data Loss Prevention — benefits and limitations

— The changing environment: Collaboration tools, Shadow IT, hybrid working, AI, etc

In this session, I’ll explore the critical role of being the bridge between product and technology, where true product development excellence happens. Drawing on my experience in transformation, including agile transformation and large-scale delivery, I’ll share how connecting vision with execution, and people with purpose leads to better collaboration, stronger outcomes, and more impactful products — the cornerstone of product and agile excellence.

Show More

Steve Williamson

Audit Account Director, Information Security and Data Privacy

CASE STUDY

Gain Insights Into Your Cyber Risk Exposure Through Internal Audit

Internal Audit is the third line of defence, their purpose is to provide assurance to the Board that Enterprise Risks adequately managed, i.e. in accordance with the organisation’s risk appetite. Cyber Security has been elevated to be the top risk for most companies. The threat landscape is continually evolving, and companies’ digital footprints continue to expand. With such a complex risk environment, the most practical approach is to ensure the most valuable assets are protected against the most likely threats by deploying multiple layers of control. This presentation will outline how Internal Audit evaluates cyber defences by evaluating how much risk reduction is being achieved from the deployed controls.

Pre-Start Phase:

1.Patient Safety Review:

  • Assess patient demographics, drug specifics, AE (Adverse Event) incidence rates, available resources, and programme design fundamentals
  • Integrate multifaceted support resources, including call centres, educational materials, and digital tools

2.Contracting Essentials:

  • Determine the need for standalone PVAs (Pharmacovigilance Agreements) or safety clauses
  • Critical contract elements: Include audit rights, clear definitions, mandatory training, AE reporting procedures, contact details, and reconciliation processes

3.AE Training and Vendor Setup:

  • Implement comprehensive AE training protocols
  • Establish a robust vendor monitoring strategy with clear KPIs, defined monitoring frequency, and audit readiness

During the Programme:

1.Vendor Performance and AE Monitoring:

  • Conduct regular vendor reviews to ensure compliance with contractual obligations
  • Maintain ongoing reconciliation and monitor AE trends to identify any emerging issues

Post Completion:

1.Study Reporting:

  • Prepare a comprehensive study report summarising outcomes, key learnings, and areas for improvement
Show More
5-55-5

José Hermida

Head of IT Cyber Defense Technologies

CASE STUDY

SIEM Beyond Logs: Driving Security Strategy at Scale

In today’s complex environments, a one-size-fits-all SIEM is no longer realistic. Security, compliance, and visibility needs vary across organisations — and even within them.

In today’s rapidly evolving digital landscape, businesses must innovate to stay ahead. AI is no longer just an advantage — it’s a necessity for optimising operations, enhancing decision-making, and driving growth. This presentation explores how AI transforms business operations through:

Show More

Jean-Marie Mele

Group Chief Information Security Officer

CASE STUDY

The Human Factor: Why Employees are the Weakest Link in Cybersecurity

What are Early Warning Indicators (EWIs)?
– Proactive signals that help identify potential financial distress in clients before it becomes critical
– Used by banks to monitor credit risk, liquidity issues, and operational challenges
Why are EWIs Important?

In an evolving landscape where customer expectations continually rise, understanding and proactively addressing customer needs is no longer optional—it’s essential. This session explores how empathy-driven customer experience (CX), combined with strategic automation and cutting-edge AI, can radically enhance efficiency, agent performance, and customer loyalty. Leveraging real-world insights and innovative frameworks, discover practical ways to future-proof your contact centre operations.

Show More

Nicol Daňková

Head of SOC

CASE STUDY

Incident Response Playbooks. The Importance of Post-Incident Reviews

Have you ever felt a deja vu while dealing with a Security Incident? Have you ever felt like you have dealt with this situation in the past and had such a struggle already? Then you could most likely fall into the big category of CSIRTs, which is being generously overseen at the last point of Security incident lifecycles. Lessons Learned — in this talk, we will go through the best practices, how to be well prepared for them, and how they should be organised. Also, you will see various examples of things that went well or way worse.

In today’s rapidly evolving digital landscape, the banking sector faces increasingly sophisticated cyber threats. As banks continue to innovate and expand their digital services, ensuring robust cybersecurity measures is more critical than ever. This presentation, titled “Evolving Cybersecurity in the Banking Sector: Strategies for Adapting to Emerging Threats,” will explore the latest trends in cyber threats, discuss effective strategies for mitigating risks, and highlight best practices for maintaining security in an ever-changing environment. Join us as we delve into the challenges and solutions that are shaping the future of cybersecurity in banking.

Show More