InfoTeam International

InfoTeam International Infoteam International is a producer of high quality B2B conferences for C-level executives worldwide.

We at Infoteam International, specialises in building strategic and bespoke B2B events within IT and Cyber Security.

InfoTeam is so pleased to be organizing the Formula 1 delegation in the Netherlands, proudly sponsored by TeamViewer. It...
21/07/2025

InfoTeam is so pleased to be organizing the Formula 1 delegation in the Netherlands, proudly sponsored by TeamViewer. Itโ€™s a tremendous honor for our team to coordinate such a significant event. By invitation only.

๐ŸŒ Over the past two months, we shifted our focus from Europe to the Middle East, hosting four CIO & CISO Roundtable Dinn...
28/06/2025

๐ŸŒ Over the past two months, we shifted our focus from Europe to the Middle East, hosting four CIO & CISO Roundtable Dinners in Dubai and Riyadhโ€”bringing together cybersecurity leaders for high-impact discussions on compliance, cloud & OT security, identity, and the evolving threat landscape.

A special thank you to Bjรธrn R. Watne, for travelling from Norway to moderate two of our Saudi sessionsโ€”your insights and energy made a real impact!

These sessions reinforced the regionโ€™s commitment to cyber resilience and secure digital transformation.

๐Ÿ”’ As we plan ahead for Q3, Q4, and 2026, weโ€™re looking to partner with IT & cybersecurity vendors and service providers who want to connect with senior decision-makers across EMEA. If you're looking to showcase your solutions and drive meaningful conversations, letโ€™s talk.




https://infoteaminternational.co.uk/middle-east-cybersecurity-leaders-convene-at-infoteam-cio-ciso-roundtables/

What. A. Day.The CIO & CISO UK Summit at The Clermont Charing Cross wrapped up, and the energy in the room? Electric.Thi...
14/06/2025

What. A. Day.

The CIO & CISO UK Summit at The Clermont Charing Cross wrapped up, and the energy in the room? Electric.

This wasnโ€™t just another day of talks; it was an honest, sharp exchange of ideas on whatโ€™s working, whatโ€™s not, and where we must evolve.

From cyber resilience to AI ethics, data lakes to boardroom influence, we explored the full spectrum of digital leadership.

๐Ÿ’ก AI was everywhere, not just as a buzzword. From threat detection to code generation, itโ€™s already changing how we work. But human oversight is still essential. As Laure Isabelle Lydon (MSc) put it: โ€œAI can write the code, but whoโ€™s checking if itโ€™s the right code?โ€

โš ๏ธ Agentic AI raised new red flags, access depth, control bypass, and insider threat potential.

๐Ÿง  In a brilliant fireside chat, Dinis Cruz and Darren Kingsnorth discussed the fast-evolving threat landscape, with Darren capturing the urgency:
โ€œWe are in the world of Now.โ€

๐Ÿ”ง Yet the basics still matter. As Marcin Roth reminded us:
โ€œItโ€™s easy to get budget for AI, but the gremlins live in the basics.โ€
Resilience still starts with patching, access controls, and well-trained people.

๐Ÿ›ก๏ธ On data protection, Kathryn Brooks and Daniel Selman highlighted the importance of respecting the right to be forgotten and adapting to evolving regulation like the EU AI Act.

๐ŸŒ Culture was a standout theme. Rhiannon Lawson challenged us to break systemic barriers and build truly inclusive cyber teams. Transparent career paths, allyship, and leadership accountability all matter.

โ˜๏ธ In the cloud and data lake space, Srimanth reminded us: architecture is more than infrastructure, it's about enabling secure, real-time insights.
โ€œDonโ€™t let your data lake become a data landfill.โ€

๐Ÿค Dr Zibby K, FCIIS delivered clear advice on MSSPs: trust, alignment, and shared mission are non-negotiables.

๐Ÿข In the boardroom, Andy Piper urged CISOs to speak in business terms, use real-world examples, and show how security enables outcomes.
Leonard K added: turn past incidents into bite-sized, actionable lessons that embed into delivery without slowing momentum.

๐Ÿ“ˆ And Jay (Jalal) Moloo nailed it:
โ€œResilience isnโ€™t optional. The threat landscape doesnโ€™t care about your roadmap.โ€

๐ŸŽค Huge thanks to Steve Benton, our moderator, who brought sharp questions and energy throughout the day. Leaving us with a home-hitting analogy: โ€œRunning up a beach with a tiger behind you, are you in front, in the pack, or about to get caught?โ€ Thatโ€™s cyber maturity right now.

๐Ÿ” One recurring theme: Security must be embedded, not bolted on, summarised by Sebastien Geroult. That means ExCo visibility, culture change, cyber literacy, and security baked into business, not added later.

Thanks to everyone who joined, shared, challenged, and inspired. For those who couldnโ€™t make it, we hope to see you at the next one.

Letโ€™s keep the conversation going.

Another successful CISO Roundtable Dinner in Riyadh, hosted once again at the JW Marriott and delivered in collaboration...
21/05/2025

Another successful CISO Roundtable Dinner in Riyadh, hosted once again at the JW Marriott and delivered in collaboration with industry leaders.

We kicked off the evening with a welcome presentation on the evolving threat landscape by Bjรธrn R. Watne, who also returned as our moderator for the eveningโ€™s interactive session.

The agenda featured timely and forward-looking presentations:

๐Ÿ”น Ahmed Tayar explored AI-Security as a Strategy, offering valuable perspectives on integrating artificial intelligence into cybersecurity planning.

๐Ÿ”น Craig McGee delivered an impactful session on Why Itโ€™s Time to Level Up Your Identity Security Landscape, focusing on PAM and machine identity in todayโ€™s digital environments.

The evening concluded with a dynamic interactive discussion over dinner, moderated by Bjorn, where attendees shared challenges and strategies around identity, AI, and securing modern infrastructures.

Thank you to all the attendees who joined us and contributed to another evening of meaningful dialogue and thought leadership and to CyberArk for making this event happen.

An engaging evening of insights and connections at the CISO Roundtable Dinner in Riyadh, held in partnership with Ping I...
20/05/2025

An engaging evening of insights and connections at the CISO Roundtable Dinner in Riyadh, held in partnership with Ping Identity at the JW Marriott.

Our interactive discussion, expertly moderated by Bjรธrn R. Watne, focused on โ€œStrengthening Cyber Resilience in MEA โ€“ Identity, Privacy, and Compliance.โ€ The session sparked valuable dialogue among cybersecurity leaders on the regionโ€™s evolving threat landscape and the role of identity in building resilience.

We also thank Gagan Delouri for his insightful presentation on โ€œSoftware to SaaS: Unlocking Agility, Scale, and Security with Modern Identity,โ€ highlighting practical strategies for enabling secure and scalable digital transformation.

Thank you to all the CISOs and senior security leaders who joined us for a meaningful exchange of ideas, experiences, and best practices in shaping the future of cybersecurity across MEA.

๐€๐ง๐จ๐ญ๐ก๐ž๐ซ ๐š๐Ÿ๐ญ๐ž๐ซ๐ง๐จ๐จ๐ง ๐จ๐Ÿ ๐ฉ๐จ๐ฐ๐ž๐ซ๐Ÿ๐ฎ๐ฅ ๐ข๐ง๐ฌ๐ข๐ ๐ก๐ญ๐ฌ ๐š๐ง๐ ๐œ๐จ๐ฅ๐ฅ๐š๐›๐จ๐ซ๐š๐ญ๐ข๐จ๐ง ๐š๐ญ ๐ญ๐ก๐ž ๐‚๐ˆ๐Ž & ๐‚๐ˆ๐’๐Ž ๐๐ž๐ง๐ž๐ฅ๐ฎ๐ฑ ๐‘๐จ๐ฎ๐ง๐๐ญ๐š๐›๐ฅ๐ž ๐ข๐ง ๐๐ž๐ฅ๐ ๐ข๐ฎ๐ฆ!From aligning i...
14/05/2025

๐€๐ง๐จ๐ญ๐ก๐ž๐ซ ๐š๐Ÿ๐ญ๐ž๐ซ๐ง๐จ๐จ๐ง ๐จ๐Ÿ ๐ฉ๐จ๐ฐ๐ž๐ซ๐Ÿ๐ฎ๐ฅ ๐ข๐ง๐ฌ๐ข๐ ๐ก๐ญ๐ฌ ๐š๐ง๐ ๐œ๐จ๐ฅ๐ฅ๐š๐›๐จ๐ซ๐š๐ญ๐ข๐จ๐ง ๐š๐ญ ๐ญ๐ก๐ž ๐‚๐ˆ๐Ž & ๐‚๐ˆ๐’๐Ž ๐๐ž๐ง๐ž๐ฅ๐ฎ๐ฑ ๐‘๐จ๐ฎ๐ง๐๐ญ๐š๐›๐ฅ๐ž ๐ข๐ง ๐๐ž๐ฅ๐ ๐ข๐ฎ๐ฆ!

From aligning identity and innovation in a digital-first world to navigating NIS2 compliance, securing B2B IAM ecosystems, and driving IT centralisation across decentralised environmentsโ€”our agenda sparked meaningful discussions among industry leaders.

Many thanks to our moderator, panelists and speakers for an engaging opening debate on transforming IT strategies, identity, and risk, and for sharing there presentations and valuable insights on NIS2 compliance, board-level communication, trust-by-design in B2B IAM ecosystems, and the challenges of centralising IT across decentralised business environments.

We ended the day with vibrant networking and a shared vision for resilient, future-ready IT and security strategies.

Thank you to ๐š๐ฅ๐ฅ ๐š๐ญ๐ญ๐ž๐ง๐๐ž๐ž๐ฌ and Ping Identity for your participation, valuable input, and for helping make this roundtable a success.

hashtag

We look forward to another afternoon of meaningful discussions on modernising IT infrastructure, enhancing digital agili...
10/05/2025

We look forward to another afternoon of meaningful discussions on modernising IT infrastructure, enhancing digital agility, and embedding secure identity frameworks into balancing user experience, operational efficiency, and compliance.

Trust, Transformation & Technology: Key Takeaways from Our Dubai Identity RoundtableWe were pleased to host a thought-pr...
09/04/2025

Trust, Transformation & Technology: Key Takeaways from Our Dubai Identity Roundtable

We were pleased to host a thought-provoking Roundtable and dinner last night at VOCO Dubai, where industry leaders came together to discuss the future of identity, cybersecurity, and digital transformation in an AI-driven world.

The evening explored key topics including the rise of passwordless authentication, the impact of artificial intelligence on security, and how organisations can navigate transformation in an increasingly digital landscape.

A focal point of the conversation was the shift toward passwordless authenticationโ€”a move gaining momentum across industries as organisations look to strengthen security while improving user experience. Attendees explored how solutions such as those from Ping Identity are enabling this evolution by moving beyond traditional credentials like passwords and instead leveraging more secure and user-friendly methods such as biometrics, device authentication, and passkeys. This approach is helping businesses reduce the risks associated with credential theft, while also meeting modern expectations for seamless digital access.

Highlights from the discussion included:

โ€ข AI Hype vs. Reality: While artificial intelligence continues to dominate headlines, the group noted that the number of actual security incidents caused by AI remains relatively low. In contrast, human error, third-party vulnerabilities, and internal oversights continue to be the primary sources of breaches. This highlights the importance of focusing efforts on real-world risks, including tailored executive training and demonstrations that show how attacks actually unfold.

โ€ข AI Isnโ€™t Newโ€”But Itโ€™s Suddenly Everywhere: Many organisations have had AI-focused teams for years, yet the recent wave of AI adoption has been driven more by market excitement than necessity. Businesses and consumers alike are rushing to integrate AI, often without a clear understanding of how it serves their core objectives.

โ€ข Security as a Differentiator: Discussions emphasized that solutions like passwordless authentication not only improve security but also create smoother, more trustworthy interactions for users. This dual benefitโ€”enhanced protection and better digital experiencesโ€”was seen as a strategic way for organisations to stand out in an increasingly competitive environment.

We are grateful to Ping Identity, our partner for this event, for helping make this important conversation possible. Thank you as well to all our attendees for their openness, insights, and collaborative spirit throughout the evening. A special thanks to the moderators for guiding such interactive and impactful sessions.

We look forward to continuing the conversation and driving meaningful progress in the months ahead.

We look forward to another insightful interactive evening tomorrow for our CISO UAE Roundtable Dinner!See you tomorrow!
07/04/2025

We look forward to another insightful interactive evening tomorrow for our CISO UAE Roundtable Dinner!

See you tomorrow!

Next up on our CXO Series โ€“ we're heading to London on the 19th of June for an exclusive CXO UK Roundtable Dinner, exclu...
05/04/2025

Next up on our CXO Series โ€“ we're heading to London on the 19th of June for an exclusive CXO UK Roundtable Dinner, exclusively for a limited number of senior leaders from the manufacturing and retail sectors.

๐ŸŒ Beyond the Sale: Deploying Smart Technology to Drive Operational Excellence

After-sales service is becoming a key competitive edge. This session dives into how smart technologiesโ€”like remote connectivity, AR, and AI-driven insightsโ€”are reshaping service operations to improve efficiency, reduce downtime, and deliver seamless support beyond the point of sale.

๐Ÿ” Key topics include:

โ€ข The role of AI and predictive analytics in after-sales
โ€ข Leveraging remote connectivity for real-time support
โ€ข How AR is transforming field service
โ€ข Meeting customer expectations through personalization
โ€ข Defining success: KPIs and ROI for smart after-sales strategies

This closed-door, by-invitation-only event offers a space for honest conversation, shared challenges, and meaningful networking over dinner with fellow industry leaders.

We had the pleasure of hosting another CIO & CISO Denmark Roundtable in Copenhagen โ€“ a day filled with insightful and ho...
22/03/2025

We had the pleasure of hosting another CIO & CISO Denmark Roundtable in Copenhagen โ€“ a day filled with insightful and honest discussions on the most pressing challenges and opportunities in cybersecurity.

A huge thank you to TeamViewer for making this event possible, and to our incredible speakers, our moderator together with our panelists, and all participants for sharing their expertise and perspectives. We canโ€™t wait to return to Denmark in October for our Nordic Summit!

Key takeaways from our discussions:

NIS2:
โ€ข Executive Engagement: A significant benefit of the NIS2 directive is the mandatory training and increased awareness at the C-suite level, fostering stronger board-level alliances and better support for security investment.
โ€ข Incident Response & Preparedness: The directiveโ€™s focus on Incident Response has driven a โ€œshift-leftโ€ approach, improving security posture, monitoring, and resilience through proactive preparedness.
โ€ข Supply Chain Security Challenges: While ensuring security across the supply chain is crucial, there is concern that increased compliance demands may marginalize start-ups and smaller companies, potentially stifling innovation.
โ€ข Information Sharing vs. Reporting: It is critical to distinguish between penalty-free information sharing and mandatory incident reporting. Rapid sharing of threats and attack indicators is essential to mitigate risks and improve collective defenses.
โ€ข Collaboration with Government: Despite promises under NIS2, collaboration with government entities remains slower and more complex than anticipated.
โ€ข Zero Trust Renaissance: Zero trust is regaining momentum, with a renewed focus on segmentation, granular authentication, and advancing toward passwordless security models such as Passkeys.

Operational Technology (OT):
โ€ข Bridging the IT-OT Gap: There is an urgent need to bring OT security up to speed with IT security, given the high stakes and complexity of OT environments.
โ€ข Hands-On Knowledge: Effective planning requires on-the-ground understanding of OT systems, emphasizing physical oversight and practical management.

Futures:
โ€ข AI in Security: As the AI hype subsides, its real-world utility and reliability in cybersecurity are becoming clearer. Thoughtful implementation under human supervision remains vital.
โ€ข AI-Driven Threats: AI-enabled attacks are accelerating, especially in phishing and social engineering, while AI is also speeding up the development and ex*****on of vulnerability exploits.

Thank you again to everyone who joined us in Copenhagen โ€“ we look forward to continuing the conversation in October at the Nordic Summit!

hashtag hashtag hashtag hashtag hashtag hashtag hashtag hashtag

We are thrilled to welcome Alain De Maght as our keynote speaker at the CIO & CISO Benelux Roundtable on 14th May at the...
17/03/2025

We are thrilled to welcome Alain De Maght as our keynote speaker at the CIO & CISO Benelux Roundtable on 14th May at the Botanic Sanctuary Antwerp.

With NIS2 enforcement fast approaching, are you prepared to meet the new regulatory demands? Alain will dive deep into how security leaders can navigate NIS2, communicate cyber risks effectively to the board, and strengthen security & privacy management in an era of increasing threats.

Join us for a thought-provoking session on strengthening Digital Transformation and cybersecurity strategies in today's regulatory and business environment.

Address

Britannia House
Caerphilly

Alerts

Be the first to know and let us send you an email when InfoTeam International posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to InfoTeam International:

Share