Agenda
27th – 28th October 2026 // São Paulo, Brazil
27th – 28th October 2026 // São Paulo, Brazil
We are currently working on the 2026 agenda and will be updating it soon.
In the meantime, take a look at the topics and themes discussed as part of the 2025 agenda:
| Day 1 // November 4th Theme: Building A Comprehensive Business Architecture By Tackling the Challenges of Today 08:00 – 17:30 Conference Chair: Ivan Athanazio, CISO, Universidade Federal Fluminense |
|
![]() |
08:00Registration |
![]() |
08:50Opening Address |
![]() |
09:00Panel Discussion: How Can We Build A Cyber Secure Culture Throughout Both Our Organisations & Society?
– Moderator: Ivan Athanazio, CISO, Universidade Federal Fluminense |
![]() |
09:40Presentation: From Reactive Defense to Autonomous Cyber Security: Google’s Journey with AIs The speed of cyber threats has outpaced human response capabilities, making reactive, manual cyber security an unsustainable model. In this session, The Head of Google Cloud Security in LATAM will share the vision and lessons from our own transformation journey, showing how the strategic use of AI allowed us to move beyond incident reaction. Discover the roadmap Google followed to build a security posture that is proactive, intelligent, and autonomous, and learn the principles you can apply in your own organization to be better prepared. . – Marcello Zillo, Head of Google Cloud Security LATAM, Google . |
![]() |
10:20Networking Break |
![]() |
11:00Presentation: Securing Latin America's Infrastructure: Building Strategic Cyber Defense Against Emerging Risks This session will explore:
– Daniel Maier de Carvalho, General-Coordinator of the CTIR Gov., Institutional Security Office of the Presidency of Brazil |
![]() |
11:30Presentation: OT Security Ecosystem for Targeted Risk Reduction and Reporting This presentation takes you beyond a basic asset inventory and offers a multi-layered view of the OT risk landscape — giving you a full, ecosystem-level perspective. We’ll walk through the key building blocks for proactively identifying and reducing risk. Join us to learn more about:
– Mauricio Barbarulo, Industrial Cyber Security Consultant, Rockwell Automation |
![]() |
12:00Case Study: Building A Framework to Protect Against AI-Based Attacks on IT/OT Environments This session will discuss:
– Milton Guerrero, CISO, HuntOil |
![]() |
12:30Presentation: Mitigating Risk by Minimising Downtime: How We Built An Effective Strategy for Incident Response This session explores:
. |
![]() |
13:00Lunch Hosted by Google |
![]() |
14:00Presentation: Transforming Challenges into Opportunities: Security in OT/CPS Environments In an increasingly connected and automated landscape, Operational Technology (OT) and Cyber-Physical Systems (CPS) environments face complex security challenges. This presentation proposes a strategic and proactive approach to transform vulnerabilities into opportunities for innovation, resilience, and competitive advantage. . – Tácito Santos, Cybersecurity Sales Specialist, NTT Data & Rodrigo Leal, Executive Manager of Telecommunications and OT Cybersecurity, AXIA Energia . |
![]() |
14:30Case Study: Our Guide To Building an OT Patch and Vulnerability Management Programme: Challenges and Lessons Learned This session will explore:
– Thadeu Tourinho, Regional CISO, Tereos |
![]() |
15:00Presentation: Overcoming ISO27001 Certification Challenges The presentation discusses the main challenges faced by organisations in ISO/IEC 27001 certification, emphasising the importance of the standard for Information Security, the steps of the certification process and challenges such as senior management engagement and organisational awareness, offering practical tips to overcome them. The three main topics covered are:
. |
![]() |
15:30Spotlight: Why Vendors Dictate OT Access—and How End Users Take Back Control Across plants, terminals, and utilities, OEMs and service vendors routinely set the terms for how they access operational technology—persistent VPNs, shared “support” accounts, unmanaged laptops, and cloud‑managed gateways that punch holes through carefully designed perimeters. Why do end clients accept this? The short answer is asymmetry: vendors hold the keys to uptime (and warranties), proprietary tooling, scarce field expertise, and “time‑to‑repair” metrics that dominate operational incentives. Over time, temporary exceptions become permanent architecture. This talk explains the business, contractual, and cultural forces that lead organizations to cede control—and the practical path to reclaim it without breaking SLAs or vendor relationships. We’ll map common access patterns and their failure modes, then show how to replace vendor‑dictated connectivity with client‑owned brokering: jump/bastion architectures, session brokerage with just‑in‑time access, MFA and ephemeral credentials, role‑based scoping, session recording, and tiered vendor risk models. We’ll pair the technical controls with procurement and legal levers: warranty‑safe requirements, access evidence delivery, “break‑glass” governance, incident‑response obligations, and clause language aligned to IEC 62443 and NIST SP 800‑82. . – Gabriel Diaz, Sr. Solutions Architect, Xona Systems |
![]() |
15:40Networking Break |
![]() |
16:10Roundtables: T1. The Evolution of Data Protection at the Regional Level – Uilson Souza, Global Information Risk Lead, Mars . T2. Ensuring Our Supply Chains Remain Secure Against An Expanding Threat Landscape – Ivan Athanazio, CISO, Universidade Federal Fluminense . T3. Building a Resilient OT Security Framework – Daniel Morales, Automation Manager, Braskem . |
![]() |
16:50Panel Discussion: Do Latin American Organisations Need Regulating More? Or Will This Give Us a False Perception of Security?
– Moderator: Felipe Holanda Ribeiro, Information Security Compliance Officer, 3 Corações S/A |
![]() |
17:30 Closing Remarks |
![]() |
17:35 Drinks Reception |