Ivan Milenkovic serves as Vice President for Cyber Risk Technology at Qualys, a pioneering provider of disruptive, cloud-based IT, security, and compliance solutions designed to consolidate and streamline customers’ security requirements on a single platform. With over 20 years of experience in aligning complex technology landscapes and fluctuating risks with core business objectives, Ivan’s background includes a Group CISO role at a major multinational BPO, running a cyber advisory practice, and serving on multiple advisory boards. Earlier in his career, he was involved in the design and operations of systems supporting the Olympic Games, and he proudly notes having delivered projects across every continent except the frozen ones.
Ivan is a Certified Information Security Officer (S-CISO®) and is one of the trainers on the CISO2.0 course for the SECO Institute (for the S-CISO certification). He is currently pursuing a Cyber MBA at Lancaster University in the UK.
Solution Study
Montag, 23. Juni
12:15 - 12:40
Live in Zürich
Weniger Details
With so many threats, vulnerabilities, patches, and alerts, it can be difficult to know where to focus. This is a practical and proven, risk-focused methodology for managing technical cyber threats that aligns directly with business goals. Whilst many organisations assume that piling on more security controls is the answer, real-world best practice shows that sometimes a simple adjustment can be more effective at lowering risk – without escalating costs or causing downtime. Such adjustments might include removing unnecessary services, making host firewall changes, or deleting registry keys, all of which can significantly reduce a system’s attack surface.
Not all technical vulnerabilities carry the same weight. The critical emphasis here is on gathering the necessary metrics and understanding each asset’s purpose and exposure. This enables security teams to prioritise and remediate the most business-relevant and severe issues first, ensuring their efforts (and budgets!) deliver the greatest impact in safeguarding the organisation. We will also cover strategies for effectively communicating these findings to relevant stakeholders – ensuring that security priorities remain transparent, actionable, and closely aligned with overall business objectives.
In this session, you will: