Building a next-gen security operations center. Carlsberg’s strategy and practical approach.

June 24, 2021

During this Virtual Round Table, Tal will take you on his journey so far and is happy to learn from your experiences as well. You are most welcome to join!

  • Small scaled peer session
  • Open dialogue by means of the Chatham House Rule
Sign up

Tal Arad


Tal Arad started working for Carlsberg in 2020. Before joining Carlsberg, he was the CISO of CEVA Logistics, where he established and led the global information security function, from a single employee organisation to a global high powered and cost effective organisation across three continents. Between 2008 and 2017, he held several positions at Canon such as Enterprise Information Security Manager in which he was overall responsible for Information Security Management in the EMEA region. Prior to Canon, Tal spend several years working as a security consultant as well as spending part of his military service as the CSO for military IT campus of the IDF.


With more than 41.000 employees and activities in more than 150 markets in three geographical regions, Carlsberg is the world’s third largest brewery group. The Carlsberg portfolio includes more than 600 beers, such as well-known international premium brands Kronenbourg 1664, Grimbergen, and Somersby.


As Group CISO, VP Information Security, Tal Arad is responsible for establishing and maintaining the information security strategy to ensure that information assets and technologies are adequately protected. Currently, he is designing and building a next-generation security operations center (SOC) that helps to protect and enhance the globally connected Carlsberg businesses


16:55 | Call in at MS Teams meeting
17:00 | Start program, including presentation & discussion.
18:30 | End



Main language



  • Participants have to meet the previously described target audience.
  • If applicable, our partners will be presented with every application.
  • During all our sessions, the Chatham House Rule applies. This means that the participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed. This means that no report, no photos and no recordings are made of the meeting. The presentation will also not be distributed to the participants afterwards.

Contact information


Do you wish to be informed about our upcoming sessions? Subscribe to our monthly agenda!