Registration - Breakfast - networking
Chair's opening address
  • Security in Europe 2017: legislation, data protection and cyber threats
  • The growing risks and costs of cybercrime to businesses
  • The importance of cyber skills and strategies
“Blurred Lines: Politics and Cybercrime”

Raj Samani

Recent attacks have blurred the lines between cybercrime and the potential of supporting the political agenda of the threat actor.  This presentation evaluates the blurred lines between such distinct categories and asks whether the delineation really truly exists anymore?

As the threat landscape evolves faster than we can keep up , we ask where machine learning fits into the picture and what the technology offers to the forward-thinking enterprise.

Dr Jamie Graves

Machine learning technology promises a lot to those that are willing to dip their proverbial toes in the water. But where can it really deliver value, what does it offer the time and resource-strapped security team and how can the savvy organisation make the most of this new kid on the block. Join us for another great session and discover:

  • What machine learning promises for 2018 and whether it can deliver
  • Do you really need machine learning to protect sensitive data?
  • How the technology helps you to quickly and consistently identify risky activities and defend against threats
  • What a good machine learning solution needs to be able to do to support your security posture and combat the insider threat
The Lever and the Fulcrum – Social Engineering from the Inside Out

Jenny Radcliffe

In this talk Jenny Radcliffe discusses how organisations enable malicious social engineers to breach their defences through their attitude, behaviour and culture.

Using case study examples, she demonstrates how this “ABC” of organisational failure can help facilitate malicious social engineering attacks.   The talk illustrates how human mistakes, mischief and malice can still impact organisations of all sizes often in spite of extensive investment in training and technology.

The session concludes with practical advice on what mitigation, prevention and education methods might actually help in reducing this type of human-based risk.

The benefits of Zero Trust Security are crucially important in this climate of ever increasing number and scope of security breaches. Zero Trust Security:

Barry Scott

Covers the broadest range of attack surfaces, ranging from users, endpoints, and networks to resources

Enables organizations to increase business agility through the secure adoption of cloud and mobile solutions

Provides a framework to properly manage the risk of exposing sensitive apps and infrastructure to business partners

Creates satisfied, productive users by ensuring the proper controls are in place to address appropriate levels of risk without requiring a heavy-handed, maximum-control approach regardless of the risk posed

The future impact of AI in cybercrime:

James Martin

  • How AI has a profound impact on our future internet, and the potential for it to enable digital criminals 
  • The complexity of business and protection, and how current defenders are being outpaced
  • Machine learning and advanced mathematics as tools for handling complexity 
  • Real life examples and applications of attacks 
  • Inevitable rise of data theft and how best to protect yourself


Coffee and networking
One of 3 streams

Click HERE to view stream options

Seminar Change Over
One of 3 streams

Click HERE to view stream options

Lunch and networking
One of 3 streams

Click HERE to view stream options


Chairs Opening Address
Current threat landscape; attacks are we seeing. What we are doing about them... Including building the right team.

Kevin Fielder

  • Threats may not be evolving, but they are certainly increasing.  We are seeing more of everything from DDoS to credential stuffing and account take over attempts to SQL injection attempts; all are increasing.  What is your experience?
  • Being creative to reduce risk, by leveraging existing tooling and capabilities, how do we get more without necessarily spending more.  How are you leveraging your tools and capabilities?
  • Having the right people - we have a great team and a queue of talented internal colleagues who want to work in security.  Make use of this pipeline, develop your internal people.  What skills shortage??  How are you building your team?  How are you best using the wider talent in your organisation?
GDPR compliance and your cyber security programme

Alan Calder

  • The impact of obligations imposed by the General Data Protection Regulation (GDPR) on cyber security
  • Cyber security and privacy – common challenges and solutions
  • The practical steps to initiating a GDPR compliance programme
Criminal Perspectives: Former US Most Wanted Cybercriminal Brett "GOllumfun" Johnson Discusses his History of Cybercrime, Its Current State, and Where It is Headed.

Brett Johnson

Mr Johnson promises an enlightening, engaging, and entertaining presentation for The Future of Cybersecurity Conference.  Brett will discuss his life as a United States Most Wanted Cybercriminal:  How he got involved in cybercrime, how he rose to the top, and how he ultimately fell and landed in prison for 7 1/2 years.  Brett will also detail the current state of organized cybercrime, and look ahead into what cybercrime might look like in all-too-near future.

AI in the NHS; Reviewing Reforms Proposal’s to Transform the Future of Healthcare

Robin Smith

The rise of the robots continues unabated with the recent report published by the Reform think tank stating that Artificial Intelligence (AI) could help transform UK healthcare. Across a number of key recommendations Reform’s report, published in January 2018, outlines how the NHS can become more efficient and deliver better outcomes for patients.  This session focuses on how AI is transforming information protection across the NHS, improving dlp and leveraging security assets to deliver improvement during continued tough times.

Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)

Darren Thomson

We are experiencing a “race to digitize” in every aspect of our lives and the rapid move toward hyper-connectivity is introducing huge potential benefits as well as new levels of risk from those who may do us harm. Old security techniques and strategies will not be “fit for purpose” in the future and we must “radically innovate”. In this session, Symantec will share the most radical aspects of its security research with the audience.

Coffee and networking
Talk and Q&A with our key note

we had Julian Assange at our March 18 Conference, we will be announcng our keynote very soon - Watch this space

Event close