Registration - Breakfast - networking
Chair's opening address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Security in Europe 2019: Legislation, data protection and cyber threats


  • ·     The growing risks and costs of cybercrime to businesses
  • ·     The importance of cyber skills and strategies
  • ·     The threats to businesses and how to overcome them
  • ·     The latest tools and technologies to fight cyber-attacks
The Cyber Security Landscape

Richard Parlour

  • The cybersecurity landscape and the key threat actors
  • The international response
  • The linkage to GDPR
  • Impact of Brexit on cybersecurity
Harnessing UEBA and Machine Learning Technologies to Protect Enterprises from Insider Threats

Jonny Tennyson

Cybersecurity trends come and go, but machine learning looks to be here to stay. According to McAfee, 43% of of data breaches in recent years were caused by employees, contractors or suppliers, either negligently or maliciously. How can we harness UEBA and machine learning technologies to protect against the insider threat?

●      What does the insider threat looks like in 2019 ?

●      Where do UEBA and machine learning fit into the cybersecurity landscape?

●      Getting started with UEBA technology – the challenges and considerations

Generation Z: Young Coders, Cybersecurity and Community.

Femi Owolade-Coombes

Cybersecurity and Community.

Femi’s Keynote will cover the following areas:-

The Cyber Effect: looking at the impact of technology on young people

Amazing Young Hackers: what insight we can learn from their experience

Steps in the Right Direction: what young coders and their influencers should be thinking about

Young Coders Building Community: promoting diversity and inclusion

Leveraging AI for Dynamic & Surgical Autonomous Response for Cyber Defence

Dave Palmer

Proposing a new approach to cyber defence, which uses dynamic AI systems that can counter the activity of malicious threats. This new advanced AI technology can autonomously contain and monitor relevant threats, increasing confidence that a problem is emerging before automatically stopping the threat without interrupting normal business and employee activities.

Presentation from Anonymous Scandinavia

Anonymous Scandinavia

Be there to see Anonymous Scandinavia and their discussion!!!

We will also be facilitating a Q&A via Twitter - Live!                                                                   

Turning the tables - becoming the hunter rather than the hunted (MTD).

Charl Van Der Walt

Its fair to say that the security challenge is spiralling out of control. The number of vulnerabilities, threats, attacks & breaches is growing at an overwhelming rate, exacerbated by the inflationary impact of state-sponsored investment into hacking skills and technologies and the enabling power of cryptocurrencies. Regulatory pressures add additional pressure and elevate questions of Cyber Security to the board room, putting IT, Security & Risk Managers under immense pressure to balance digital transformation, a dynamic and confusing threat landscape, regulatory pressures and budgets.
In the end breaches are inevitable, and businesses to need to plan accordingly and invest prudently.
For these reasons kind of Attack and Compromise Detection program has an integral part of any mature cyber defence program. But like so many things in security – the devil is in the detail. It’s the ‘how’ that matters, as much as the ‘what’.
In this workshop we will share a set of principles, supported by concrete examples, that we have developed over many years of building a running a large scale Managed Detection and Response program.
Each of the ‘Principles for Successful Detection and Response’ is battle-tested and practical, helping you to think logically and intelligently about the role that a detection program will play in your organisation, and help ensure that the program meets its objective of increasing visibility, minimising dwell time and reducing the risk to your systems, without placing too much strain on your resources.
For each principle that we explore we will provide real-life examples or case studies from our own program.


Women in cybersecurity: What needs to be done?

Panel Session - speakers include:

Eliza May Austin - Ladies Of London Hacking Society

Stacy M Aruda - Rtd FBI Agent &  Executive Director for the Florida Information Sharing and Analysis Organization

Annabel Berry - CEO Sapphire

Despite the industry's best efforts, less than a third of the cybersecurity workforce is women, according to the 2019 ISC(2) figures. This panel will discuss the industry's progress so far, looking at initiatives such as mentoring and adjusting recruitment adverts to encourage more women to apply for cybersecurity jobs. Is the industry doing enough - what else needs to be done, and what part can men play? 

Coffee and networking
One of 3 streams

Click HERE to view stream options

Seminar Change Over
One of 3 streams

Click HERE to view stream options

Lunch and networking
One of 3 streams

Click HERE to view stream options


Chairs Opening Address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Checkpoint Presentation

Overview coming soon


Weaponised data: how hacker tactics are infiltrating news, politics and high finance

Geoff White

The tech sector is beset by threats on all sides: mega-breaches of data, new EU legislation, and the Cambridge Analytica scandal to name but a few. Meanwhile hackers, whisteblowers, security researchers and investigative journalists are all targeting sensitive data, using the dark web and encrypted communications tools to stay hidden. Technology journalist Geoff White examines how organisations can navigate this hazardous new territory, and whether beyond the threats there are opportunities to win users’ trust.

Attackers Prey on Uncertainty: How to Fail at Threat Detection

Scott Walker

It takes a great deal of visibility and context to detect and respond to sophisticated threats. Attackers usually target data, where enterprises have the least visibility and most uncertainty. In this session, we will explore new, sophisticated threats from inside and out, demonstrate how easy it is for adversaries to bypass traditional controls, and present a methodology to better protect data at scale, improve threat detection, and reduce uncertainty.  


Available Session

Overview Coming Soon


Q&A PAnel Session
Coffee and networking
Q&A with Frank Abagnale "Catch me if you can"

Frank Abagnale

Frank William Abagnale Jr. is an American security consultant known for his background as a former con man, check forger, and impostor between the ages of 15 and 21. He became one of the most notorious impostors, claiming to have assumed no fewer than eight identities, including an airline pilot, a physician, a U.S. Bureau of Prisons agent, and a lawyer. He escaped from police custody twice (once from a taxiing airliner and once from a U.S. federal penitentiary) before he was 22 years old. He served less than five years in prison before starting to work for the federal government. He is currently a consultant and lecturer for the FBI academy and field offices. He also runs Abagnale & Associates, a financial fraud consultancy company.

Abagnale's story inspired the Academy Award-nominated feature film Catch Me If You Can (2002), starring Leonardo DiCaprio as Abagnale and Tom Hanks as the FBI agent pursuing him, as well as a Broadway musical of that name and a TV series White Collar, which are based on the book Catch Me If You Can.

Frank will describe his fascinating life, and his take on cyber security in conversation with Geoff White, an investigative journalist, who has worked for both the BBC & Channel 4 TV.  He will then be taking questions from Geoff and from the audience.

Geoff White’s exclusives have covered everything from developments in artificial intelligence to fraud in the internet dating industry. He is currently writing a book on cybercrime for due for publication in 2020.

The encounter should be memorable.


Event close