Registration and Networking
Chair's opening address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Security in 2022

  • The changing face of cyber crime: 2022 cyber threats and new methods to protect against them
  • The risks and costs of cybercrime to businesses
  • Cyber skills: The importance of education and hiring the right people
  • Outlooks on AI & IOT
Plan Smart: The Future is SASE

Richard Walters

Today’s work environment has been fast-tracked along its journey to hybrid working. As this evolution has driven an increasingly digital landscape, workers are now using cloud-based applications on a daily basis, giving rise to new advanced threats. The transition of the modern workplace from a place to an activity has also made the traditional concept of a network perimeter redundant. We are now in an era where security needs to be designed around an entirely new perimeter, built on identity and context. This is where Zero Trust and ZTNA (Zero Trust Network Access) comes in, as part of the journey towards SASE.

Join Censornet’s CTO Richard Walters as he dispels the SASE one-size-fits-all myth, and instead explains how it can be adapted to serve the needs of a world where the perimeter is no longer “entombed in a box” but anywhere the enterprise needs it to be. Richard will also explore how the smart decisions you make today will optimise your future cloud and network security.

From Asset Management to Asset Intelligence: Crossing the CAASM presented by Axonius

Fabian Libeau

As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow more complex. But there’s good news: asset management has evolved. Today’s “asset intelligence” moves from a spreadsheet approach to an API-driven, always up-to-date view into all assets via integrations of existing tools, data correlation at scale, and querying capabilities to find and respond to gaps. Join this session to learn how asset intelligence and the emerging Cyber Asset Attack Surface Management (CAASM) category improves security hygiene, reduces manual work, and remediates gaps.

Keynote Presentation: Sarah Armstrong Smith, 'Manipulating the masses in the Metaverse'

Sarah Armstrong-Smith

No sooner had we got used to the integration of IT, IoT and OT, along came the Metaverse, blurring the lines between the physical and digital worlds.

In this session, Sarah Armstrong-Smith will discuss the opportunities and risks of living and working in mixed reality, where potentially nothing is as it seems!

Fast and Furious Attacks: Using AI to Surgically Respond

Dr Oakley Cox

Fast-moving cyber-attacks like ransomware can strike at any time, and security teams are often unable to react quickly enough. Join Oakley Cox, Director of Analysis at Darktrace, to learn how Autonomous Response uses Self-Learning AI’s understanding of ‘self’ to take targeted action to stop in-progress attacks, without disrupting your business.

  • Learn how Autonomous Response knows exactly the right action to take, at the right time, to contain an in-person attack
  • How AI takes precise action to neutralize threats on the behalf of security teams
  • Use of real-world threat finds to illustrate the workings of Autonomous Response technology
Ransomware the Real Threat

Patrick Grillo

Within the context of Ransomware-as-a-Service (RaaS) and its dramatic increase of use in attacks, this session will examine the goals and targets of these hackers / criminal organisations. By understanding both the motivation as well as the methodology of the attacks, organisations can be better prepared to successfully protect themselves.

Keynote Presentation: Keren the Friendly Hacker - 'The Future of Cyber Security from A Friendly Hacker’s Perspective'

Keren Elazari – The Friendly Hacker

This talk will explore how our Digital universe has expanded and changed in the last 2 years, the emerging technology trends and the security challenges that come with them -   all from a hacker’s point of view. We’ll discuss how friendly hackers are stepping up, and how we can harness their help, and what we can learn from hackers about building our digital immune system.

Security in an API-oriented world

Daniele Molteni

In today's app-driven world, APIs are the cornerstone for growth and innovation. APIs power modern mobile, SaaS, web applications and drive IoT connectivity between connected devices. It is, therefore, no surprise that APIs are an increasingly popular target for cyber attacks.

This session will cover:

  • How APIs drive today’s businesses
  • Key API security trends and risks
  • Securing APIs with Cloudflare API Shield
Coffee and Networking
Supply Chain Cybersecurity: Reduce Your Risk

Chris Waynfort

Why supply chain attacks affect every business and protecting against them is everyone’s business - not just security. Best practice guide on how to minimise the software supply chain risk, without business impact

  1. Software Supply Chains - how every business is a software business
  2. Challenges for the defenders - especially when most of the code isn’t theirs
  3. Securing code and APIs at runtime, without business impact
Enhanced Threat Visibility - How to See More, But Respond with Lean resources

Ben Charles

Threat visibility involves what seems like contradictory aims. On one hand, security teams need visibility into an ever expanding attack surface populated by new and evolving threats. That generally means more alarms. The second requirement for threat visibility is the ability to rank and filter alarms by importance. In that way, security teams need to know more but respond less – an inversion of the current situation.

We will analyse how any security team can affordably expand threat visibility while limiting false alarms to see cyberattacks earlier and more clearly.

In this session you’ll learn:
• Real world survey results from CIO’s utilising small security teams
• How traditional point solutions add complexity and cost
• Ransomware is not a malware problem, it’s a visibility issue

Seminar Change Over
Choose from one of three Seminar Sessions

Click HERE to view stream options

Lunch and networking
Chairs Opening Address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

The reason why ransomware is really HEATing up

Mark Guntrip

When entire workforces went remote in 2020 because of the global pandemic, organizations pivoted quickly to new business models by migrating apps and services to the cloud to enable the anywhere, everywhere workforce. That’s resulted in business users spending an average of 75% of their workday working in a browser. These same digital enhancements, however, also ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Adaptive Threats (HEAT), which are used as beachheads for initiating ransomware, data theft, and account takeovers.

During this insightful session, Menlo Security Senior Director of Cybersecurity Strategy, Mark Guntrip, discusses why HEAT attacks are the next-class of browser-based attacks taking advantage of today’s remote and hybrid workforce.

Boost Efficiency With The Right Tech-Stack!

Wilson Sanders

Stripping out the unnecessary and focusing optimising your use of the right tools will see a significant rise in the profitability of your business, getting this combo right will also boost team morale and see client value soar. We will discuss the combination of simple yet critical tool-based ingredients to boosting profit levels through enhanced efficiency.

We will show you:

  • How to identify (and strip out) redundant tools and processes that cost you money and time
  • The steps to avoiding dependency on single team members • How to boost employee productivity without the additional stress and workload
  • How to harness visibility and automation to counter the skills shortage and build value
Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust

Ben Jenkins

Join ThreatLocker Senior Solutions Engineer, Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. Understand how businesses are enhancing their cyber resilience and significantly limiting the damage ransomware can inflict with a Zero Trust architecture


Keynote Presentation:Greg van der Gaast - 'Shifting Security From Risk to Business'

Greg van der Gaast

The focus of Information Security has historically been about risk. However, convincing businesses to invest in something so intangible with no visible business returns has made getting support for security a struggle in many organisations. But what if we made security a revenue supporting, and even generating, business activity, which just happens to bring risk assurance along for the ride? 

Accelerating your secure digital transformation through SASE

Deryck Mitchelson

As we find ourselves with an ever-expanding attack surface to protect, Check Point CISO and C-Suite Advisor for EMEA, Deryck Mitchelson, will explain why SASE should now be considered a critical enabler for digital transformation and Check Point’s vision for securing all workloads everywhere.

Ransomware: Top Threats and Best Practices

Wayne Jervis

Ransomware attacks worldwide have gone up by a whopping 102% in 2021 as compared to 2020. The truth is when it comes to ransomware, no business is too big or too small. Don’t fall victim to ransomware. Gather actionable knowledge now to fortify your cyber resilience. Protecting your tenant requires strategies and tactics to reduce the frequency and severity of data loss events in addition to maintaining backup copies of your data. Unitrends and Spanning will show you how to have the best cybersecurity defences. 

Cyber Security Predictions in a World of Phishing and Ransomware

Matt Aldridge

Evolving threats and new tactics targeting the human element are forcing the cybersecurity market to change. Join Matt Aldridge, Principal Solutions Consultant at OpenText, to learn about upcoming trends and what's next. Get acquainted with data on phishing, ransomware and more.

Coffee and Networking
Live ‘Fireside Chat’ Q & A – Col. John Doody &, Ciaran Martin, founding Chief Executive of the National Cyber Security Centre, part of GCHQ.

Ciaran Martin

Colonel John Doody is the Author of the recent book “From Stripes to Stars,” & Director of Interlocutor Services,  a company established to promote Information Assurance & Cyber Security issues nationally & internationally.

Prior to this John served at CESG/GCHQ for 10 years in the role of Head of Information Assurance Customer Services.

Ciaran Martin is Professor of Practice in the Management of Public Organisations. Blavatnik School of Government, University of Oxford.

Prior to joining the School, Ciaran was the founding Chief Executive of the National Cyber Security Centre, part of GCHQ. He also has previously held senior positions in the Cabinet Office.

Ciaran led a fundamental shift in the UK’s approach to cyber-security in the 2nd half of the last decade. 

With both of their GCHQ connections, a memorable encounter is anticipated.

Chairs Closing Remarks
Join us for drinks and live DJ set from The Cyber House Party

Cyber House Party is a not-for-profit & volunteer led event, focused on fundraising for UK charities, raising awareness of community-affecting issues and generally having some fun! Founded during the 2020 pandemic, we have delivered a number of online and physical events, bringing together keynote speakers, over 1000 participants and raising almost £20,000 for charity.

Our unique blend of content and live DJ’s has provided a welcome outlet for those looking for something both informative, and unique.

We are privileged to be part of this event and we are looking forward to bringing you our resident Cyber House Party industry DJ’s.

Live between 5pm and 7pm on Thursday March 17th will be:

Marc Avery – Cyber Chain Alliance

Stuart Wilkin – Lithify

Tim Bateson – Slaughter and May

Can’t wait to see you there!