Registration - Breakfast - networking
Chair's opening address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Security in Europe 2019: Legislation, data protection and cyber threats


  • ·     The growing risks and costs of cybercrime to businesses
  • ·     The importance of cyber skills and strategies
  • ·     The threats to businesses and how to overcome them
  • ·     The latest tools and technologies to fight cyber-attacks
The Cyber Security Landscape

Richard Parlour

  • The cybersecurity landscape and the key threat actors
  • The international response
  • The linkage to GDPR
  • Impact of Brexit on cybersecurity
Harnessing UEBA and Machine Learning Technologies to Protect Enterprises from Insider Threats

Jonny Tennyson

Cybersecurity trends come and go, but machine learning looks to be here to stay. According to McAfee, 43% of of data breaches in recent years were caused by employees, contractors or suppliers, either negligently or maliciously. How can we harness UEBA and machine learning technologies to protect against the insider threat?

●      What does the insider threat looks like in 2019 ?

●      Where do UEBA and machine learning fit into the cybersecurity landscape?

●      Getting started with UEBA technology – the challenges and considerations

Generation Z: Young Coders, Cybersecurity and Community.

Femi Owolade-Coombes

Cybersecurity and Community.

Femi’s Keynote will cover the following areas:-

The Cyber Effect: looking at the impact of technology on young people

Amazing Young Hackers: what insight we can learn from their experience

Steps in the Right Direction: what young coders and their influencers should be thinking about

Young Coders Building Community: promoting diversity and inclusion

Leveraging AI for Dynamic & Surgical Autonomous Response for Cyber Defence

Dave Palmer

Proposing a new approach to cyber defence, which uses dynamic AI systems that can counter the activity of malicious threats. This new advanced AI technology can autonomously contain and monitor relevant threats, increasing confidence that a problem is emerging before automatically stopping the threat without interrupting normal business and employee activities.

Presentation from Anonymous Scandinavia

Anonymous Scandinavia

Be there to see Anonymous Scandinavia and their discussion!!!

We will also be facilitating a Q&A via Twitter - Live!                                                                   

Turning the tables - becoming the hunter rather than the hunted (MTD).

Charl Van Der Walt

Its fair to say that the security challenge is spiralling out of control. The number of vulnerabilities, threats, attacks & breaches is growing at an overwhelming rate, exacerbated by the inflationary impact of state-sponsored investment into hacking skills and technologies and the enabling power of cryptocurrencies. Regulatory pressures add additional pressure and elevate questions of Cyber Security to the board room, putting IT, Security & Risk Managers under immense pressure to balance digital transformation, a dynamic and confusing threat landscape, regulatory pressures and budgets.
In the end breaches are inevitable, and businesses to need to plan accordingly and invest prudently.
For these reasons kind of Attack and Compromise Detection program has an integral part of any mature cyber defence program. But like so many things in security – the devil is in the detail. It’s the ‘how’ that matters, as much as the ‘what’.
In this workshop we will share a set of principles, supported by concrete examples, that we have developed over many years of building a running a large scale Managed Detection and Response program.
Each of the ‘Principles for Successful Detection and Response’ is battle-tested and practical, helping you to think logically and intelligently about the role that a detection program will play in your organisation, and help ensure that the program meets its objective of increasing visibility, minimising dwell time and reducing the risk to your systems, without placing too much strain on your resources.
For each principle that we explore we will provide real-life examples or case studies from our own program.


Coffee and networking
One of 3 streams

Click HERE to view stream options

Seminar Change Over
One of 3 streams

Click HERE to view stream options

Lunch and networking
One of 3 streams

Click HERE to view stream options


Chairs Opening Address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

It’ll be “Thinking Out cLoud”

Stu Hirst

“What happens when you join a company & decide to take on a new role managing Cloud Security? What happens when it’s 4 companies at once?! Stu will present an insight into his early journey at Photobox in securing the cloud infrastructure & data for over 9 petabytes of photos”

Privileged Account Management: how to worry the right amount about real risks

Chris Heslop

• Reviewing attack vectors: where do the real threats to Privileged Accounts come from?

• Understanding the balance – human error versus cyber-attacks

• People, passwords and processes: where’s the weakest link in the chain?

• Assessing probability versus risk: when to focus on credentials rather than vulnerabilities


Weaponised data: how hacker tactics are infiltrating news, politics and high finance

Geoff White

The tech sector is beset by threats on all sides: mega-breaches of data, new EU legislation, and the Cambridge Analytica scandal to name but a few. Meanwhile hackers, whisteblowers, security researchers and investigative journalists are all targeting sensitive data, using the dark web and encrypted communications tools to stay hidden. Technology journalist Geoff White examines how organisations can navigate this hazardous new territory, and whether beyond the threats there are opportunities to win users’ trust.

The Abyss is Waving Back… The four paths that human evolution is charging down, and how we choose which one’s right…

Chris Roberts

As humans we have four evolutionary paths:
1.     We embrace nanotechnology and Bionanotechnology… we become more dependent upon machines and slowly move towards integration with the systems (we know we’re looking at 80% integration in the next 20 years at least)
2.     We embrace consciousness and some of us end up in New Zealand hanging out in an AS/400…bodies no longer needed
3.     AI wakes up, looks round wonders WHY humans are in the driving seat and takes over… OR we end up unplugging it and rebooting back to the 1900’s…
4.     The stumbling drunk…simply put we keep staring into the abyss and almost falling in, only to somehow manage to come back from the collapse, the challenge is HOW many times can we do this before we simply fall in?

Why Ladies Hacking Matters. An Introduction to LLHS and How Women Can Help Fill the Cyber Skills Gap.

Eliza May Austin

• The IT Skills Gap Then & Now 

• 2 Perspectives on The Cyber Skills Gap & The Cyber Gender Gap 

• LLHS Story so Far  

• Help us Grow!


Q&A PAnel Session
Coffee and networking
A one hour extensive interview with Edward Snowden will take place via live stream.

Edward Snowden

Edward Snowden, a former NSA contractor turned Whistle-blower on some of the US’s most closely protected documents and secrets, is a worldwide household name who evokes very strong feelings in many people. Now living in exile in Russia, the US Gov. wish him to face the severest penalties for his actions.

Edward will explain his actions & philosophy, as well as taking questions from the floor.

Chairing this part of the proceedings will be respected BBC & Channel 4 journalist, Geoff White.

Investigative journalist Geoff White’s exclusives have covered everything from developments in artificial intelligence to fraud in the internet dating industry.

He is currently writing a book on cybercrime, due for publication in 2020.

As to what we will learn or insights we will be given remains to be seen, but the encounter will surely be extremely memorable!

Event close