Programme:
08:30
|
Registration and Networking
|
08:55
|
Chair's opening address
Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD Security in 2022
|
09:00
|
Plan Smart: The Future is SASE
Today’s work environment has been fast-tracked along its journey to hybrid working. As this evolution has driven an increasingly digital landscape, workers are now using cloud-based applications on a daily basis, giving rise to new advanced threats. The transition of the modern workplace from a place to an activity has also made the traditional concept of a network perimeter redundant. We are now in an era where security needs to be designed around an entirely new perimeter, built on identity and context. This is where Zero Trust and ZTNA (Zero Trust Network Access) comes in, as part of the journey towards SASE. Join Censornet’s CTO Richard Walters as he dispels the SASE one-size-fits-all myth, and instead explains how it can be adapted to serve the needs of a world where the perimeter is no longer “entombed in a box” but anywhere the enterprise needs it to be. Richard will also explore how the smart decisions you make today will optimise your future cloud and network security. |
09:15
|
From Asset Management to Asset Intelligence: Crossing the CAASM presented by Axonius
As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow more complex. But there’s good news: asset management has evolved. Today’s “asset intelligence” moves from a spreadsheet approach to an API-driven, always up-to-date view into all assets via integrations of existing tools, data correlation at scale, and querying capabilities to find and respond to gaps. Join this session to learn how asset intelligence and the emerging Cyber Asset Attack Surface Management (CAASM) category improves security hygiene, reduces manual work, and remediates gaps. |
09:30
|
Keynote Presentation: Sarah Armstrong Smith, 'Manipulating the masses in the Metaverse'
No sooner had we got used to the integration of IT, IoT and OT, along came the Metaverse, blurring the lines between the physical and digital worlds. In this session, Sarah Armstrong-Smith will discuss the opportunities and risks of living and working in mixed reality, where potentially nothing is as it seems! |
09:50
|
Fast and Furious Attacks: Using AI to Surgically Respond
Fast-moving cyber-attacks like ransomware can strike at any time, and security teams are often unable to react quickly enough. Join Oakley Cox, Director of Analysis at Darktrace, to learn how Autonomous Response uses Self-Learning AI’s understanding of ‘self’ to take targeted action to stop in-progress attacks, without disrupting your business.
|
10:05
|
Ransomware the Real Threat
Within the context of Ransomware-as-a-Service (RaaS) and its dramatic increase of use in attacks, this session will examine the goals and targets of these hackers / criminal organisations. By understanding both the motivation as well as the methodology of the attacks, organisations can be better prepared to successfully protect themselves. |
10:20
|
Keynote Presentation: Keren the Friendly Hacker - 'The Future of Cyber Security from A Friendly Hacker’s Perspective'
Keren Elazari – The Friendly Hacker This talk will explore how our Digital universe has expanded and changed in the last 2 years, the emerging technology trends and the security challenges that come with them - all from a hacker’s point of view. We’ll discuss how friendly hackers are stepping up, and how we can harness their help, and what we can learn from hackers about building our digital immune system. |
10:40
|
Security in an API-oriented world
In today's app-driven world, APIs are the cornerstone for growth and innovation. APIs power modern mobile, SaaS, web applications and drive IoT connectivity between connected devices. It is, therefore, no surprise that APIs are an increasingly popular target for cyber attacks. This session will cover:
|
10:55
|
Coffee and Networking
|
11:25
|
Supply Chain Cybersecurity: Reduce Your Risk
Why supply chain attacks affect every business and protecting against them is everyone’s business - not just security. Best practice guide on how to minimise the software supply chain risk, without business impact
|
11:40
|
Enhanced Threat Visibility - How to See More, But Respond with Lean resources
Threat visibility involves what seems like contradictory aims. On one hand, security teams need visibility into an ever expanding attack surface populated by new and evolving threats. That generally means more alarms. The second requirement for threat visibility is the ability to rank and filter alarms by importance. In that way, security teams need to know more but respond less – an inversion of the current situation. |
11:55
|
Seminar Change Over
|
12:00
|
Choose from one of three Seminar Sessions
|
12:30
|
Lunch and networking
|
13:30
|
Chairs Opening Address
|
13:35
|
The reason why ransomware is really HEATing up
When entire workforces went remote in 2020 because of the global pandemic, organizations pivoted quickly to new business models by migrating apps and services to the cloud to enable the anywhere, everywhere workforce. That’s resulted in business users spending an average of 75% of their workday working in a browser. These same digital enhancements, however, also ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Adaptive Threats (HEAT), which are used as beachheads for initiating ransomware, data theft, and account takeovers. During this insightful session, Menlo Security Senior Director of Cybersecurity Strategy, Mark Guntrip, discusses why HEAT attacks are the next-class of browser-based attacks taking advantage of today’s remote and hybrid workforce. |
13:50
|
Boost Efficiency With The Right Tech-Stack!
Stripping out the unnecessary and focusing optimising your use of the right tools will see a significant rise in the profitability of your business, getting this combo right will also boost team morale and see client value soar. We will discuss the combination of simple yet critical tool-based ingredients to boosting profit levels through enhanced efficiency. We will show you:
|
14:05
|
Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust
Join ThreatLocker Senior Solutions Engineer, Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. Understand how businesses are enhancing their cyber resilience and significantly limiting the damage ransomware can inflict with a Zero Trust architecture
|
14:20
|
Keynote Presentation:Greg van der Gaast - 'Shifting Security From Risk to Business'
The focus of Information Security has historically been about risk. However, convincing businesses to invest in something so intangible with no visible business returns has made getting support for security a struggle in many organisations. But what if we made security a revenue supporting, and even generating, business activity, which just happens to bring risk assurance along for the ride? |
14:45
|
Accelerating your secure digital transformation through SASE
As we find ourselves with an ever-expanding attack surface to protect, Check Point CISO and C-Suite Advisor for EMEA, Deryck Mitchelson, will explain why SASE should now be considered a critical enabler for digital transformation and Check Point’s vision for securing all workloads everywhere. |
15:00
|
Ransomware: Top Threats and Best Practices
Ransomware attacks worldwide have gone up by a whopping 102% in 2021 as compared to 2020. The truth is when it comes to ransomware, no business is too big or too small. Don’t fall victim to ransomware. Gather actionable knowledge now to fortify your cyber resilience. Protecting your tenant requires strategies and tactics to reduce the frequency and severity of data loss events in addition to maintaining backup copies of your data. Unitrends and Spanning will show you how to have the best cybersecurity defences. |
15:15
|
Cyber Security Predictions in a World of Phishing and Ransomware
Evolving threats and new tactics targeting the human element are forcing the cybersecurity market to change. Join Matt Aldridge, Principal Solutions Consultant at OpenText, to learn about upcoming trends and what's next. Get acquainted with data on phishing, ransomware and more. |
15:30
|
Coffee and Networking
|
16:00
|
Live ‘Fireside Chat’ Q & A – Col. John Doody &, Ciaran Martin, founding Chief Executive of the National Cyber Security Centre, part of GCHQ.
Colonel John Doody is the Author of the recent book “From Stripes to Stars,” & Director of Interlocutor Services, a company established to promote Information Assurance & Cyber Security issues nationally & internationally. Prior to this John served at CESG/GCHQ for 10 years in the role of Head of Information Assurance Customer Services. Ciaran Martin is Professor of Practice in the Management of Public Organisations. Blavatnik School of Government, University of Oxford. Prior to joining the School, Ciaran was the founding Chief Executive of the National Cyber Security Centre, part of GCHQ. He also has previously held senior positions in the Cabinet Office. Ciaran led a fundamental shift in the UK’s approach to cyber-security in the 2nd half of the last decade. With both of their GCHQ connections, a memorable encounter is anticipated. |
17:00
|
Chairs Closing Remarks
|
17:05
|
Join us for drinks and live DJ set from The Cyber House Party
Cyber House Party is a not-for-profit & volunteer led event, focused on fundraising for UK charities, raising awareness of community-affecting issues and generally having some fun! Founded during the 2020 pandemic, we have delivered a number of online and physical events, bringing together keynote speakers, over 1000 participants and raising almost £20,000 for charity. Our unique blend of content and live DJ’s has provided a welcome outlet for those looking for something both informative, and unique. We are privileged to be part of this event and we are looking forward to bringing you our resident Cyber House Party industry DJ’s. Live between 5pm and 7pm on Thursday March 17th will be: Marc Avery – Cyber Chain Alliance Stuart Wilkin – Lithify Tim Bateson – Slaughter and May Can’t wait to see you there! |