Registration - Breakfast - networking
Chair's opening address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Security in Europe 2020: Legislation, data protection and cyber threats


  • ·     The growing risks and costs of cybercrime to businesses
  • ·     The importance of cyber skills and strategies
  • ·     The threats to businesses and how to overcome them
  • ·     The latest tools and technologies to fight cyber-attacks
The Cyber Security Landscape

Richard Parlour

  • The cybersecurity landscape and the key threat actors
  • The international response
  • The linkage to GDPR
  • Impact of Brexit on cybersecurity
Defending against adversaries – what tactics can sport and warfare teach us to actively defend our networks from threat actors.

Mark Howell

  • Tactics lessons from sport and warfare – what works when defending
  • Honeypots – from science project to modern day cyber solution
  • Attackers use deception, defenders must
  • How can we apply these tactics in the cyber-realm
How to wear two hats - life as a DPO in a SME.

Daniel Selman

In this presentation Daniel will talk about the challenges and opportunities of being the Data Protection Officer in a small to medium enterprise, how you strike the right balance between independently assessing and assuring compliance whilst making sure you’re not just ‘marking your own homework’. 

A New Era of Cyber Threats: The Shift to Self Learning, Self Defending Networks

Dave Palmer

The Enterprise Immune System: The World’s Leading AI

• Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats as seen Fish Tank installed into North American Casino, Darktrace identified anomalous data transfers to an external source and major case of data exfiltration avoided.
• How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time
• How to achieve 100% visibility of your entire business including cloud, network and IoT environments
• Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk as seen when Employee logged into personal email and inadvertently downloaded stealthy, malicious ransomware which was identified and dealt with in just 33 seconds. 


Cybercrime case studies:

Sandip Patel QC

  1. Face Book Hacker
  2. Anonymous
  3. The Boy Who Almost Broke the Internet


Why understanding your attack surface matters

Charl Van Der Walt

What does it mean to obtain and use ‘cyber intelligence’ in a manner that effectively prioritises scarce resource across the full spectrum of ‘Assess, Protect, Detect & Respond’ cyber security disciplines? Threats in cyber-space arise for two main reasons; weakness in IT infrastructure and an interest taken by an attacker. Most businesses know they must mitigate cyberthreats for their own good but also because regulators require them to.

But the threat landscape is ever changing as technology evolves and attackers innovate. Ensuring an organisation has the skills, agility and underlying platforms and processes to understand, detect and manage cyberthreats is one of the most compelling challenges faced by any 21st century business. Regulatory changes have pushed to issue up to board level.

What should the priority be for an organisation that wants to improve its cyber security posture, finding and removing vulnerabilities in its infrastructure or assessing the external threats it faces?

Women in cybersecurity: What needs to be done?

Panel Session - speakers include:

Eliza May Austin - Ladies Of London Hacking Society

Stacy M Aruda - Rtd FBI Agent &  Executive Director for the Florida Information Sharing and Analysis Organization

Annabel Berry - CEO Sapphire

Despite the industry's best efforts, less than a third of the cybersecurity workforce is women, according to the 2019 ISC(2) figures. This panel will discuss the industry's progress so far, looking at initiatives such as mentoring and adjusting recruitment adverts to encourage more women to apply for cybersecurity jobs. Is the industry doing enough - what else needs to be done, and what part can men play? 

Coffee and networking
One of 3 streams

Click HERE to view stream options

Seminar Change Over
One of 3 streams

Click HERE to view stream options

Lunch and networking
One of 3 streams

Click HERE to view stream options


Chairs Opening Address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Cloud Security – Nice to have or completely essential? An examination of cloud security risks and how to mitigate them in a corporate environment.

Richard Flanders

Protecting data and assets in the public and private cloud can seem a complex problem for companies looking to benefit from the business agility and ease-of-use provided by those platforms. With the correct approach to implementing cloud security, risk of data loss and intrusion can be greatly reduced. This presentation shows how the correct choice and deployment of security tools can protect every business across multiple cloud infrastructures.


Lights Out: How Hackers Target Critical Infrastructure

Geoff White

Cyber crime has surged up the news agenda and now presents a very real risk to our critical services: hospitals, political processes and the energy networks have all become targets.

Investigative journalist Geoff White has spent years researching the shadowy nexus of criminal hackers, state-sponsored cyber attackers and hacktivists movements behind this evolving threat.

In this talk he will discuss real-world examples of attacks on critical national infrastructure, and what they tell us about the increasing convergence of tactics, tools and psychology among previously disparate cyber threat groups.


Attackers Prey on Uncertainty: How to Fail at Threat Detection

Scott Walker

It takes a great deal of visibility and context to detect and respond to sophisticated threats. Attackers usually target data, where enterprises have the least visibility and most uncertainty. In this session, we will explore new, sophisticated threats from inside and out, demonstrate how easy it is for adversaries to bypass traditional controls, and present a methodology to better protect data at scale, improve threat detection, and reduce uncertainty.  


Why we need to think beyond security and privacy

Emerald De Leeuw

We all want to have a bright future alongside technology. While we have acquired skills in keeping bad actors out and creating good data protection controls, the negative consequences of poor data management practices have never been more apparent. The advertising-based attention economy is making us less smart and it is eroding our relationships. In addition to that, we are finding ourselves in a world where we have to question our reality every single day. Data protection and cybersecurity form part of the solution but isn’t enough. This talk focuses on digital ethics and how humane technology has to become part of our conversation.



Coffee and networking


Overview Coming Soon


Event close