Programme:
08:30
|
Registration and Networking
|
08:55
|
Chair's opening address
Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD Security in 2023
|
09:00
|
Security Automation - It's not if I Automate, It's When I Automate
In this session, you will learn about how the challenge of a constantly changing attack surface, ever increasing volume of alerts and tedious manual tasks have shaped the security automation market into what it is today. |
09:15
|
Protecting your identity: Is MFA Enough?
For years, security practices were structured around protecting a company’s critical infrastructure and assets by working to secure the perimeter. The assumption was that if you prevented someone from accessing your network with robust controls, then you could trust the people on the network to perform privileged actions. This was the model of a castle - where you construct a moat and strong walls - but this model does not scale to the distributed and often cloud-based applications that are used within enterprises today. |
09:30
|
2022 Threat Roundup – The emergence of mixed IT/IoT Threats
Forescout’s Vedere Labs has analyzed data gathered in 2022 about millions of attacks, hundreds of exploits and thousands of malware samples to share with the community insights that can help organizations to prepare for the 2023 threat landscape. Learn where attacks are coming from, what are their top targets, what vulnerabilities they exploit, what attackers do after initial access, what is the most common type of malware dropped, what are the trends in malware evolution and what they forecast for the future. Most importantly, learn strategies and actions that you can take to prepare for this evolving threat landscape. |
09:45
|
Mind the Gap…Skills, gender and allyship.
It is no secret the existing culture and perceived stereotypes within cybersecurity is a contributing factor to the gender gap our industry is facing and that the gender gap massively reinforces the ever growing skills gap. |
10:00
|
Beyond Human: Exploring the Power of Automation in the New Age of Cybersecurity
Get ready to join the battle of the bots! We'll explore the cutting-edge world of AI and Low Code technologies. The era of human effort in daily job functions is over, and we're on the brink of an arm's race between tech giants. Who will come out on top? Can we really replace our human SOC analysts with bots? |
10:15
|
How criminals think
Drawing on over a decade investigating some of the world's most notorious online communities - including 4 years hunting down the FBI's Most Wanted cyber-criminal - Jamie will take you on a whistle-stop tour around the hidden world of digital scammers, virtual con-artists and criminals. He will suggest lessons and tips to keep people and business safe from the ever-evolving threat. |
10:40
|
External Reconnaissance - Why We Need More Information but Less Administration?
A quick fire drive through why understanding what is happening on the dark web and across the internet can help decrease both risk and admin effort. |
10:55
|
Coffee and Networking
|
11:25
|
Choose from one of three Seminar Sessions
|
12:00
|
Lunch and networking
|
13:15
|
Chairs opening address
|
13:20
|
Can we change behaviours in real-time? A behavioural science approach
• Explore what’s not working about current approaches to security awareness and the human factor in security |
13:35
|
Identity-Centric Security & the SOCs to Match: Improve Malware Response for Better Ransomware Prevention
Enterprises have ransomware prevention basics covered – from data backups, EDR, and user training, to phishing detection, and threat intel. But there’s a significant blind spot lurking: lack of visibility into malware compromises (especially when the infected devices are unmanaged or under-managed) and the resulting passwords, web session cookies that have been siphoned. Without immediate knowledge of this data that criminals are using to target the enterprise for ransomware and other costly cyberattacks, SOC teams have become accustomed to a machine-centric malware infection response. The result is exposed employee, contractor, and partner identities, exploitable until the affected users, applications, and devices are properly remediated. It’s been a challenge for most organizations – until now. |
13:50
|
It's Human Nature
Security is a people problem. People are the solution. Human nature dictates and influences so much of our lives. However the security 'industry' and expectations around behaviour, awareness training etc. fail to recognise this. Lets talk about how we need to understand people, instincts and behaviours in order to deliver security and make people our greatest asset. |
14:10
|
How to Optimize your Security Data and reduce SOC TCO with Data Pipelines
Securing your organisation no longer comes down to acquiring the right tools and building the best policies. Additionally, managing the flood of noisy, high volume security data means the difference between detecting a breach and missing a critical alert. Join this session to learn how data pipelines put choice and control over data back into the hands of security teams, helping get the right data, in the right formats, to the right places, all while reducing your SOC TCO. |
14:25
|
Leading Trends in Application Security and how to deal with them
We asked what major organisations with significant software security initiatives are doing for application security so you don't have to! |
14:40
|
Best Practices for Infrastructure and Data Security
Organisations are tasked with maintaining operational resilience while being faced with an ever changing threat and compliance landscape. Against this backdrop, Security, IT and Compliance teams are being tasked with protecting an ever increasing set of infrastructure and sensitive data. |
15:00
|
Fixing the future with new solutions to old problems
Why are we still not achieving the basics, when it comes to data security? Achieving the Principle of Least Privilege or compliance with GDPR is almost impossible without modern solutions and automation. |
15:15
|
How Sage empowers teams to deliver customer-centric security
During this session, Pluralsight will share insights from their latest research into tech skill development, which highlights cybersecurity and cloud as the areas with the largest skills gap, and why you need to be people-first if you want to be cloud-first.
|
15:30
|
Coffee and Networking
|
16:00
|
Live ‘Fireside Chat’ Q&A with Steven Bartlett
|
17:00
|
Chairs Closing Remarks
|