Seminars

Here is a list of all confirmed Seminars for 2017. You can add these to your planner by clicking the 'add to schedule' button

  • Wed 4th Oct 10:00 - 10:40
  • Opening Keynote: Where IT and Physics Collide Add to Schedule Professor Brian Cox OBE  |     |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 10:00 to 10:40

    Opening Keynote: Where IT and Physics Collide

    Rock star physicist and TV personality Professor Brian Cox will explore the incredible world of where science and IT collide. With the end of Moore’s Law seemingly only a few years away and the data centres powering the cloud having to expand exponentially to keep ahead of demand the current trajectory we are on seems unsustainable.

     

    Technologies such as IOT, artificial intelligence, and analytics are all booming and will require ever more storage, power and computing muscle. We store everything and want to analyse it, automate it and access it immediately wherever we are and so far only 40% of the world is online.

     

    Physics increasingly holds the answer as scientists armed with this incredible computing power work on game changing technologies such as graphene and quantum computing. Professor Cox will remove the science fiction from the science fact and help us all understand how will these technologies will impact IT and cyber security and all of us.  

    Speaker

    Photo Speaker Name Profile
    Professor Brian Cox OBE Professor Brian Cox OBE View Profile
  • Wed 4th Oct 11:00 - 11:30
  • Business as Usual in a Digital War Zone Add to Schedule Brad Anderson  |   Microsoft  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 11:00 to 11:30

    Business as Usual in a Digital War Zone

    The increasing sophistication and damage from online threats has escalated in parallel with increasing demands for business productivity, interoperability, and anytime access. The ability to work amidst and within these two exponential trends is this era's single most complex technical challenge. In this presentation Brad Anderson (Corp. VP, Microsoft) will discuss in detail new technology pioneered by Microsoft to protect organizations while allowing them to improve collaboration, data access, and productivity.

    Speaker

    Photo Speaker Name Profile
    Brad Anderson Brad Anderson View Profile
  • The Precision Advantage Add to Schedule Rohit Ghai   |   RSA, a Dell Technologies Business  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 4th Oct 11:00 to 11:30

    The Precision Advantage

    The past year has brought an unprecedented focus on global cybersecurity. Threats previously unimaginable now play out regularly. The risk exposure is escalating as businesses across every industry embrace digital transformation and technologies to avoid disruption. To be successful, security practitioners need a more precise approach to security – a more personal approach.

    Speaker

    Photo Speaker Name Profile
    Rohit Ghai Rohit Ghai View Profile
  • Brought to you by LogRhythm Add to Schedule

    CARM Theatre

    Wed 4th Oct 11:00 to 11:30

  • Meeting the Privilege Account Challenge: Security vs Productivity Add to Schedule Scott Walker  |   Bomgar   |   IAM

    IAM Theatre

    Wed 4th Oct 11:00 to 11:30

  • The Enemy Within Add to Schedule Matt Lock  |   Varonis Systems  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 4th Oct 11:00 to 11:30

    The Enemy Within

    How can organisations protect their data from an internal breach whilst providing an open, sharing culture within teams and global departments? How can organisations provide assurance to their customers that personal data is securely managed, controlled and retained appropriately? The growth of data has been unprecedented and the challenges associated with managing this information have become almost impossible without a framework that provides clear visibility of where sensitive data is located, who has access to it, who is touching it and who is potentially stealing this information. The Varonis Data Security Platform offer a clear path to managing these risks.

    Speaker

    Photo Speaker Name Profile
    Matt Lock Matt Lock View Profile
  • The Future of Cybersecurity Add to Schedule Oliver Eckel  |   Cognosec   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 4th Oct 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    Oliver Eckel Oliver Eckel View Profile
  • Meeting the challenges of securing a public cloud Add to Schedule Dinesh Majrekar  |   ServerChoice   |   Cloud Security

    Cloud Security Theatre

    Wed 4th Oct 11:00 to 11:30

    Meeting the challenges of securing a public cloud

    ServerChoice explores the technical and regulatory challenges involved in securing public cloud deployments. It includes quick-win steps organisation can take and how you can leverage different areas of expertise, both in-house and from trusted third-parties. We'll also explore what other options are available.

    Speaker

    Photo Speaker Name Profile
    Dinesh Majrekar Dinesh Majrekar View Profile
  • Brought to you by Redacted Firm Add to Schedule FC  |   Redacted Firm  |   Cyber Hack

    Cyber Hack Theatre

    Wed 4th Oct 11:00 to 11:50

    Speaker

    Photo Speaker Name Profile
    FC FC View Profile
  • Wed 4th Oct 11:40 - 12:10
  • What’s New & What’s Next in the AWS Cloud? Add to Schedule Ian Massingham   |   Amazon Web Services  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 11:40 to 12:10

    What’s New & What’s Next in the AWS Cloud?

    In 2006, Amazon Web Services (AWS) began offering IT infrastructure services to businesses in the form of web services -- now commonly known as cloud computingToday, Amazon Web Services provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers millions of businesses in 190 countries around the world. In 2016, AWS announced well over 1000 new services & features. Join this session for a recap of the latest new services and a look at what’s hot & what’s next for customers using the AWS Cloud!

    Speaker

    Photo Speaker Name Profile
    Ian Massingham Ian Massingham View Profile
  • The Next Revolution Add to Schedule Mikko Hypponen  |   F-Secure  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 4th Oct 11:40 to 12:10

    The Next Revolution

    We've lived our lives in the middle of a revolution: the internet revolution. During our lifetime all computers started talking to each other over the internet. Technology around us is changing faster than ever. We've already become dependent of our digital devices, and this is just the beginning. As connected devices open new opportunities for imagination, they also open up new opportunities for online criminals. Where are we today? Where are we going? And how are we ever going to secure a billion new devices that will be going online over the next decade?

    Speaker

    Photo Speaker Name Profile
    Mikko Hypponen Mikko Hypponen View Profile
  • Rise of the EMPIRE Add to Schedule Eran Ashkenazi  |   SentinelOne   |   CARM

    CARM Theatre

    Wed 4th Oct 11:40 to 12:10

    Rise of the EMPIRE

    Dealing with today’s cyber threats requires a fundamentally different approach. In recent attacks such as the DNC hack and the wide spread attack uncovered by Kaspersky Labs in over 40 countries, we've seen the increased use of fileless attack vectors, which can easily bypass legacy AV. The truth is, legacy AV and other prevention-only solutions simply don’t cut it. Today’s advanced malware, exploits, and stealthy insider attacks will blow right by most static prevention solutions in a fraction of the time it takes to get updated with the latest threat signatures, and even then sometimes they won't work.

    Speaker

    Photo Speaker Name Profile
    Eran Ashkenazi Eran Ashkenazi View Profile
  • Stand and deliver, your money or your data! Add to Schedule James Burchell  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 4th Oct 11:40 to 12:10

    Stand and deliver, your money or your data!

    Cyber crime activity is growing fast and evolving at pace, becoming both more aggressive and technically proficient. As such it is a major and growing threat to UK businesses accounting for 53% of total UK crime.

    Both the NCA and FBI have reported significant growth in the number of technically competent cyber criminals active within the UK with ransomware infections quadrupling in 2016 and an estimated 4,000 attacks seen each day.

    How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by advanced payloads such as ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • The way we work has changed. Has your security? Add to Schedule

    Cloud Security Theatre

    Wed 4th Oct 11:40 to 12:10

    The way we work has changed. Has your security?

    By 2018, Gartner estimates that 25% of corporate data traffic will bypass the perimeter. As organisations evolve their IT stack, traditional security approaches/architectures need to be reconsidered. This interactive session will review some of the new risks introduced by SaaS/IaaS adoption and show how to effectively mitigate these risks using new approaches to security architecture. Presenters will review best practices around the transition of a security architecture itself to the cloud, utilizing customer case studies.

  • Wed 4th Oct 12:00 - 12:50
  • Web Application Security – Why so hard? Add to Schedule Tech Leaders  |  Cyber Hack

    Cyber Hack Theatre

    Wed 4th Oct 12:00 to 12:50

    Speakers

    Speaker Name Profile
    Graham Bacon View Profile
    Nick Blundell View Profile
  • Wed 4th Oct 12:20 - 12:50
  • Reconciling Regulatory Requirements with Technology Add to Schedule Steve Mulhearn  |   Fortinet  |   CARM

    CARM Theatre

    Wed 4th Oct 12:20 to 12:50

    Reconciling Regulatory Requirements with Technology

    The clock is ticking and GDPR is getting closer.  However GDPR is not an industry standard that relies on technology to tick the boxes, how to be compliant with the regulation will be unique to each organization.  The one constant however is the role that a secure network must play in data protection.  Whether data is being created, is in motion or at rest, protecting it from cyber-attacks requires an underlying network that is secure.  This session will focus on the role of network level security within the GDPR framework and how it can support an organization’s GDPR compliance efforts.

    Speaker

    Speaker Name Profile
    Steve Mulhearn View Profile
  • Brought to you by RSA Add to Schedule

    IAM Theatre

    Wed 4th Oct 12:20 to 12:50

  • Minority Report: A Predictive “Pre-crime” Approach Requires a Human Focus Add to Schedule Carl Leonard  |   Forcepoint Security Labs  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 4th Oct 12:20 to 12:50

    Minority Report: A Predictive “Pre-crime” Approach Requires a Human Focus

    In Philip K. Dick’s 1956 “The Minority Report,” murder ceased to occur due to the work of the “Pre-Crime Division,” which anticipated and prevented violent killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity—especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a pre-crime division, empowered to intervene before a violation is ever committed. We'll examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.

    Speaker

    Photo Speaker Name Profile
    Carl Leonard Carl Leonard View Profile
  • Protect Your Data from Data Exfiltration Add to Schedule Martin Wellsted  |   EfficientIP  |   Cloud Security

    Cloud Security Theatre

    Wed 4th Oct 12:20 to 12:50

    Protect Your Data from Data Exfiltration

    Our 2017 Security Survey showed that 32% of companies suffered data theft via DNS.
    You may not realize that your current DNS security system leaves the door wide open for hackers to easily exfiltrate your data using 2 techniques: bypassing DNS protocol embedding confidential data within the DNS request or creating a DNS tunnel to take control of workstation and file transfer data outside your network.
    Security solutions like firewalls or proxies are unable to detect data theft.
    What are the best practices to detect and mitigate data exfiltration via DNS to avoid GDPR non-compliance?

    Speaker

    Photo Speaker Name Profile
    Martin Wellsted Martin Wellsted View Profile
  • PANEL: Future of Cyber Security Add to Schedule Panel  |  IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 12:20 to 13:10

    PANEL: Future of Cyber Security

    Is it even possible to ever be fully secure? What are the very latest attack vectors? Everyone says their technology is the solution you need – what is the true picture? To help you answer these questions and many others we have assembled what is probably the finest collection of cyber security experts in the world. This is an extraordinary opportunity to get access to the most current thinking and truly understand what the future has in store for us all.

    Speakers

    Photo Speaker Name Profile
    James Lyne James Lyne View Profile
    Mikko Hypponen Mikko Hypponen View Profile
    Rik Ferguson Rik Ferguson View Profile
    Wendy Nather Wendy Nather View Profile
  • Wed 4th Oct 13:00 - 13:30
  • Impact of Encryption on Networks - Key to understanding TLS 1.3 Add to Schedule Scott Register  |   Ixia (Keysight Technologies)  |   CARM

    CARM Theatre

    Wed 4th Oct 13:00 to 13:30

    Speaker

    Photo Speaker Name Profile
    Scott Register Scott Register View Profile
  • Brought to you by HID Add to Schedule

    IAM Theatre

    Wed 4th Oct 13:00 to 13:30

  • Cyber Threat Intelligence: The truth behind threat hunting Add to Schedule Dr Mary Haigh   |   BAE Systems Applied Intelligence   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 4th Oct 13:00 to 13:30

    Cyber Threat Intelligence: The truth behind threat hunting

    Threat hunting is a term being generously used in connection with a whole host of cyber security products to increase their market appeal. It involves a security analyst sorting through threat intelligence and other data and using their knowledge, building a hypothesis about potential threats to the resource they’re protecting.
    But raising a generic security alert is not the same as operating a significant threat hunting tool. In this talk, Mary Haigh, Product Director at BAE Systems Applied Intelligence will uncover the truths behind true threat hunting and how it’s more than just threats and anomalies.

    Speaker

    Photo Speaker Name Profile
    Dr Mary Haigh Dr Mary Haigh View Profile
  • Brought to you by TrapX Add to Schedule

    Future of Threat Intelligence Theatre

    Wed 4th Oct 13:00 to 13:30

  • Email Security – growing in threats, quickening in pace Add to Schedule Tech Leaders  |  Cloud Security

    Cloud Security Theatre

    Wed 4th Oct 13:00 to 13:30

    Email Security – growing in threats, quickening in pace

    1m 22s is the median time-to-click in most phishing expeditions. How do you educate your users? How do you encourage them to pause and THINK before clicking?

    In this session Mimecast shares real-world stories and demonstrates how hackers work, the results of which will alarm you, in addition offer guidance that you can share with your employees. They will also cover what other security vendors are missing – the results will surprise you!

    It’s worth a few minutes of your time, isn’t it?

    Speakers

    Photo Speaker Name Profile
    Bob Adams Bob Adams View Profile
    Julian Martin Julian Martin View Profile
  • Wed 4th Oct 13:40 - 14:10
  • Enterprise computation: the next frontier in AI and Data Science Add to Schedule Conrad Wolfram  |   Wolfram Research  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 13:40 to 14:10

    Speaker

    Photo Speaker Name Profile
    Conrad Wolfram Conrad Wolfram View Profile
  • Three threats that should be keeping you awake at night Add to Schedule Graham Cluley  |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 4th Oct 13:40 to 14:10

    Three threats that should be keeping you awake at night

    If you're losing sleep over state-sponsored attackers you're approaching things the wrong way. Yes, intelligence agencies are hacking some firms, but chances are that they're not interested in yours.
    Financially-motivated hacks and frauds are on the rise because it has become so easy for attackers to steal large amounts of money. And there's no need for criminals to know how to write malware to potentially steal millions from your business.

    Graham Cluley describes the ways high street businesses are losing data and allowing fraudsters to steal sometimes vast amounts of money, and what you can do to reduce the chances of your firm being the next victim.

    Speaker

    Photo Speaker Name Profile
    Graham Cluley Graham Cluley View Profile
  • Understanding the Depth of the UK Ransomware Problem Add to Schedule Helge Husemann  |   Malwarebytes   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 4th Oct 13:40 to 14:10

    Understanding the Depth of the UK Ransomware Problem

    It's no secret that, even for the most seasoned cyber security professionals, the speed of change in the industry over the past year has been unprecedented. Perpetrators, targets, and motives have never been so varied. Ransomware continues to be a major problem and is only getting worse.

    Speaker

    Photo Speaker Name Profile
    Helge Husemann Helge Husemann View Profile
  • Stand and deliver, your money or your data! Add to Schedule James Burchell  |   Sophos   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 4th Oct 13:40 to 14:10

    Stand and deliver, your money or your data!

    Cyber crime activity is growing fast and evolving at pace, becoming both more aggressive and technically proficient. As such it is a major and growing threat to UK businesses accounting for 53% of total UK crime.

    Both the NCA and FBI have reported significant growth in the number of technically competent cyber criminals active within the UK with ransomware infections quadrupling in 2016 and an estimated 4,000 attacks seen each day.

    How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by advanced payloads such as ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • Leveraging Context Aware Security from the Core Add to Schedule Dr. Malcolm Murphy  |   Infoblox  |   CARM

    CARM Theatre

    Wed 4th Oct 13:40 to 14:10

    Speaker

    Speaker Name Profile
    Dr. Malcolm Murphy View Profile
  • Wed 4th Oct 14:20 - 14:50
  • Brought to you by Sophos Add to Schedule James Lyne  |   Sophos  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 14:20 to 14:50

    Speaker

    Photo Speaker Name Profile
    James Lyne James Lyne View Profile
  • The Future of AI: From Sophisticated to Automated Add to Schedule Dave Palmer  |   Darktrace   |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 4th Oct 14:20 to 14:50

    Speaker

    Photo Speaker Name Profile
    Dave Palmer Dave Palmer View Profile
  • Brought to you by Gemalto Add to Schedule

    CARM Theatre

    Wed 4th Oct 14:20 to 14:50

  • Don't ask, don't tell - the virtues of privacy by design Add to Schedule Eleanor McHugh  |   Innovative Identity Solutions  |   IAM

    IAM Theatre

    Wed 4th Oct 14:20 to 14:50

    Don't ask, don't tell - the virtues of privacy by design

    After years of personal data breaches and mishandled payment data lawmakers are waking up to the importance of online privacy. To comply with new laws we need to put privacy at the heart of our design processes, but how do we do this when design itself is often seen as the enemy of productivity?

    Speaker

    Photo Speaker Name Profile
    Eleanor McHugh Eleanor McHugh View Profile
  • Next-Gen Application Security Add to Schedule Leigh-Anne Galloway  |   Positive Technologies   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 4th Oct 14:20 to 14:50

    Next-Gen Application Security

    Application security is rapidly moving into top gear. Not only is this caused by ever-evolving attacks aimed at the application layer, but also driven by the constantly growing number and complexity of web applications as a result of digital transformation.
    To stay one step ahead of competitors, companies must deliver value faster, without putting their customers at risk while remaining compliant.
    This takes a fundamental shift in the way application security should be approached: during our session, we’ll share our expert vision of how smart application security strategy should be implemented to protect companies without disrupting their business processes.

    Speaker

    Photo Speaker Name Profile
    Leigh-Anne Galloway Leigh-Anne Galloway View Profile
  • 3 Strategies to Protect Corporate IP in the Age of Employee Churn Add to Schedule Paul Hirst  |   Code42   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 4th Oct 14:20 to 14:50

    3 Strategies to Protect Corporate IP in the Age of Employee Churn

    Your business is built on data. In fact, 80% of your company value is in your intellectual property. It’s exactly this data—created by your knowledge workers—that holds the key to innovation and market advantage. But today, workers leave for new opportunities every 3-5 years—and take IP with them. So how do organizations develop security strategies for this new age? Attend the session to learn how to combat one of the largest data security blind spots—employee behavior

    Speaker

    Photo Speaker Name Profile
    Paul Hirst Paul Hirst View Profile
  • Exposing the Enemy Within: How DNS Data Holds the Key to Cyber Defense Add to Schedule Günter Sandmann  |   BlueCat Networks  |   Cloud Security

    Cloud Security Theatre

    Wed 4th Oct 14:20 to 14:50

    Exposing the Enemy Within: How DNS Data Holds the Key to Cyber Defense

    Did you know you can leverage DNS data to protect your network from cyberattacks?

    Here are two frightening stats from a recent expert security survey:

    1. More than 91% of attacks use DNS in some way
    2. Nearly 70% of organizations don’t monitor recursive DNS servers

    DNS is the lowest layer of the internet, the most pervasive protocol, making it the perfect gateway for malicious activity and the spread of malware throughout an organization. To date, enterprise security teams have typically not focused on DNS in their defense; instead, doubling-down on risk mitigation measures like firewalls and secure web gateways.

    This is a mistake.

    Bluecat will discuss findings from a new cyber security whitepaper that demonstrate how to leverage the intelligence already available in your DNS data, allowing security professionals to:

    Speaker

    Photo Speaker Name Profile
    Günter Sandmann Günter Sandmann View Profile
  • Wed 4th Oct 15:00 - 15:30
  • GDPR and the work-time paradox Add to Schedule Stewart Room  |   PwC  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 15:00 to 15:30

    GDPR and the work-time paradox

    The GDPR is built on a false assumption of organisational readiness for the new law and data protection confidence and maturity. This false assumption creates a work time paradox, that there has always been too much to do and too little time, therefore legislative compliance failure is inevitable, even in the best run and best resourced organisations. If you're running a GDPR programme, how do you prioritise and know if your choices are good? What's your understanding of GDPR? You need to understand the concepts of adverse scrutiny, and the priorities of people and stakeholders who will want to challenge you.

    Speaker

    Photo Speaker Name Profile
    Stewart Room Stewart Room View Profile
  • How Much Security Do You Really Need? Add to Schedule Wendy Nather  |   Duo Security  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 4th Oct 15:00 to 15:30

    How Much Security Do You Really Need?

    The answer won't fit in this talk and maybe that's the problem. We know what conventional wisdom has been telling us to do, and we know the current models have drawbacks, ranging from "expense in depth" to "cheeseburger risk management." But there are some shocking answers for us to click on and consider as well. Join us as we take a hatchet to the product portfolio and move Beyond the traditional perimeters and parameters of security.

    Speaker

    Photo Speaker Name Profile
    Wendy Nather Wendy Nather View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Wed 4th Oct 15:00 to 15:30

  • What Comes After the VPN? Add to Schedule Mark Ryan  |   Zscaler   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 4th Oct 15:00 to 15:30

    What Comes After the VPN?

    Many IT teams used an “M&M” approach to design network security: create a hard shell or perimeter around the soft interior. For remote users, traditional L3 VPNs extend that perimeter, placing remote users' endpoints directly onto the enterprise network. This puts the enterprise's network and data at risk from a range of threats - compromised credentials can lead to unintended exposure, as attackers move laterally throughout the network environment. In this session you will learn why legacy VPN's are soon to be a thing of the past.

    Speaker

    Photo Speaker Name Profile
    Mark Ryan Mark Ryan View Profile
  • The Shift to Self-Learning and Self-Defending Networks Add to Schedule Andrew Tsonchev  |   Darktrace   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 4th Oct 15:00 to 15:30

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • Understanding Your Cloud Attack Surface - Insights from the 2017 Cloud Security Report Add to Schedule Oliver Pinson-Roxburgh  |   Alert Logic   |   Cloud Security

    Cloud Security Theatre

    Wed 4th Oct 15:00 to 15:30

    Understanding Your Cloud Attack Surface - Insights from the 2017 Cloud Security Report

    You’ve decided to move to the cloud. It’s faster, more scalable, and more agile. Security is a priority, but you don’t want it to slow you down. The foundational infrastructure delivered by cloud providers is secure, but protecting the applications, workloads, and data you run on top of it is your responsibility—and it’s a big one, so how do you design a full scale?

    Join Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture, as he shares insights from Alert Logic’s 2017 Cloud Security Report, based upon findings from verified security incidents from thousands of companies around world.

    An impactful session to understand how today’s vulnerabilities are being exploited and key strategies you can adopt to increase security and manage risk.

    Speaker

    Photo Speaker Name Profile
    Oliver Pinson-Roxburgh Oliver Pinson-Roxburgh View Profile
  • Wed 4th Oct 15:40 - 16:10
  • The Future of Human-Machine Collaboration Add to Schedule Garry Kasparov  |   Avast Software  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 15:40 to 16:10

    The Future of Human-Machine Collaboration

    Former world chess champion Garry Kasparov has a unique relationship with machines. His legendary matches against the IBM supercomputer Deep Blue were followed by two decades of inquiry into the potential of human + machine collaboration, and how to get the most from this essential relationship. At IP Expo, Kasparov will speak about preparing for the AI revolution, coping with job losses to automation, and refuting the idea that our intelligent machines make us less human, drawing on with personal anecdotes, concrete examples, and forward-looking strategies on AI.
     

    Speaker

    Photo Speaker Name Profile
    Garry Kasparov Garry Kasparov View Profile
  • How to tell if you are being cyber stalked or hacked Add to Schedule Paul Vlissidis  |   NCC Group  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 4th Oct 15:40 to 16:10

    How to tell if you are being cyber stalked or hacked

    As the cyber lead on Channel 4’s Hunted, Paul and his team hacked over 100 people across two series.
     
    Although the majority of people may think they have some understanding of what good security practices are, attacks are becoming more sophisticated and the prevalence of hackers targeting individuals has increased exponentially in recent years. This session will provide insight into the techniques hackers use, offer tips on how to spot when an attack is in progress, and inform attendees of the online behaviours and techniques that can minimise the threat of such attacks.

    Speaker

    Photo Speaker Name Profile
    Paul Vlissidis Paul Vlissidis View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Wed 4th Oct 15:40 to 16:10

  • Reducing Network Complexity Challenges for Securing IoT & Cloud Environments to achieve GDPR Compliance Add to Schedule Reggie Best  |   Lumeta Corporation  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 4th Oct 15:40 to 16:10

    Reducing Network Complexity Challenges for Securing IoT & Cloud Environments to achieve GDPR Compliance

    With expansion into the cloud and supporting IP-Enabled mobile and IoT/ICS infrastructure, security and network teams are learning that increasing network complexity has exposed them to a greater attack surface. While ransomware attacks have had a severe impact on both the reputation and financials of many well-known companies, additional requirements imposed by GDPR compliance is putting significant pressure on IT organizations. At this session, Lumeta will show you how to eliminate 100% of your blind spots as we find 40% more of your network, cloud and endpoint infrastructure and monitor in REAL-TIME to detect threats across an expanding attack surface.

    Speaker

    Photo Speaker Name Profile
    Reggie Best Reggie Best View Profile
  • Saving you from yourself and containing the insider threat Add to Schedule Robin Bell  |   Egress Software Technologies  |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Wed 4th Oct 15:40 to 16:10

  • Wed 4th Oct 16:20 - 17:10
  • PANEL: DevOps: What’s Now, What’s Next? Add to Schedule Steve Thair  |   DevOpsGuys  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Wed 4th Oct 16:20 to 17:10

    PANEL: DevOps: What’s Now, What’s Next?

    It’s now accepted wisdom that adopting some DevOps methodologies in software development is advantageous for companies of all sizes. The principles of DevOps have gone from ideals discussed between a small group of enthusiasts to an item point on the agenda of CIOs of most of the world’s largest companies in a little under 10 years. But why has it become so popular and has it lived up to its early principles? As adoption becomes more widespread how are those principles likely to change?

    Speaker

    Photo Speaker Name Profile
    Steve Thair Steve Thair View Profile
  • The Channel Panel Add to Schedule Charles Aylwin  |   8x8  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 4th Oct 16:20 to 17:20

    Speaker

    Photo Speaker Name Profile
    Charles Aylwin Charles Aylwin View Profile
  • Thu 5th Oct 10:00 - 10:40
  • Opening Keynote: Stuart Russell Add to Schedule Stuart Russell  |   University California, Berkeley  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Thu 5th Oct 10:00 to 10:40

    Speaker

    Photo Speaker Name Profile
    Stuart Russell Stuart Russell View Profile
  • Thu 5th Oct 11:00 - 11:30
  • Brought to you by Cisco Add to Schedule Gordon Thomson  |   Cisco  |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Thu 5th Oct 11:00 to 11:30

    Speaker

    Speaker Name Profile
    Gordon Thomson View Profile
  • Brought to you by BAE Add to Schedule

    Cyber Security Keynote Theatre

    Thu 5th Oct 11:00 to 11:30

  • Cyber, EDR, Cloud, BYOD, Machine Learning…Why an automated platform beats your subconscious buzzword thinking Add to Schedule James Holland  |   Palo Alto Networks   |   CARM

    CARM Theatre

    Thu 5th Oct 11:00 to 11:30

    Cyber, EDR, Cloud, BYOD, Machine Learning…Why an automated platform beats your subconscious buzzword thinking

    Breaches are happening, and it’s headline news. In the age of big data, machine learning, security analytics and threat intelligence, why don't we have secure infrastructure? You see the buzzwords every day, but will focus on them result in better security posture and fewer incidents? In this talk, we consider the reality of today’s threats, looking past the sensationalist media coverage. There are many ways in which attackers and their toolsets have evolved, with the automation and velocity of the offensive team now being the key pain point. If you take best of breed security technology everywhere in your infrastructure, and have ticked off all your cybersecurity buzzwords, you now have secure infrastructure, right?

    Speaker

    Photo Speaker Name Profile
    James Holland James Holland View Profile
  • Brought to you by Watchguard Add to Schedule

    Cyber Threat Protection Theatre

    Thu 5th Oct 11:00 to 11:30

  • Future of Cyber Intelligence: Securing the digital economy Add to Schedule Jonathan Draper  |   BAE Systems Applied Intelligence   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 5th Oct 11:00 to 11:30

    Speaker

    Speaker Name Profile
    Jonathan Draper View Profile
  • Simple, Effective Security with the Cisco Meraki MX Add to Schedule Tony Carmichael  |   Cisco Meraki  |   Cloud Security

    Cloud Security Theatre

    Thu 5th Oct 11:00 to 11:30

    Simple, Effective Security with the Cisco Meraki MX

    The Cisco Meraki MX includes out-of-the-box centralized management capabilities that help administrators secure distributed networks. This session will provide a product update of new and existing security features, and a live demo of capabilities such as NGIPS, Advanced Malware Protection (AMP) with Threat Grid, Layer 7 Firewalling, and more.

    Speaker

    Speaker Name Profile
    Tony Carmichael View Profile
  • Think and Act Like a Hacker to Protect Your Company’s Assets Add to Schedule Greg Tworek  |   CQURE  |   Cyber Hack

    Cyber Hack Theatre

    Thu 5th Oct 11:00 to 11:50

    Speaker

    Photo Speaker Name Profile
    Greg Tworek Greg Tworek View Profile
  • Thu 5th Oct 11:40 - 12:10
  • Confessions of a Social Engineer Add to Schedule Jenny Radcliffe   |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 5th Oct 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Jenny Radcliffe  Jenny Radcliffe View Profile
  • Reconciling Regulatory Requirements with Technology Add to Schedule Steve Mulhearn  |   Fortinet  |   CARM

    CARM Theatre

    Thu 5th Oct 11:40 to 12:10

    Reconciling Regulatory Requirements with Technology

    The clock is ticking and GDPR is getting closer.  However GDPR is not an industry standard that relies on technology to tick the boxes, how to be compliant with the regulation will be unique to each organization.  The one constant however is the role that a secure network must play in data protection.  Whether data is being created, is in motion or at rest, protecting it from cyber-attacks requires an underlying network that is secure.  This session will focus on the role of network level security within the GDPR framework and how it can support an organization’s GDPR compliance efforts.

    Speaker

    Speaker Name Profile
    Steve Mulhearn View Profile
  • Stand and deliver, your money or your data! Add to Schedule James Burchell  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 5th Oct 11:40 to 12:10

    Stand and deliver, your money or your data!

    Cyber crime activity is growing fast and evolving at pace, becoming both more aggressive and technically proficient. As such it is a major and growing threat to UK businesses accounting for 53% of total UK crime.

    Both the NCA and FBI have reported significant growth in the number of technically competent cyber criminals active within the UK with ransomware infections quadrupling in 2016 and an estimated 4,000 attacks seen each day.

    How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by advanced payloads such as ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • Translating Threat Intelligence from Noise to Insight for Response Add to Schedule Benjamin Desjardins  |   RSA Security   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 5th Oct 11:40 to 12:10

    Translating Threat Intelligence from Noise to Insight for Response

    Organisations today continue to invest in security, collectively representing billions of dollars/ euro annually. Despite these investments, breaches continue to occur and in fact are on the rise. In response, many organisations are turning their attention from attack prevention, to detection and response. Threat intelligence continues to be a key ingredient in the process, but without prioritisation risk only adding to the ‘noise’ that analysts need to work through to find the most impactful threats. How can organisations better prioritise? And what capabilities really matter to help find the blind spots and minimise business risk.

    Speaker

    Photo Speaker Name Profile
    Benjamin Desjardins Benjamin Desjardins View Profile
  • The way we work has changed. Has your security? Add to Schedule

    Cloud Security Theatre

    Thu 5th Oct 11:40 to 12:10

    The way we work has changed. Has your security?

    By 2018, Gartner estimates that 25% of corporate data traffic will bypass the perimeter. As organisations evolve their IT stack, traditional security approaches/architectures need to be reconsidered. This interactive session will review some of the new risks introduced by SaaS/IaaS adoption and show how to effectively mitigate these risks using new approaches to security architecture. Presenters will review best practices around the transition of a security architecture itself to the cloud, utilizing customer case studies.

  • Data, Bare Metal and a Supersonic Car: what it means for your Enterprise Cloud Add to Schedule

    IP EXPO Keynote Theatre

    Thu 5th Oct 11:40 to 12:10

    Data, Bare Metal and a Supersonic Car: what it means for your Enterprise Cloud

    Oracle has teamed up with the Bloodhound project to smash the land speed record and inspire future generations of budding scientists and engineers. During this session hear how Oracle Cloud is helping Bloodhound to collect, analyse and broadcast data from more than 500 sensors installed on the Bloodhound SSC (Super Sonic Car) to classrooms around the world to inspire the next generation of inventors. The same Cloud technology that is underpinning Enterprises large and small today.
     
     

  • Thu 5th Oct 12:00 - 12:50
  • Web Application Security – Why so hard? Add to Schedule Tech Leaders  |  Cyber Hack

    Cyber Hack Theatre

    Thu 5th Oct 12:00 to 12:50

    Speakers

    Speaker Name Profile
    Graham Bacon View Profile
    Nick Blundell View Profile
  • Thu 5th Oct 12:20 - 12:50
  • A glimpse into the future of your infrastructure Add to Schedule Mark Lewis  |   Nutanix   |   IP EXPO Keynote

    IP EXPO Keynote Theatre

    Thu 5th Oct 12:20 to 12:50

    Speaker

    Photo Speaker Name Profile
    Mark Lewis Mark Lewis View Profile
  • It wasn’t me, it was Bennett Arron Add to Schedule Bennett Arron   |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 5th Oct 12:20 to 12:50

    It wasn’t me, it was Bennett Arron

    Several years ago, award-winning writer and stand-up comedian Bennett Arron was in serious debt. He owed thousands of pounds to phone companies, banks and department stores. Only it wasn’t him. Bennett had become one of the first major victims of Identity Theft in the UK. This theft resulted in Bennett becoming penniless and homeless.

    Years later, Bennett wrote, directed and presented the Channel 4 Television Documentary How To Steal An Identity. In the programme, which was described as ‘Fascinating and Disturbing’ and was ‘Pick of The Week’ in all the major press, Bennett proved the ease of the crime by stealing the identity of the Home Secretary. He was subsequently arrested by Scotland Yard and shortlisted for a BAFTA!

    Speaker

    Photo Speaker Name Profile
    Bennett Arron Bennett Arron View Profile
  • Psychology Behind Digital Ransom Notes Add to Schedule Eran Ashkenazi  |   SentinelOne   |   CARM

    CARM Theatre

    Thu 5th Oct 12:20 to 12:50

    Psychology Behind Digital Ransom Notes

    Ransom Notes were used through the ages as a means to scare and cohort subject to pay, and in the digital age are massively used in Ransomware situations. Join Eran as he reviews the report prepared for SentinelOne by Dr. Lee Hadlington, from De Montfort University, explaining the evolution of ransom notes, what psychological "tricks" are used to increase payment chances.

    Speaker

    Photo Speaker Name Profile
    Eran Ashkenazi Eran Ashkenazi View Profile
  • Brought to you by Accenture Add to Schedule Aimie Chapple  |   Accenture  |   IAM

    IAM Theatre

    Thu 5th Oct 12:20 to 12:50

    Speaker

    Photo Speaker Name Profile
    Aimie Chapple Aimie Chapple View Profile
  • Brought to you by Bitdefender Add to Schedule

    Cyber Threat Protection Theatre

    Thu 5th Oct 12:20 to 12:50

  • Thu 5th Oct 13:00 - 13:30
  • Minority Report: A Predictive “Pre-crime” Approach Requires a Human Focus Add to Schedule Carl Leonard  |   Forcepoint Security Labs  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 5th Oct 13:00 to 13:30

    Minority Report: A Predictive “Pre-crime” Approach Requires a Human Focus

    In Philip K. Dick’s 1956 “The Minority Report,” murder ceased to occur due to the work of the “Pre-Crime Division,” which anticipated and prevented violent killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity—especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a pre-crime division, empowered to intervene before a violation is ever committed. We'll examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.

    Speaker

    Photo Speaker Name Profile
    Carl Leonard Carl Leonard View Profile
  • A day in the life of a GDPR breach Add to Schedule Robert Farnod  |   Splunk, Inc.   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 5th Oct 13:00 to 13:30

    A day in the life of a GDPR breach

    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
    Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018.

    Speaker

    Speaker Name Profile
    Robert Farnod View Profile
  • Rising costs and regulations complicating email operations? That must be a right pain in the archive! Add to Schedule Julian Martin  |   Mimecast  |   Cloud Security

    Cloud Security Theatre

    Thu 5th Oct 13:00 to 13:30

    Rising costs and regulations complicating email operations? That must be a right pain in the archive!

    What happens when you try to apply 1990’s archiving architecture to 2017 email compliance and usage? You get pain, both on the administration front and from your back-end users. Email volumes are growing so fast that IT and IS departments are constantly updating software, hardware and investments in storage capacity.

    But what about users? Can you easily cut costs AND make data useful again?

    In this session you’ll learn from the leader in the Gartner’s Enterprise Information Archiving Magic Quadrant how to protect your business and enhance user experience, all while reducing the costs associated with email archiving.

    Speaker

    Photo Speaker Name Profile
    Julian Martin Julian Martin View Profile
  • Thu 5th Oct 13:20 - 14:10
  • The Big Fat IOT Panel of the Year Add to Schedule Tech Leaders  |  IP EXPO Keynote

    IP EXPO Keynote Theatre

    Thu 5th Oct 13:20 to 14:10

    The Big Fat IOT Panel of the Year

    The Internet of Things is going to change the world – but how is it going to change my business? How will Artificial Intelligence and Analytics fully realise the potential for IOT and bring about the truly connected enterprise? We’re moving from hype to reality in IOT and we are delighted to have secured experts from the world of cyber security, analytics, AI to help chart the future for IOT and crucially how it will influence your business.
     

    Speakers

    Photo Speaker Name Profile
    Aimie Chapple Aimie Chapple View Profile
    Cormac Whelan Cormac Whelan View Profile
    Dave Palmer Dave Palmer View Profile
  • Thu 5th Oct 13:40 - 14:10
  • Barbarians At The Gate(way): An Examination Of The Attacker's Tool Box Add to Schedule Dave Lewis  |   Akamai Technologies  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 5th Oct 13:40 to 14:10

    Barbarians At The Gate(way): An Examination Of The Attacker's Tool Box

    Attackers are always trying their best to breach your network to steal the secret sauce hidden inside. This session will delve into the attacker's tool set and focus on the types of attacks that are being leveraged against companies today. I will examine tools, case studies and my own war stories.

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Thu 5th Oct 13:40 to 14:10

  • Stand and deliver, your money or your data! Add to Schedule James Burchell  |   Sophos   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 5th Oct 13:40 to 14:10

    Stand and deliver, your money or your data!

    Cyber crime activity is growing fast and evolving at pace, becoming both more aggressive and technically proficient. As such it is a major and growing threat to UK businesses accounting for 53% of total UK crime.

    Both the NCA and FBI have reported significant growth in the number of technically competent cyber criminals active within the UK with ransomware infections quadrupling in 2016 and an estimated 4,000 attacks seen each day.

    How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by advanced payloads such as ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • Thu 5th Oct 14:00 - 14:50
  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap Add to Schedule Ian Evans  |   OneTrust   |   Cyber Hack

    Cyber Hack Theatre

    Thu 5th Oct 14:00 to 14:50

    How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Thu 5th Oct 14:20 - 14:50
  • Enemies of the West Add to Schedule Neil Lines  |   Nettitude  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 5th Oct 14:20 to 14:50

    Enemies of the West

    June 2016, the Democratic National Committee was compromised. While there was no proof it is suspected that the Russia hacking group known as APT28 were responsible. History may record this hack as been responsible for losing a US election.
     
    April 2017 the Shadow Brokers released zero day exploits from the NSA hack.
     
    May 2017 WannaCry ransomware, a global attack, affecting governments, medical companies, manufacturing, retail, energy providers and banking was released. Nation state cyber-attacks are regularly documented as highly sophisticated, praying on targets, utilising zero day exploits. This presentation will reveal reality from the myths.

    We are at war and e-mails are now mightier than the sword.
     

    Speaker

    Photo Speaker Name Profile
    Neil Lines Neil Lines View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Thu 5th Oct 14:20 to 14:50

  • Eliminate GDPR Fines, Phishing and Shadow IT – With One Move! Add to Schedule Mike Newman  |   My1Login   |   IAM

    IAM Theatre

    Thu 5th Oct 14:20 to 14:50

    Eliminate GDPR Fines, Phishing and Shadow IT – With One Move!

    The trend towards cloud is moving enterprise identities outside the traditional corporate infrastructure, creating new, and exacerbating existing, security vulnerabilities. In this presentation My1Login CEO, Mike Newman, will present on how to eliminate GDPR fines, phishing and shadow-IT. Mike’s presentation will include a customer case study of the security challenges faced by a highly-regulated, enterprise organisation and how they were able to “lock down” their access management by putting the business back in control of passwords rather than the users, whilst ensuring a positive, simple user experience.

    Speaker

    Speaker Name Profile
    Mike Newman View Profile
  • Cyber Threat Report 2017: Select Global Case Studies from Darktrace Add to Schedule Andrew Tsonchev  |   Darktrace   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 5th Oct 14:20 to 14:50

    Cyber Threat Report 2017: Select Global Case Studies from Darktrace

    Over the past year, cyber-attacks have frequently made headlines. In 2017 alone, global ransomware damage costs are expected to exceed $5 billion, with the total cost of cyber-crime expected to reach trillions of dollars. Darktrace has detected over 30,000 in-progress cyber-threats, and has firsthand experience with modern, never-before-seen attacks, including fast moving ransomware, new strains of malware, malicious insiders, attacks on cloud environments, and more.

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • Exposing the Enemy Within: How DNS Data Holds the Key to Cyber Defense Add to Schedule Günter Sandmann  |   BlueCat Networks  |   Cloud Security

    Cloud Security Theatre

    Thu 5th Oct 14:20 to 14:50

    Speaker

    Photo Speaker Name Profile
    Günter Sandmann Günter Sandmann View Profile
  • Thu 5th Oct 15:00 - 15:30
  • The GDPR Countdown is on! Are you Ready? Add to Schedule Joanne Bone  |   Irwin Mitchell LLP  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 5th Oct 15:00 to 15:30

    The GDPR Countdown is on! Are you Ready?

    Root and branch data protection reform is coming under the General Data Protection Regulation (GDPR) in May 2018.  The extent of the reform means that many businesses don’t know where to start.  We’ll guide you through what this reform means for your business and give you a practical way to approach your compliance.  We will also look at the positives coming out of GDPR and how to make it work for you.  Even though this is European legislation, the Government has confirmed that it will still become law despite Brexit!  Topics for discussion include:
     
    - Where to start with your compliance
    - What records should you keep and what policies should you have
    - Compulsory notification of data breaches
    - What consent looks like under GDPR
    - Transparency and what you should be doing with your privacy policies
    - The Right to be Forgotten
    - Increased subject access rights
    - Fines and the ability for individuals to sue
     
    We’ll draw on our 20 years data protection experience, looking at key actions businesses need to take and how to navigate the pathway to compliance.

    Speaker

    Photo Speaker Name Profile
    Joanne Bone Joanne Bone View Profile
  • Brought to you by Exclusive Networks Add to Schedule

    CARM Theatre

    Thu 5th Oct 15:00 to 15:30

  • Using Augmented Intelligence to identify and prioritize threats Add to Schedule Jamie Graves  |   ZoneFox   |   Future of Threat Intelligence

    Future of Threat Intelligence Theatre

    Thu 5th Oct 15:00 to 15:30

    Speaker

    Photo Speaker Name Profile
    Jamie Graves Jamie Graves View Profile
  • Jargon Bin Add to Schedule Tech Leaders  |  IP EXPO Keynote

    IP EXPO Keynote Theatre

    Thu 5th Oct 15:00 to 16:00

    Jargon Bin

    Due to the unrelenting pace of change the IT Sector, more so than any other, is awash with industry jargon, overcomplicated terminology and acronyms. However, how many of these are still likely to be talked about in ten years’ time?  In this light hearted  closing session watch a panel of experts decide which buzzwords are worth the hype and which need to be consigned to the “Jargon Bin”.

    Speakers

    Photo Speaker Name Profile
    Chris Swan Chris Swan View Profile
    Mandi Walls Mandi Walls View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top