Seminars

Here is a list of all confirmed Seminars for 2018. You can add these to your planner by clicking the 'add to schedule' button

  • Wed 3rd Oct 10:00 - 10:40
  • An Astronaut's Guide To Life On Earth Add to Schedule Chris Hadfield  |     |   Keynote Theatre

    Keynote Theatre

    Wed 3rd Oct 10:00 to 10:40

    An Astronaut's Guide To Life On Earth

    In An Astronaut’s Guide to Life on Earth, Colonel Chris Hadfield shows audiences how to “think like an astronaut.” Sharing the useful and practical lessons he’s learned throughout his remarkable career in the fields of leadership, teamwork, collaboration, and science and technology, his vivid and refreshing insights motivate audiences to achieve dreams higher than the clouds, and will change, completely, the way everyone views life on Earth.

    Speaker

    Photo Speaker Name Profile
    Chris Hadfield Chris Hadfield View Profile
  • Wed 3rd Oct 11:00 - 11:30
  • Unbelievable tales of cyber attack Add to Schedule Graham Cluley  |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 11:00 to 11:30

    Unbelievable tales of cyber attack

    Every day we read headlines of data breaches, hacks, and malware attacks. Often they're identikit newspaper stories where you could easily just change the names of the companies involved and the number of customer records they have had stolen from them.

    But every now and then something extraordinary happens. Like the companies who pretended to be hacked when they hadn't, or the attackers who went to extraordinary lengths to steal millions from their employers.

    In this presentation, computer security veteran Graham Cluley shares some unbelievable tales of cyber attack.

    Speaker

    Photo Speaker Name Profile
    Graham Cluley Graham Cluley View Profile
  • Security. Made Smarter: Intelligent threat detection and response Add to Schedule Jonathan Zulberg  |   LogRhythm  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 11:00 to 11:30

    Security. Made Smarter: Intelligent threat detection and response

    Your job is to protect your organisation from cyberattacks. To do so, your team must make sense of a plethora of data that is growing exponentially. Resources may be tight, you may be struggling with too many alerts, and you may not be getting the visibility you need with data spread across multiple systems.

    In these circumstances, constantly evolving threats can slip through the cracks. The pressure of missing a damaging breach could be causing you to lose sleep.

    Join LogRhythm to discover how you can reduce your organisation’s risk with a smarter end-to-end approach to cybersecurity that maximises the efficiency and effectiveness of your security operations.

    Learn how:

    • NextGen SIEM enables measurably faster threat detection and response
    • UEBA improves and deepens visibility of user behaviour
    • Automation and orchestration boost efficiency and productivity
    • Threat Lifecycle Management holds the key to effective security operations
    • Machine learning and AI add a new dimension to your security analytics 
    • Cloud analytics provides the scale and intelligence needed for rapid threat detection

    Speaker

    Photo Speaker Name Profile
    Jonathan Zulberg Jonathan Zulberg View Profile
  • Can you enable SaaS based Line of Business agility, without compromising IT security? Add to Schedule Daniel Power  |   OneLogin   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 11:00 to 11:30

    Can you enable SaaS based Line of Business agility, without compromising IT security?

    The objective of this session is enable IT to change managers, and employees, perception of being the department that says No, to the department that says Yes, and we will make everyone’s life easier too!
    Focussing on understanding the challenge of Shadow IT, OneLogin will be looking to how to address these challenges at an organisational and technological level.

    Speaker

    Photo Speaker Name Profile
    Daniel Power Daniel Power View Profile
  • How Do Hackers Steal Your Passwords? Add to Schedule Alexandre Cagnoni  |   WatchGuard   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 11:00 to 11:30

    How Do Hackers Steal Your Passwords?

    Join us to learn more about the methods hackers use today to hack into your accounts and steal your passwords- everything from cracking tools to mimikatz. The simplicity of their methods will surprise you.

    Speaker

    Photo Speaker Name Profile
    Alexandre Cagnoni Alexandre Cagnoni View Profile
  • Security Past the Perimeter Add to Schedule Max Heinemeyer  |   Darktrace   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 11:00 to 11:30

    Security Past the Perimeter

    In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, as they represent yet another frontier for cyber-attacks. Real-time threat detection and complete visibility have never been more important – or more difficult.

    Speaker

    Photo Speaker Name Profile
    Max Heinemeyer Max Heinemeyer View Profile
  • Low and Slow - Data Theft Under the Radar Add to Schedule Matt Lock  |   Varonis UK Ltd  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 11:00 to 11:30

    Low and Slow - Data Theft Under the Radar

    We hear about data breaches on almost a daily basis and we are all very aware how these potentially affect our daily lives, but how do these breaches actually happen. What are the steps hackers take to infiltrate, discover and steal valuable information?
    Varonis tracks, stops and helps eliminate these situations by usitilising the metadata they gather to provide organisations insight into high risk data and potential rogue accounts. This presentation will walk you through the steps they take, and the technology they use, to ensure any suspicious activity is caught, investigated and remediated as quickly as possible.

    Speaker

    Photo Speaker Name Profile
    Matt Lock Matt Lock View Profile
  • PenTesting Problems Add to Schedule Holly Grace Williams  |   Sec-1, a Claranet Group Company  |   Cyber Hack

    Cyber Hack Theatre

    Wed 3rd Oct 11:00 to 11:50

    Speaker

    Photo Speaker Name Profile
    Holly Grace Williams Holly Grace Williams View Profile
  • Wed 3rd Oct 11:40 - 12:10
  • What Threat Intelligence Teaches Us About Application Security Add to Schedule Ray Pompon  |   F5 Labs  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 11:40 to 12:10

    What Threat Intelligence Teaches Us About Application Security

    Explore in-depth threat intelligence on how web applications are attacked. F5 Labs has spent the past year analyzing and combining data on web attacks from a variety of sources and partners.F5 Labs has looked at a year of data from WhiteHat Security, a 18 months of alerts from tens of thousands of honeypots, a decade of canned attack scripts from ExploitDB, hundreds of public breach records, DDoS attack trends from F5 as well as a global survey of thousands of security professionals. We’ll also explore newly discovered new attacks that could cripple the critical infrastructure of our first responders.

    Speaker

    Photo Speaker Name Profile
    Ray Pompon Ray Pompon View Profile
  • Next-Gen Approach to Security Monitoring with Machine Learning on Hadoop Add to Schedule Jamie Sarakinis  |   Securonix   |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 11:40 to 12:10

    Next-Gen Approach to Security Monitoring with Machine Learning on Hadoop

    We live in a digital world where the volume, variety, and velocity of data continue to grow exponentially. Collecting and analyzing this data for actionable threats is an enormous challenge. Legacy SIEM tools designed 10+ years ago are not architected to scale to handle this massive volume of data, and the rule-based approach used by these SIEMS is not sufficient to detect advanced modern cyber threats.

    Join Securonix to learn about the next-gen approach to security monitoring. The Hadoop platform enables unlimited scale, and machine learning-based analytics enables you to find the needle in the haystack of threats with minimal human intervention.

    Speaker

    Photo Speaker Name Profile
    Jamie Sarakinis Jamie Sarakinis View Profile
  • The future of authentication. Secure passwordless login for employees and customers Add to Schedule Claire Galbois-Alcaix  |   Yubico   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 11:40 to 12:10

    The future of authentication. Secure passwordless login for employees and customers

    Interested in learning more about how you could transform your users experience and reduce IT support costs with secure passwordless authentication?

    Unlike early predecessors, newly-developed open authentication standards, such as FIDO U2F and FIDO 2, provide strong authentication and high privacy with characteristics that have eluded previous hardware tokens – elegance and simplicity. Impossible you think?

    This session will change your perceptions and eventually protect your online accounts.

    Speaker

    Photo Speaker Name Profile
    Claire Galbois-Alcaix Claire Galbois-Alcaix View Profile
  • Revenge of the Nerds. Using Data Science to defeat the cybercriminals Add to Schedule John Shaw  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 11:40 to 12:10

    Revenge of the Nerds. Using Data Science to defeat the cybercriminals

    John Shaw will describe how Sophos’s data scientists are using machine learning, neural networks and other data science techniques to stop new and unknown malicious activity in business networks. He will describe the techniques that are already proving very effective, and where the next breakthroughs are likely to come from.

    Speaker

    Photo Speaker Name Profile
    John Shaw John Shaw View Profile
  • Securing Serverless - The future of Cybersecurity Add to Schedule Joseph Pindar  |   Gemalto  |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Joseph Pindar Joseph Pindar View Profile
  • Stepping into the cloud with confidence Add to Schedule Paul D’Cruz  |   Cisco Systems  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 11:40 to 12:10

    Stepping into the cloud with confidence

    It’s no surprise that organizations are increasingly investing in the cloud for its key capabilities—ease of use, scalability, and cost savings. The cloud is changing the way we work. This also introduces new security risks. You can roll the dice and hope that someone else is keeping an eye on security. Or, you can ensure your security in the cloud with Cisco Stepping into the cloud with confidence solutions. In this session, you will see how things are changing, what the new risks are, and how you can protect yourself and your company as you take advantage of the many benefits of using the cloud.

    Speaker

    Photo Speaker Name Profile
    Paul D’Cruz Paul D’Cruz View Profile
  • Wed 3rd Oct 12:00 - 12:50
  • Incident and Breach Management: Building a Harmonized Response Plan for Privacy & Security Teams Add to Schedule Ian Evans  |   OneTrust   |   Cyber Hack

    Cyber Hack Theatre

    Wed 3rd Oct 12:00 to 12:50

    Incident and Breach Management: Building a Harmonized Response Plan for Privacy & Security Teams

    In the event of a breach, security and privacy professionals often approach response from two different outlooks. While security teams are focused on threat vectors, privacy teams concerned with personal data leaks and adhering to various global privacy laws. While the two approach breaches from different perspectives, it is possible to build an incident and breach response plan that addresses the needs of both teams. In this session, we’ll discuss how to build a harmonized response plan that addresses both the security team’s technical needs and privacy team’s regulatory requirements across the patchwork of US privacy laws, the GDPR and other global privacy regulations. We’ll also provide tips to help you map out a 72-hour personal data breach action plan.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Wed 3rd Oct 12:20 - 12:50
  • The New Mafia: cyber gangs, vigilantes and what it means for businesses Add to Schedule Helge Husemann  |   Malwarebytes   |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 12:20 to 12:50

    The New Mafia: cyber gangs, vigilantes and what it means for businesses

    Cybercriminals are the New Mafia of today’s world. Though care is taken to shroud their operations, their sophistication, execution, and malice are aligned with those historically practised by criminal organisations.

    Recent research underscored that one in 13 UK cyber professionals are perceived by their peers to be grey hats – New Mafia representatives ‘on the inside’. Companies find themselves fighting the good fight on multiple fronts.

    We must change the cybercrime narrative in order to shine a light into the darkest corners of the New Mafia's operations and show them for what they really are – miscreants. The fight back, he will argue, must begin today.

    Speaker

    Photo Speaker Name Profile
    Helge Husemann Helge Husemann View Profile
  • Is there a future for SIEM? Add to Schedule Oli Pinson-Roxburgh  |   Bulletproof  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 12:20 to 12:50

    Is there a future for SIEM?

    Global SIEM expert Oli Pinson-Roxburgh considers the future of SIEM technology platforms and explores how SIEM as we know it can fit into a world of fast-changing technology and ever-evolving threat landscapes. Can it survive, and if so, what might it look like? More importantly, could it still keep your organisation secure?

    Speaker

    Photo Speaker Name Profile
    Oli Pinson-Roxburgh Oli Pinson-Roxburgh View Profile
  • PAM: The critical missing piece in your security strategy Add to Schedule Scott Walker  |   Bomgar   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 12:20 to 12:50

    PAM: The critical missing piece in your security strategy

    Gartner stated this year that if you can only tackle one project to improve the security of your enterprise it should be Privileged Access Management (PAM).

    This session will discuss what ‘privilege’ means to your business and how implementing a PAM solution drives significant improvements across the organisation. It will cover:

    Why organisations should make PAM their top 2019 investment

    Why quickly controlling and automating key PAM capabilities is critical to your organisation’s success

    Tools to prepare your business case for your PAM project and to get your executive leadership buy in

    Speaker

    Photo Speaker Name Profile
    Scott Walker Scott Walker View Profile
  • HACKING EXPOSED: Stories from the battlefield: lessons learnt in responding to the most advanced cyber attacks Add to Schedule Zeki Turedi   |   CrowdStrike   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 12:20 to 12:50

    HACKING EXPOSED: Stories from the battlefield: lessons learnt in responding to the most advanced cyber attacks

    CrowdStrike continues to expose unprecedented efforts by highly sophisticated adversaries targeting -- and in some cases, selectively leaking -- information stolen from sensitive government, corporate and private networks. These intrusions reflect a broad range of motives and targets, revealing many never-before-seen tactics, techniques and procedures (TTPs) that are advancing the art of data manipulation and attack obfuscation, while raising the bar significantly for organizations seeking to protect themselves from these potentially disruptive and destructive attacks.

    This session will shed light on alarming new trends CrowdStrike has observed in the global cyber threat landscape, and the evolving best practices that are proving most successful against criminal, hacktivist and nation-state adversaries.

    Speaker

    Photo Speaker Name Profile
    Zeki Turedi Zeki Turedi View Profile
  • Data and email security: The challenges of integration Add to Schedule Rob Reid   |   StayPrivate   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 12:20 to 12:50

  • Automated Security in a Multi Cloud World Add to Schedule Tech Leaders  |  Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 12:20 to 12:50

    Automated Security in a Multi Cloud World

    Businesses are moving and building new applications in cloud environments at an ever increasing pace. Learning how to manage the security and application services of these apps wherever they live can be a challenging and time consuming task.

    We show you how automation can help you deliver application security in a multi cloud world.

    Speakers

    Photo Speaker Name Profile
    Keiron Shepherd Keiron Shepherd View Profile
    Matthew Prickett Matthew Prickett View Profile
  • PANEL: IP EXPO Bytesize: New Trends - Edge Computing, Cloud Interconnectivity, Blockchain & SD-WAN Add to Schedule Panel  |  Keynote Theatre

    Keynote Theatre

    Wed 3rd Oct 12:20 to 13:10

    PANEL: IP EXPO Bytesize: New Trends - Edge Computing, Cloud Interconnectivity, Blockchain & SD-WAN

    The IP EXPO Bytesize panels are designed to give attendees an executive overview of the latest trends in IT. Four panellists, each a leading expert in their respective field, will each share a bite sized overview of a given topic during one education packed session. The sessions are designed to be interactive so attendees plus our social followers will have the opportunity to ask their questions to the panel in an extended Q&A.

    Speakers:

    Edge Computing - Richard Bennett, VMware

    Cloud Interconnectivity - Michael Winterson, Equnix

    Blockchain - Carrie Osman, Cruxy & Company

    SD-WAN - Al Taylor, CloudDNA

    Speakers

    Photo Speaker Name Profile
    Al Taylor Al Taylor View Profile
    Carrie Osman Carrie Osman View Profile
    Michael Winterson Michael Winterson View Profile
    Richard Bennett Richard Bennett View Profile
  • Wed 3rd Oct 13:00 - 13:30
  • Hacking a smart CCTV Camera Add to Schedule Scott Helme  |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 13:00 to 13:30

    Hacking a smart CCTV Camera

    Scott and his team recently hacked a very popular smart camera. Targeted at homes and small businesses they could view the live, HD feed from anywhere in the world. It turned out that anyone else could too…

    Speaker

    Photo Speaker Name Profile
    Scott Helme Scott Helme View Profile
  • Securing email – so much more than just encryption Add to Schedule Neil Larkins  |   Egress   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 13:00 to 13:30

    Securing email – so much more than just encryption

    Email is far from dead. It is estimated that over 281 billion emails are sent globally every day, cementing it as one of the primary mechanisms for business communication. However, when relied upon by staff to share personal data, email also becomes a major cause of data breaches.

    Join Egress’ Neil Larkins as he examines the ways email security technology can adapt to tackle security threats in a time when organisations are under more legislative pressure than ever before, including the evolution of encryption, preventing user error and risk-based authentication.

    Speaker

    Photo Speaker Name Profile
    Neil Larkins Neil Larkins View Profile
  • Keeping an ‘I’ on APTs | Targeted attacks: a review of current trends and future developments Add to Schedule David Emm  |   Kaspersky Lab   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 13:00 to 13:30

    Keeping an ‘I’ on APTs | Targeted attacks: a review of current trends and future developments

    Targeted attacks are now an established part of the threat landscape and the headlines were full of news about sophisticated attacks of all kinds. It's clear that organisations of all kinds need to understand and prepare for cyber-threats affecting their sector. And this must start with an understanding of the current threat landscape and how it's likely to develop.

    David Emm will chart the latest campaigns, tools and techniques deployed by established threat actors and the trends that we are seeing.

    Speaker

    Photo Speaker Name Profile
    David Emm David Emm View Profile
  • Ensuring Least Privilege – A highly practical guide Add to Schedule Tim Carolan   |   Thycotic   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 13:00 to 13:30

    Ensuring Least Privilege – A highly practical guide

    With an environment featuring ever present regulatory and compliance risk, it can be difficult to know where to begin with a least privilege security strategy. During this very practical presentation, Tim will take you through a number of tools and techniques that you can implement in order to quickly cut down your excess privilege exposure and take back full control of your most precious and important privileged accounts.

    Speaker

    Photo Speaker Name Profile
    Tim Carolan Tim Carolan View Profile
  • Using SIEM to combat the Cyber Security Kill Chain Add to Schedule Guy Grieve  |   LogPoint  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 13:00 to 13:30

    Using SIEM to combat the Cyber Security Kill Chain

    No matter how many log files or data sources you have, it’s all just ones and zeros if you can’t or don’t do anything with them. How do you turn the growing tide into an asset and not a burden?
    Learn how the only EAL3+ SIEM can help your business achieve excellence in security and provide you with valuable context to what your logs are trying to tell you, with a technical overview of the LogPoint platform from demonstrating how to utilise a SIEM platform to combat the Cyber Security Kill Chain.

    Speaker

    Photo Speaker Name Profile
    Guy Grieve Guy Grieve View Profile
  • Secure Your Crown Jewel Applications with Illumio Micro-Segmentation Add to Schedule Adam Brady  |   Illumio  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 13:00 to 13:30

    Secure Your Crown Jewel Applications with Illumio Micro-Segmentation

    Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security to help protect your high value assets and the crown jewels of the company.

    Speaker

    Photo Speaker Name Profile
    Adam Brady Adam Brady View Profile
  • Why Hack When You Can Phish? Add to Schedule Chris Whitley  |   Nuvias  |   Cyber Hack

    Cyber Hack Theatre

    Wed 3rd Oct 13:00 to 13:50

    Why Hack When You Can Phish?

    Take a look at some simple but effective social engineering tactics using social media. Walk through how we will plan our attack and show some previous successes with mass phish attacks, spear phishing and Vishing. Discover the data breached and the dangers to all organisations before discussing how we can protect the end users better with effective training and testing along with layered approach to physical security to mitigate the risk.

    Speaker

    Photo Speaker Name Profile
    Chris Whitley Chris Whitley View Profile
  • Wed 3rd Oct 13:40 - 14:10
  • Digital Transformation: Cure-all, Placebo or Poison Pill Add to Schedule Patrick Grillo  |   Fortinet   |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 13:40 to 14:10

    Digital Transformation: Cure-all, Placebo or Poison Pill

    Are you really ready for Digital Transformation?  While the business benefits are clear, technology adoption, the escalating threat landscape and compliance to any number of standards and legal requirements are all challenges to any DX efforts. If your organization is moving into the Digital future, you need to make sure that your security infrastructure isn’t stuck in the past. This session will provide the insight towards a comprehensive and adaptive security architecture that can support your organization’s changing objectives and more importantly, evolve as the cyber threat challenge evolves as well.

    Speaker

    Photo Speaker Name Profile
    Patrick Grillo Patrick Grillo View Profile
  • The future works with actionable insights Add to Schedule Jugraj Singh  |   Citrix Systems UK Ltd   |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 13:40 to 14:10

    The future works with actionable insights

    The sources of data in organisations today are multiplying at an exponential rate with the proliferation of users, devices, content, apps, and networks. Organisations have more rich data available to them than ever before, but data is only as good as the insights it provides and the actions you can take on it. Gathering this data can be unwieldy and making sense of it can be overwhelming. This session will demonstrate how Citrix Analytics applies machine learning to data that spans network traffic, users, files, and endpoints to identify and take action on malicious user behaviour and app performance anomalies.

    Speaker

    Photo Speaker Name Profile
    Jugraj Singh Jugraj Singh View Profile
  • You and your team are the most dangerous people in your organisation: Don't become a target Add to Schedule Andy Harris  |   Osirium   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 13:40 to 14:10

    You and your team are the most dangerous people in your organisation: Don't become a target

    These days it’s hard running IT and on top of that the attacks keep getting more sophisticated…
    This presentation is about understanding human nature, not creating super-secure password policies that end up with long but easy to crack passwords - the need to get business done and making better versions of the inevitable shortcuts.
    We’ll show ways of avoiding having to have accounts on systems. We’ll examine DevOps and SecOps issues when creating programs for delegated tasks, and how to delegate them to other departments. We hope you’ll leave relaxed, inspired and ready to be your organisation’s best friend.

    Speaker

    Photo Speaker Name Profile
    Andy Harris Andy Harris View Profile
  • The True Costs of Cybercrime and the Defender’s Dilemma in a Rapidly Evolving Cybersecurity Landscape Add to Schedule Helge Husemann  |   Malwarebytes   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 13:40 to 14:10

    The True Costs of Cybercrime and the Defender’s Dilemma in a Rapidly Evolving Cybersecurity Landscape

    Organizations in the UK are experiencing the highest incidence of phishing attacks, malware and ransomware attacks, and data breaches leading to significant increase in endpoint remediation costs. Security professionals in businesses often find themselves constantly defending against a rapidly evolving and increasingly sophisticated threat landscape that exploits the outdated and inadequate endpoint protection solutions currently deployed, leading to the defender’s dilemma.

    Attend the session to learn in-depth about the rapidly evolving threat landscape in the UK; the true costs of cybercrime; and advanced cybersecurity techniques to prevent, detect and respond against these cyberthreats.

    Speaker

    Photo Speaker Name Profile
    Helge Husemann Helge Husemann View Profile
  • AI and Cyber Security: What does and does not work Add to Schedule Jamie Graves  |   ZoneFox   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 13:40 to 14:10

    AI and Cyber Security: What does and does not work

    With the rise of automation and artificial intelligence, you may be wondering how much of an impact this has on IT security. The question is, where will the future of machine learning and AI in cybersecurity take us and what are the limitations and advantages this technology offers in defending against the insider threat?

    Join us to find out more about AI and where you should be applying it right now.

    Learning outcomes:
    The current state of AI practice and research, and how this is impacting its use in cyber security
    What the current strengths and weaknesses are with existing AI approaches
    What next generation AI will deliver for us with regards to ensuring we can promptly detect and respond to security incidents

    Speaker

    Photo Speaker Name Profile
    Jamie Graves Jamie Graves View Profile
  • Four keys to tackle software vulnerabilities in commercial and in-house software Add to Schedule Jeroen Braak  |   Flexera  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 13:40 to 14:10

    Four keys to tackle software vulnerabilities in commercial and in-house software

    The world shifted to a paradigm that accepts that breaches will inevitably happen and they need to be detected and responded to in a more efficient fashion. However, the need and cost-effectiveness of prevention is still a reality that organizations have not been able to master, and application vulnerabilities remain at the top of security professionals concerns.

    With more than 50 new vulnerabilities disclosed every day in commercial software, it’s hard to stay focused and be effective. When you add vulnerabilities being introduced in the code being written in-house, the task just becomes unfeasible. Join us for this talk about how visibility, curation, prioritization and automation kick in for security, operations and engineering to work together towards a more secure software supply chain.

    Speaker

    Photo Speaker Name Profile
    Jeroen Braak Jeroen Braak View Profile
  • Wed 3rd Oct 14:00 - 14:50
  • XSS Everywhere!: What is it, why should I care, and how can I avoid it? Add to Schedule Nick Blundell  |   AppCheck NG   |   Cyber Hack

    Cyber Hack Theatre

    Wed 3rd Oct 14:00 to 14:50

    XSS Everywhere!: What is it, why should I care, and how can I avoid it?

    Cross-Site Scripting (XSS) is by far the most widespread high impact vulnerability present even in the best of web applications, regardless of the framework or programming language employed - a burly steadfast member of the OWASP Top Ten. The client-side nature of typical XSS has led to a general underappreciation of its exploitation potential, though a good understanding of the vulnerability and its subtle variations will show how it can be used to devastating effect... and more importantly: how it can be avoided.

    In this seminar we will build up piece-by-piece an understanding of XSS that spares no detail whilst being accessible also at a non-technical level.

    Speaker

    Photo Speaker Name Profile
    Nick Blundell Nick Blundell View Profile
  • Wed 3rd Oct 14:20 - 14:50
  • A day in the life of the UK’s biggest digital transformation Add to Schedule Mayank Prakash  |   Department for Work and Pensions (DWP)  |   Keynote Theatre

    Keynote Theatre

    Wed 3rd Oct 14:20 to 14:50

    A day in the life of the UK’s biggest digital transformation

    At DWP Digital we’re reimagining outcomes for over 22 million citizens; the scale and social purpose of this challenge is what sets us apart.

    In this session, find out more about the critical ingredients required to drive digital transformation at pace; from embedding a digital mind set to empowering multi-disciplinary teams, whilst continuing to invest in an innovation eco-system. We also look at the challenges that huge scale transformation can bring.

    Speaker

    Photo Speaker Name Profile
    Mayank Prakash Mayank Prakash View Profile
  • Leveraging AI for Dynamic & Surgical Autonomous Response for Cyber Defense Add to Schedule Dave Palmer  |   Darktrace   |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 14:20 to 14:50

    Leveraging AI for Dynamic & Surgical Autonomous Response for Cyber Defense

    Proposing a new approach to cyber defence, which uses dynamic AI systems that can counter the activity of malicious threats. This new advanced AI technology can autonomously contain and monitor relevant threats, increasing confidence that a problem is emerging before automatically stopping the threat without interrupting normal business and employee activities.

    Speaker

    Photo Speaker Name Profile
    Dave Palmer Dave Palmer View Profile
  • The Time is Ripe for Data Driven Proactive Security Add to Schedule Lucy Caiger  |   Panaseer  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 14:20 to 14:50

    The Time is Ripe for Data Driven Proactive Security

    Cyber Security is hard.  Security leaders must do their best with limited resources and time with a growing number of security products and devices in the face of ever-changing threats while an adversary only needs to get lucky once. Each layer generating data but can often still leave the fundamental question of "how secure are we and what are my biggest risks?"  Discover how leveraging your security, IT and business data you can evolve from a time consuming and costly reactive security approach to a proactive risk-based preparation and protection approach delivering a more secure organisation.

    Speaker

    Photo Speaker Name Profile
    Lucy Caiger Lucy Caiger View Profile
  • Gospel: The blockchain platform for enterprise data Add to Schedule Liam Jones  |   Gospel Technology  |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 14:20 to 14:50

    Gospel: The blockchain platform for enterprise data

    Gospel are leading a revolution in how companies control access to their sensitive data beyond traditional siloed perimeters, utilising the power of distributed ledger technology.

    Learn how their technology allows secure granular visibilty of data using contextual access controls to determine who sees what information right across the ecosystem, creating true trust in your enterprise.

    Described by IDC as "the first practical application of blockchain for enterprise".

    Speaker

    Photo Speaker Name Profile
    Liam Jones Liam Jones View Profile
  • Let’s Build a Wall: A Human Firewall Add to Schedule Hiwot Mendahun  |   Mimecast   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 14:20 to 14:50

    Let’s Build a Wall: A Human Firewall

    Many organisations tend to focus solely on using security solutions to protect their organisation from cyberattacks and fail. Since technology-based security systems can’t provide perfect protection end users play a critical part in an organisations’ security and risk posture.

    Mimecast looks at how organisations can detect, respond and recover from cyber threats keeping in mind the role of the end user. Learn tactics for how to make the end user a layer of additional security versus a security weakness.  Don’t let human error be your organisation’s weakest link.

    Speaker

    Speaker Name Profile
    Hiwot Mendahun View Profile
  • Anatomy of a Remote Access Trojan (RAT) attack Add to Schedule Fraser Howard   |   Sophos   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 14:20 to 14:50

    Anatomy of a Remote Access Trojan (RAT) attack

    In this presentation Fraser Howard will describe a rather curious malware incident that SophosLabs encountered. The presentation will include details from technical analysis of the threat in order to understand the capabilities and tricks used by the cybercriminals (and why). It will also explore how this specific incident maps to the broader threat landscape and what lessons we can learn to ultimately improve protection.

    Speaker

    Photo Speaker Name Profile
    Fraser Howard Fraser Howard View Profile
  • The current state of cyber security is a 24x7x365 game Add to Schedule Dan Pitman  |   Alert Logic   |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 14:20 to 14:50

    The current state of cyber security is a 24x7x365 game

    The lack of awareness around cyber threats and the risk that these pose to an organisation is a worrying state of affairs. Data breaches, hacks and various cyber attacks dominate the headlines on a regular basis. Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of threats you need to leverage software plus services to augment your security team and capabilities.
    Join Dan Pitman, Senior Solutions Architect, as he shares insights from Alert Logic’s 2018 Critical Watch Report, based upon findings from verified security incidents from thousands of companies around world.

    Speaker

    Photo Speaker Name Profile
    Dan Pitman Dan Pitman View Profile
  • Wed 3rd Oct 15:00 - 15:30
  • We take security seriously Add to Schedule Javvad Malik   |   AlienVault  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 15:00 to 15:30

    We take security seriously

    "We take security seriously" four words that are so easy to say, but what does it mean in the real world?
    Are they just soothing words designed to pacify frustrated users in the aftermath of a breach? Or can these words mean something more?
    I spent months speaking to CISOs, security professionals and practitioners, as well as going undercover to speak to business owners which certainly rattled some cages.
    Thankfully, I dodged many bullets, all in the name of attempting to quantify the unquantifiable - what does it really mean to take security seriously?
    So, come along, find out what the professionals think, what the general landscape is, what steps businesses can take, and maybe a few hard-to-believe side stories.

    Speaker

    Photo Speaker Name Profile
    Javvad Malik Javvad Malik View Profile
  • How do you unleash the power of data to detect, investigate and remediate? Add to Schedule Nick Pollard  |   Nuix  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 15:00 to 15:30

    How do you unleash the power of data to detect, investigate and remediate?

    Breaches are inevitable. Security researchers believe determined attackers can infiltrate any perimeter security system. It is vital to minimise the damage they can cause which requires information security disciplines.

    Speaker

    Speaker Name Profile
    Nick Pollard View Profile
  • How to Tackle the GDPR – A Typical Privacy and Security Roadmap Add to Schedule Ian Evans  |   OneTrust   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 15:00 to 15:30

    How to Tackle the GDPR – A Typical Privacy and Security Roadmap

    With a new era of privacy regulations upon us, security and compliance professionals must make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Thingbot Apocalypse: How to prepare for IoT attacks Add to Schedule David Warburton  |   F5 Labs  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 15:00 to 15:30

    Thingbot Apocalypse: How to prepare for IoT attacks

    It is projected that by 2035 there will be over 1 trillion Things connected to the internet. That’s 142 devices for every human on this planet. Despite cutting edge technology and exciting new use cases in fields such as medical care, smart homes and autonomous vehicles, these devices are routinely hacked. Since compromised IoT devices can be used to pivot inwards and attack an organisation’s internal network or, conversely, used to create a botnet to attack many organisations at once, IoT security affects all of us, whether we use personally use IoT or not.

    Research by F5 Labs has shown that IoT attacks have been lurking in the shadows for longer than you might think and used to carry out far more than just crude denial of service attacks. Threat campaigns using IoT devices include data theft, fraud and cryptojacking. This talk will show you what devices are vulnerable, how IoT devices are found and then compromised, the trends in IoT based attacks, and how to plan for and defend against the rise of the Thingbots!

    Speaker

    Photo Speaker Name Profile
    David Warburton David Warburton View Profile
  • Cyber Attack Trends from the Threatscape Add to Schedule Joe Nelson  |   eSentire  |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 15:00 to 15:30

    Cyber Attack Trends from the Threatscape

    What are the latest trends in the cyber criminal underworld? Which attacks are you likely to be preventing as we move further into 2018? Who’s looking for vulnerability on your network? These questions and more, answered by eSentire’s Principal Solutions Architect, Joe Nelson.

    Speaker

    Speaker Name Profile
    Joe Nelson View Profile
  • Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t) Add to Schedule Brian Shorland  |   BlueCat Networks  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 15:00 to 15:30

    Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t)

    Long dismissed as mere network plumbing, DNS has emerged to combat adversaries using it to bypass security defenses like firewalls, IDSs, and endpoint agents. In this session BlueCat’s Brian Shorland, will break down two cyberattacks and illustrate how DNS was used despite often being understated in the report of an attack. Shorland shows how DNS can be used to provide visibility and control to secure sensitive data and critical systems, both to defend against unwanted or unauthorized access and detect abnormal or malicious behavior. Shorland also covers how to implement policy control before internal DNS caching, and DNS query monitoring for breach detection and forensic visibility.

    Speaker

    Photo Speaker Name Profile
    Brian Shorland Brian Shorland View Profile
  • Crowdsourcing Security Risk Assessment Add to Schedule Laurie Mercer  |   HackerOne  |   Cyber Hack

    Cyber Hack Theatre

    Wed 3rd Oct 15:00 to 15:50

    Crowdsourcing Security Risk Assessment

    Cybercriminals have never been so notorious. As technology innovation seems to outpace security defenses, organizations, including the U.S. Department of Defense, are turning to ethical-hackers to assess risk and see where they are most vulnerable. Can these external hackers be trusted? Hear from leading experts about the misconceptions of working with hackers, what vulnerabilities are most common and how these programs can be used to manage and assess risk.

    Speaker

    Photo Speaker Name Profile
    Laurie Mercer Laurie Mercer View Profile
  • Wed 3rd Oct 15:40 - 16:10
  • IS YOUR SOC SOARING OR SNORING? Add to Schedule Chris Harazinski  |   Splunk, Inc.   |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 15:40 to 16:10

    IS YOUR SOC SOARING OR SNORING?

    How many security alerts can your operations team process daily? Not enough? Many organizations are in the same boat; looking for ways to mature their security operations, and increase the efficiency of skilled security analysts. However, teams that utilize Security Orchestration, Automation & Response (SOAR) platforms are seeing improvements in scale, consistency, and are responding to alerts at machine speed. 

    Speaker

    Speaker Name Profile
    Chris Harazinski View Profile
  • PAM to the Rescue: 3 Common Security Scenarios Add to Schedule Grant Burst   |   WALLIX  |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 15:40 to 16:10

    PAM to the Rescue: 3 Common Security Scenarios

    During this seminar, we will present 3 common scenarios accros all sectors of activity, where IT security is at risk. Using a demo and real use cases, the objective is to demonstrate how Privileged Access Management (PAM) can help you save the day.

    Speaker

    Photo Speaker Name Profile
    Grant Burst Grant Burst View Profile
  • Getting best value out of your proxy investments with ultra-secure browsing Add to Schedule Henry Harrison  |   Garrison Technology   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 15:40 to 16:10

    Getting best value out of your proxy investments with ultra-secure browsing

    Once upon a time, the job of the proxy as a security tool was clear: identify bad sites and bad content, and block it. With increasingly sophisticated and targeted attacks, this job is getting harder and harder. It is time for the job of the proxy (or the proxy service) to change. From identifying and blocking known bad sites, it must transitions to keeping endpoints protected by identifying and blocking potentially risky sites.

    But in some cases these risky sites provide valid content and services, and employees have a legitimate need to go there. Rather than simply unblocking them - after all, they still remain risky - the need is for an ultra-secure browsing solution that employees can use to visit even the riskiest sites without putting the endpoint at risk. Learn how Garrison SAVI® ultra-secure browsing can help you give your proxy or proxy service a new lease of life as a platform for risk-based policy enforcement.

    Speaker

    Photo Speaker Name Profile
    Henry Harrison Henry Harrison View Profile
  • Defeat Digital Impersonation & Fake Traffic At Scale Add to Schedule Tech Leaders  |  Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 15:40 to 16:10

    Defeat Digital Impersonation & Fake Traffic At Scale

    The world’s largest digital businesses trust Shape Security to improve user experience and reduce fraud by identifying the new generation of attacks targeting legitimate web and mobile applications functionality. Today, attackers cleverly impersonate users through malware, botnets, and widely available toolkits, and are able to easily bypass most security measures.

    Join us as we share how Shape defeats these advanced attacks.

    Speakers

    Photo Speaker Name Profile
    Chris Fuller Chris Fuller View Profile
    Sean Bennett Sean Bennett View Profile
  • Your Move To The Cloud Secured Add to Schedule Tech Leaders  |  Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 15:40 to 16:10

    Your Move To The Cloud Secured

    We’ll cover the security challenges organizations are facing in their move to the cloud, ways to address these obstacles, and how the future of cloud security is changing as new technologies like containers are deployed in enterprise cloud environments.

    Speakers

    Photo Speaker Name Profile
    Richard Jones Richard Jones View Profile
    Simon Crocker Simon Crocker View Profile
  • PANEL: Cyber Security - The Year Ahead Add to Schedule Panel  |  Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 15:40 to 16:30

    Speakers

    Photo Speaker Name Profile
    David Atkinson David Atkinson View Profile
    Doug Howard Doug Howard View Profile
    Gary S. Miliefsky Gary S. Miliefsky View Profile
    Richard Kirk Richard Kirk View Profile
  • Wed 3rd Oct 16:20 - 16:50
  • From liability to asset: the role DNS should be playing in your security architecture and operations Add to Schedule Steven Tee  |   Infoblox  |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 16:20 to 16:50

    From liability to asset: the role DNS should be playing in your security architecture and operations

    DNS is a ubiquitous network service which has a front row seat when it comes to malware activities. Most organizations neglect to consider the scale and simplicity of using DNS as a visibility and control point. DNS servers are also home to a wealth of essential operational data that can accelerate incident investigation.

    This session will discuss the role that DNS could and should play in security architecture and operations as well as identify how DNS itself is increasingly used as an attack vector by malicious actors.

    Speaker

    Photo Speaker Name Profile
    Steven Tee Steven Tee View Profile
  • Brought to you by Usecure Add to Schedule

    Cloud Security Theatre

    Wed 3rd Oct 16:20 to 16:50

  • Protection from Internet Crime & Advanced Threats Add to Schedule Dr. Serge Droz  |   Open Systems   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 16:20 to 16:50

    Protection from Internet Crime & Advanced Threats

    Digital business and cybersecurity risks have become inseparable. Enterprises need to think beyond compromise in order to understand the affects. In this presentation, hear from Open System’s VP of OS-Cert as he takes a deep dive into the internet underground and how to protect your Enterprise against the real internet threats from internet crime and advanced threats.

    Speaker

    Photo Speaker Name Profile
    Dr. Serge Droz Dr. Serge Droz View Profile
  • Why do PAM projects fail? Tales from the trenches Add to Schedule John Murdoch  |   One Identity   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 16:20 to 16:50

    Why do PAM projects fail? Tales from the trenches

    Privileged accounts hold the keys to highly sensitive company information, and once these credentials are targeted, they can easily open the gate to a company’s most valuable assets; from databases and infrastructure to social media and unstructured data. Most enterprises have implemented some form of Privileged Access Management (PAM) but many find those initiative fail to live up to expectations. In this session, John Murdoch from One Identity will discuss the common reasons why PAM projects fail to deliver with practical insights gained in the field.
     

    Speaker

    Photo Speaker Name Profile
    John Murdoch John Murdoch View Profile
  • Thu 4th Oct 10:00 - 10:40
  • How to Fix the Future Add to Schedule Andrew Keen  |     |   Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 10:00 to 10:40

    How to Fix the Future

    Promising to enrich democracy and level the playing field, the digital revolution has actually compounded inequality, created a surveillance style economy, fostered a long term unemployment crisis and poisoned our culture. So how to fix the future? Focusing on regulation, innovation, consumer power, citizen engagement and education, Andrew Keen lays out a five pronged strategy to realize the positive promise of the digital revolution. Real world examples taken from Estonia, Singapore, Silicon Valley, India, Germany

    Register now see Andrew Keen live at IP EXPO Europe.

    Register now

    Speaker

    Photo Speaker Name Profile
    Andrew Keen Andrew Keen View Profile
  • Thu 4th Oct 11:00 - 11:30
  • Lessons I learnt about Cybersecurity from my Dad Add to Schedule Brian Honan   |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 11:00 to 11:30

    Lessons I learnt about Cybersecurity from my Dad

    At its heart many of the issues we face with cybersecurity relate to how users interact with the systems they use. Following a conversation with my father about how unsafe cars were when he was a young boy and how car safety has evolved over the subsequent decades, this talk will use that evolution of car safety to highlight how cybersecurity should evolve.

    Speaker

    Photo Speaker Name Profile
    Brian Honan Brian Honan View Profile
  • Using The Sith Mindset To Build And Hone A Jedi SIEM Add to Schedule Samantha Humphries  |   Rapid7  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 11:00 to 11:30

    Using The Sith Mindset To Build And Hone A Jedi SIEM

    Yes, we used a Star Wars reference to catch your attention, and now we’ve caught it we’re excited to show you the fully operational battle station that is InsightIDR. Today you’ll see a bunch of SIEMs, with great features including UEBA, automation, analytics, and threat intelligence. However, this is the only SIEM built in collaboration with the teams that make and use the world’s leading pentesting tool. During this session, you’ll hear how we use the attacker mindset to ensure your team have the very best technologies at their fingertips. And there will definitely be Star Wars references, because obviously.

    Speaker

    Photo Speaker Name Profile
    Samantha Humphries Samantha Humphries View Profile
  • Prevention is Better than Cure – Leveraging IAM to Eliminate Phishing Add to Schedule Tech Leaders  |  Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 11:00 to 11:30

    Prevention is Better than Cure – Leveraging IAM to Eliminate Phishing

    The current approach to tackling phishing does not work. Join Mike Newman, CEO of My1Login and Derek Gordon, Cyber Security Director for PwC, who will guide you through how to leverage your Identity & Access Management to eliminate phishing.

    Speakers

    Photo Speaker Name Profile
    Derek Gordon Derek Gordon View Profile
    Mike Newman Mike Newman View Profile
  • Evolving Security Analysis: Combining Human and Cyber Threat Intelligence Add to Schedule Tech Leaders  |  Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 11:00 to 11:30

    Evolving Security Analysis: Combining Human and Cyber Threat Intelligence

    Deception tactics used by attackers are evolving faster than the defensive techniques of most email security systems. To combat this, Mimecast continuously harvests threat intelligence from billions of monthly emails. As an email security cloud gateway, we regularly see attackers using both new evasion techniques as well as malware that's over a decade old. Mimecast understands Threat Intelligence, but with all the technology in the world, do we need a human’s trained eye to spot the threat to your company or organisation?

    Speakers

    Speaker Name Profile
    Derek Buchanan View Profile
    Kirsty Kelly View Profile
  • Closing the Hidden Open Doors of SD-WAN Add to Schedule Patrick Grillo  |   Fortinet   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 11:00 to 11:30

    Closing the Hidden Open Doors of SD-WAN

    SD-WAN is one of the top technology stories of the year, promising the best of everything and solving problems that you didn’t knew you had.  With all of this attention on the bright and shiny bits of SD-WAN, what has slipped through the cracks is the inconvenient truth that if SD-WAN is not properly implemented the damage it can cause will be far greater than any possible benefit.This session will focus on understanding the key shortcoming of SD-WAN, how to counter it and make sure that your SD-WAN efforts deliver their full potential.

    Speaker

    Photo Speaker Name Profile
    Patrick Grillo Patrick Grillo View Profile
  • Automated Security in a Multi Cloud World Add to Schedule Tech Leaders  |  Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 11:00 to 11:30

    Automated Security in a Multi Cloud World

    Businesses are moving and building new applications in cloud environments at an ever increasing pace. Learning how to manage the security and application services of these apps wherever they live can be a challenging and time consuming task.

    We show you how automation can help you deliver application security in a multi cloud world.

    Speakers

    Photo Speaker Name Profile
    Keiron Shepherd Keiron Shepherd View Profile
    Matthew Prickett Matthew Prickett View Profile
  • XSS Everywhere!: What is it, why should I care, and how can I avoid it? Add to Schedule Nick Blundell  |   AppCheck NG   |   Cyber Hack

    Cyber Hack Theatre

    Thu 4th Oct 11:00 to 11:50

    XSS Everywhere!: What is it, why should I care, and how can I avoid it?

    Cross-Site Scripting (XSS) is by far the most widespread high impact vulnerability present even in the best of web applications, regardless of the framework or programming language employed - a burly steadfast member of the OWASP Top Ten. The client-side nature of typical XSS has led to a general underappreciation of its exploitation potential, though a good understanding of the vulnerability and its subtle variations will show how it can be used to devastating effect... and more importantly: how it can be avoided.

    In this seminar we will build up piece-by-piece an understanding of XSS that spares no detail whilst being accessible also at a non-technical level.

    Speaker

    Photo Speaker Name Profile
    Nick Blundell Nick Blundell View Profile
  • Thu 4th Oct 11:40 - 12:10
  • Zero Trust & The Flaming Sword of Justice Add to Schedule Dave Lewis  |   Duo Security  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 11:40 to 12:10

    Zero Trust & The Flaming Sword of Justice

    Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues that are introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at front of mind defenders need to focus on proper network zone segmentation or, as it more popular term these days, zero trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter a stronger focus has to be placed on the strength of authentication, authorization and trust models for the users. 

    The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached it’s denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust but, verify.

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • Security. Made Smarter: Intelligent threat detection and response Add to Schedule Jonathan Zulberg  |   LogRhythm  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 11:40 to 12:10

    Security. Made Smarter: Intelligent threat detection and response

    Your job is to protect your organisation from cyberattacks. To do so, your team must make sense of a plethora of data that is growing exponentially. Resources may be tight, you may be struggling with too many alerts, and you may not be getting the visibility you need with data spread across multiple systems.

    In these circumstances, constantly evolving threats can slip through the cracks. The pressure of missing a damaging breach could be causing you to lose sleep.

    Join LogRhythm to discover how you can reduce your organisation’s risk with a smarter end-to-end approach to cybersecurity that maximises the efficiency and effectiveness of your security operations.

    Learn how:

    • NextGen SIEM enables measurably faster threat detection and response
    • UEBA improves and deepens visibility of user behaviour
    • Automation and orchestration boost efficiency and productivity
    • Threat Lifecycle Management holds the key to effective security operations
    • Machine learning and AI add a new dimension to your security analytics 
    • Cloud analytics provides the scale and intelligence needed for rapid threat detection

    Speaker

    Photo Speaker Name Profile
    Jonathan Zulberg Jonathan Zulberg View Profile
  • People and Passwords Add to Schedule Pedro Martins  |   LastPass by LogMeIn  |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 11:40 to 12:10

    People and Passwords

    Despite the increased use of two-factor authentication, single sign-on, and biometrics, passwords are still the most common form of authentication. In the first analyst report on Enterprise Password Management (EPM), Forrester acknowledged the password problem and the risks that they present to businesses.

    In this talk, we will look at why employees still use weak passwords despite knowing the risks and provide guidance for security and IT professionals on keeping password costs and risks under control, without losing employee buy-in.

    Speaker

    Photo Speaker Name Profile
    Pedro Martins Pedro Martins View Profile
  • Don't Let BYOD Put Your Whole Network at Risk Add to Schedule Matt Boddy  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 11:40 to 12:10

    Don't Let BYOD Put Your Whole Network at Risk

    We carry mobile devices with us at all times, we take them to bed, we take them to the bathroom. We’ve seen time and time again what happens if someone clicks the wrong link on a Windows machine. But what happens if you do the same on your mobile? What happens if you then later connect to the same network as that mobile device? How can we protect ourselves, our families and our colleagues? These are all questions I aim to answer during this presentation where I hack into an Android device and use that device to take down a corporate network.

    Speaker

    Photo Speaker Name Profile
    Matt Boddy Matt Boddy View Profile
  • There is no inside: Why you need to move beyond perimeter based security. Add to Schedule Andrew Crail  |   Akamai  |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 11:40 to 12:10

    There is no inside: Why you need to move beyond perimeter based security.

    A number of digital transformation initiatives are forcing businesses to rethink their enterprise security architecture. With breaches on the rise, users increasingly mobile, and data and applications moving to the cloud, businesses have to consider whether traditional perimeter-based security approaches are even relevant. The enterprise security perimeter model doesn’t fit for today’s world. Whether you call it Zero Trust, CARTA, or BeyondCorp, a secure model to access on-premise, Iaas, and SaaS apps is the right approach for the future.

    Speaker

    Photo Speaker Name Profile
    Andrew Crail Andrew Crail View Profile
  • Cyber Attack Trends from the Threatscape Add to Schedule Joe Nelson  |   eSentire  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 11:40 to 12:10

    Cyber Attack Trends from the Threatscape

    What are the latest trends in the cyber criminal underworld? Which attacks are you likely to be preventing as we move further into 2018? Who’s looking for vulnerability on your network? These questions and more, answered by eSentire’s Principal Solutions Architect, Joe Nelson.

    Speaker

    Speaker Name Profile
    Joe Nelson View Profile
  • Thu 4th Oct 12:00 - 12:50
  • If you liked it, you should have put security on it Add to Schedule Tech Leaders  |  Cyber Hack

    Cyber Hack Theatre

    Thu 4th Oct 12:00 to 12:50

    If you liked it, you should have put security on it

    Organisations know that cyber security is a huge concern, each year they budget for and insure against cyber incidents. However, if you follow any news, we know this fails consistently. Cyber security is confusing, and that confusion will need to negativity, shame, and embarrassment; leading to a lack of effective communication. In this talk, we will identify how to effectively approach a holistic security programme, through awareness, culture, and understanding on how to approach Security by Design.

    Speakers

    Photo Speaker Name Profile
    Louise Forrest Louise Forrest View Profile
    Zoë Rose Zoë Rose View Profile
  • Thu 4th Oct 12:20 - 12:50
  • Bot or human? Applying machine learning to combating the bot epidemic Add to Schedule Laurent Gil   |   Oracle Dyn  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 12:20 to 12:50

    Bot or human? Applying machine learning to combating the bot epidemic

    Bots now make up over 50 percent of website traffic, and have become the primary source of malicious application attacks, from DDoS to sophisticated intrusions. In this session you'll learn what you need to know about bot traffic, different types of bots, and real-world applications of ML and AI to identify and defeat malicious bots.

    Speaker

    Photo Speaker Name Profile
    Laurent Gil Laurent Gil View Profile
  • Next-Gen Approach to Security Monitoring with Machine Learning on Hadoop Add to Schedule Jamie Sarakinis  |   Securonix   |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 12:20 to 12:50

    Next-Gen Approach to Security Monitoring with Machine Learning on Hadoop

    We live in a digital world where the volume, variety, and velocity of data continue to grow exponentially. Collecting and analyzing this data for actionable threats is an enormous challenge. Legacy SIEM tools designed 10+ years ago are not architected to scale to handle this massive volume of data, and the rule-based approach used by these SIEMS is not sufficient to detect advanced modern cyber threats.

    Join Securonix to learn about the next-gen approach to security monitoring. The Hadoop platform enables unlimited scale, and machine learning-based analytics enables you to find the needle in the haystack of threats with minimal human intervention.

    Speaker

    Photo Speaker Name Profile
    Jamie Sarakinis Jamie Sarakinis View Profile
  • Workspace Evolution Add to Schedule Tech Leaders  |  Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 12:20 to 12:50

    Workspace Evolution

    The time to migrate is now! Let us show you how easy it is to integrate on-premises Citrix infrastructures, including Legacy 6.5, with the new Citrix Workspace Platform.

    Speakers

    Photo Speaker Name Profile
    Craig Bramley Craig Bramley View Profile
    Wendy Gay Wendy Gay View Profile
  • Thingbot Apocalypse: How to prepare for IoT attacks Add to Schedule David Warburton  |   F5 Labs  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 12:20 to 12:50

    Thingbot Apocalypse: How to prepare for IoT attacks

    It is projected that by 2035 there will be over 1 trillion Things connected to the internet. That’s 142 devices for every human on this planet. Despite cutting edge technology and exciting new use cases in fields such as medical care, smart homes and autonomous vehicles, these devices are routinely hacked. Since compromised IoT devices can be used to pivot inwards and attack an organisation’s internal network or, conversely, used to create a botnet to attack many organisations at once, IoT security affects all of us, whether we use personally use IoT or not.

    Research by F5 Labs has shown that IoT attacks have been lurking in the shadows for longer than you might think and used to carry out far more than just crude denial of service attacks. Threat campaigns using IoT devices include data theft, fraud and cryptojacking. This talk will show you what devices are vulnerable, how IoT devices are found and then compromised, the trends in IoT based attacks, and how to plan for and defend against the rise of the Thingbots!

    Speaker

    Photo Speaker Name Profile
    David Warburton David Warburton View Profile
  • Don't let BYOD put your whole network at risk Add to Schedule Matt Boddy  |   Sophos   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 12:20 to 12:50

    Don't let BYOD put your whole network at risk

    We carry mobile devices with us at all times, we take them to bed, we take them to the bathroom. We’ve seen time and time again what happens if someone clicks the wrong link on a Windows machine. But what happens if you do the same on your mobile? What happens if you then later connect to the same network as that mobile device? How can we protect ourselves, our families and our colleagues? These are all questions I aim to answer during this presentation where I hack into an Android device and use that device to take down a corporate network.

    Speaker

    Photo Speaker Name Profile
    Matt Boddy Matt Boddy View Profile
  • Stepping into the cloud with confidence Add to Schedule Paul D’Cruz  |   Cisco Systems  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 12:20 to 12:50

    Stepping into the cloud with confidence

    It’s no surprise that organizations are increasingly investing in the cloud for its key capabilities—ease of use, scalability, and cost savings. The cloud is changing the way we work. This also introduces new security risks. You can roll the dice and hope that someone else is keeping an eye on security. Or, you can ensure your security in the cloud with Cisco Stepping into the cloud with confidence solutions. In this session, you will see how things are changing, what the new risks are, and how you can protect yourself and your company as you take advantage of the many benefits of using the cloud.

    Speaker

    Photo Speaker Name Profile
    Paul D’Cruz Paul D’Cruz View Profile
  • PANEL: Privacy vs Security - the good, the bad & the ugly Add to Schedule Panel  |  Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 12:20 to 13:10

    PANEL: Privacy vs Security - the good, the bad & the ugly

    Privacy has been in the spotlight in recent years with revelation about how much access both government agencies and more recently social networks have to personal data. However in a catch-22 situation both privacy at the expense of security and security at the expense of privacy seem to be equally unpalletable. So how does one strike a balance between two sides so far at odds with each other and find a middle ground acceptable to all parties?

    Speakers

    Photo Speaker Name Profile
    Brian Honan Brian Honan View Profile
    Dave Lewis Dave Lewis View Profile
    Kuan Hon Kuan Hon View Profile
    Lisa Forte Lisa Forte View Profile
    Paul Ducklin Paul Ducklin View Profile
  • Thu 4th Oct 13:00 - 13:30
  • Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t) Add to Schedule Brian Shorland  |   BlueCat Networks  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 13:00 to 13:30

    Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t)

    Long dismissed as mere network plumbing, DNS has emerged to combat adversaries using it to bypass security defenses like firewalls, IDSs, and endpoint agents. In this session BlueCat’s Brian Shorland, will break down two cyberattacks and illustrate how DNS was used despite often being understated in the report of an attack. Shorland shows how DNS can be used to provide visibility and control to secure sensitive data and critical systems, both to defend against unwanted or unauthorized access and detect abnormal or malicious behavior. Shorland also covers how to implement policy control before internal DNS caching, and DNS query monitoring for breach detection and forensic visibility.

    Speaker

    Photo Speaker Name Profile
    Brian Shorland Brian Shorland View Profile
  • Can you enable SaaS based Line of Business agility, without compromising IT security? Add to Schedule Daniel Power  |   OneLogin   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 13:00 to 13:30

    Can you enable SaaS based Line of Business agility, without compromising IT security?

    The objective of this session is enable IT to change managers, and employees, perception of being the department that says No, to the department that says Yes, and we will make everyone’s life easier too!
    Focussing on understanding the challenge of Shadow IT, OneLogin will be looking to how to address these challenges at an organisational and technological level.

    Speaker

    Photo Speaker Name Profile
    Daniel Power Daniel Power View Profile
  • A new Era of Cybersecurity Attacks Add to Schedule Ross Laing  |   Bitdefender   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 13:00 to 13:30

    A new Era of Cybersecurity Attacks

    An increase in sophisticated cyber-attacks worldwide in 2017 created a turbulent market. In most cases, company’s endpoints remained the main target for attackers looking to obtain a foothold into the corporate network. Faced with an increasing wave of sophisticated and elusive attacks, companies have started to pay more attention to security risks, focusing both on operational security practices, as well on strengthening their last mile of surface attacks with investments in security technologies able to address the new risks imposed by the changing nature of attacks.

    Speaker

    Photo Speaker Name Profile
    Ross Laing Ross Laing View Profile
  • Confessions of a Hacker – Under the Hoodie Add to Schedule Samantha Humphries  |   Rapid7  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 13:00 to 13:30

    Confessions of a Hacker – Under the Hoodie

    In this revealing session discover the tools and techniques hackers use to defeat the expensive security safeguards used in many corporate environments today. Low tech and high tech methods will be presented in an effort to help attendees understand the true level of risk faced by their organizations and where the gaps may be in their defence perimeter.

    Speaker

    Photo Speaker Name Profile
    Samantha Humphries Samantha Humphries View Profile
  • DNS Tunneling and Exfiltration Add to Schedule Kevin Piper  |   Verisign  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 13:00 to 13:30

    DNS Tunneling and Exfiltration

    Hiding in plain sight, the use of DNS, a critical component of online communication, is being leveraged by hackers for malicious activities such as stealing your data, delivering malicious payloads to your systems, and probing you network for vulnerabilities.  

    DNS tunneling and exfiltration present potent threats to data security, which can be extremely difficult to detect if your organization lacks security solutions designed to spot and mitigate them.  By understanding and implementing solutions to combat DNS tunneling and exfiltration, you can keep your organization secure.

    Speaker

    Photo Speaker Name Profile
    Kevin Piper Kevin Piper View Profile
  • Seeing but not observing – the clear distinction between IoCs and TTPs Add to Schedule Richard Cassidy   |   Exabeam  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 13:00 to 13:30

    Seeing but not observing – the clear distinction between IoCs and TTPs

    Organisations need new strategies for detecting advanced attacks.  While discovering Indicators of Compromise (IoCs) is necessary, more focus is needed on Tools, Techniques and Procedures (TTPs) as attackers turn to sophisticated automation, constantly evolving their methods to avoid detection.  
     
    In this session, Exabeam’s Director of Sales Engineering, Richard Cassidy, will explain why IOC’s have become a red herring in security investigation and response, as traditional SIEM technologies struggle to make sense of where critical risks lay.
     
    By breaking down the broad anatomy of an attack – by dissecting a well know APT groups TTP’s – Richard will demonstrate how to uncover and identify the most sophisticated attack patterns targeting organisations today.  He will discuss why the traditional SIEM and IoC correlation approaches are adding to the alert and incident investigation fatigue that many organisations are battling today, and why analytics – in tandem with SIEM – provides a much needed new perspective on threat, compliance and risk activity management.

    Speaker

    Photo Speaker Name Profile
    Richard Cassidy Richard Cassidy View Profile
  • GDPR – Where do we go from here? Add to Schedule Joanne Bone  |   Irwin Mitchell LLP  |   Cyber Hack

    Cyber Hack Theatre

    Thu 4th Oct 13:00 to 13:50

    GDPR – Where do we go from here?

    It’s almost 5 months since the GDPR came into force and so where are we now?  Joanne will take a practical look at what has happened in the last 5 months and what happens next with GDPR including: where has the ICO been active so far, what issues are businesses facing, how to deal with the deluge of data processing addendums and what is the position with the next wave of privacy legislation.

    Speaker

    Photo Speaker Name Profile
    Joanne Bone Joanne Bone View Profile
  • Thu 4th Oct 13:40 - 14:10
  • Real cases of social engineering: hackers, competitors and insiders Add to Schedule Lisa Forte  |   Red Goat Cyber Security LLP  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 13:40 to 14:10

    Real cases of social engineering: hackers, competitors and insiders

    Social engineering can range from a simple phishing email to a prolonged campaign to turn one of your employees into a malicious insider. Lisa will share some interesting cases she has worked on involving large organisations that have been attacked through social engineering by both malicious actors and competitors. She will detail how the process works, what to look out for when it comes to insider threats and how cyber organised crime groups are trading in fake social media profiles.

    Speaker

    Photo Speaker Name Profile
    Lisa Forte Lisa Forte View Profile
  • Threat Intelligence with ShadowSearch Add to Schedule Rose Bernard  |   Digital Shadows  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 13:40 to 14:10

    Threat Intelligence with ShadowSearch

    Following the takedown of Alphabay and other high profile criminal marketplaces in July and August 2017, the cybercriminal ecosystem has changed and developed in a number of ways, shifting to smaller, trusted groups and peer-to-peer communications over the wide catch-all style marketplaces. In this presentation we look at how this shift and the subsequent professionalisation and specialisation or the deep and dark web has changed the threat landscape, the consequences for companies and individuals, and how Digital Shadows analysts navigate the new ecosystem.

    Speaker

    Photo Speaker Name Profile
    Rose Bernard Rose Bernard View Profile
  • To Trust Or Not To Trust…A Risk-Based Approach To Cyber Defence Add to Schedule David Higgins  |   CyberArk  |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 13:40 to 14:10

    To Trust Or Not To Trust…A Risk-Based Approach To Cyber Defence

    Hacking has proven a relatively risk-free way to obtain sensitive data and IP in recent years, with attackers able to lurk for months on networks, conducting essential surveillance and compromising the credentials they need to move laterally before launching their endgame – whatever that might be. We don’t necessarily lack visibility of what is going on in our networks but we certainly lack the ability to tell whether what is going on is something that can be trusted…or something that needs attention. This session will cover how to correctly apportion risk to network activity by focusing on managing and securing the credentials that allow access to critical assets. It will argue that it is crucial to identify what is truly necessary to secure and to implement a strategy to support this that provides a defensible ROI argument.  

    Speaker

    Photo Speaker Name Profile
    David Higgins David Higgins View Profile
  • How would you find out if a supplier breached your data? Add to Schedule Jeremy Hendy  |   RepKnight   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 13:40 to 14:10

    How would you find out if a supplier breached your data?

    We all use tens or hundreds of third-party suppliers to store and process our data. Whether it’s your CRM, HR software, payroll, training and pension companies, your corporate data has already left the building. And as we’ve seen with many high-profile businesses like Ticketmaster, a third-party data breach can quickly cause major reputational & financial damage to your business. But how do you look after your data when it’s outside your network?

    This presentation outlines simple steps for Data Breach Detection, ensuring you're the first to find out when your data is leaked, hacked, or sold on the Dark Web. In a post-GDPR world, Data Breach Detection could save you millions.

    Speaker

    Photo Speaker Name Profile
    Jeremy Hendy Jeremy Hendy View Profile
  • Code Re-Use Analysis: The Forgotten Component of Your Incident Response Plan Add to Schedule Ari Eitan  |   Intezer   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 13:40 to 14:10

    Code Re-Use Analysis: The Forgotten Component of Your Incident Response Plan

    In the software development world, engineers frequently use ready-made code for various tasks. On the darker side of things, malware authors follow in the same path, why write your own code when existing code is prevalent and easy to use. A phenomenon that we see time and time again and one that proves beneficial in detecting malicious intent, if understood correctly.

    In this session we will demonstrate how finding code reuse of known malware with Intezer Analyze enables you to improve malware detection and analysis.

    Speaker

    Photo Speaker Name Profile
    Ari Eitan Ari Eitan View Profile
  • Why All Behaviours And Emotions In Your Network Today Are Important To Understand Add to Schedule Harry Tinson  |   HANDD Business Solutions   |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 13:40 to 14:10

    Why All Behaviours And Emotions In Your Network Today Are Important To Understand

    If someone is on your network you should assume they’re in it.

    In a digitally changing world, a dynamic approach to security is something to be desired. The best malware behaves like a human – humans are vulnerable and unpredictable – not predictable strings of 1’s and 0’s.

    During this session Harry will run through user cases worked on with large organisations, outlining how data security has developed from a CISO’s chore into a strategic state of mind across the whole organisation.

    Speaker

    Photo Speaker Name Profile
    Harry Tinson Harry Tinson View Profile
  • Thu 4th Oct 14:00 - 14:50
  • How safe is your Password? Next Generation Authentication and E-Signature Add to Schedule Dan McLoughlin  |   OneSpan  |   Cyber Hack

    Cyber Hack Theatre

    Thu 4th Oct 14:00 to 14:50

  • Thu 4th Oct 14:20 - 14:50
  • Harnessing the Law of Data Gravity – Cyber Defence for the Hybrid Cloud Add to Schedule Siân John  |   Microsoft  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 14:20 to 14:50

    Harnessing the Law of Data Gravity – Cyber Defence for the Hybrid Cloud

    Digital transformation drives business critical workloads to the cloud, it’s also driving traditional cybersecurity operations managers a little nuts. Harnessing the law of data gravity is a promising path forward for cyber defence and response. This talk will propose a new model that replaces the old school SIEM enabling SOC teams to focus on intelligent automation and security decision making where context and integration from data gravity is most abundant. This session will outline how the law of data gravity can be applied to security and demonstrate some first steps toward a new SOC / cyber defence model for 2020 and beyond

    Speaker

    Photo Speaker Name Profile
    Siân John Siân John View Profile
  • Evolve Your Identity Strategy for Digital Transformation Add to Schedule Tech Leaders  |  Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 14:20 to 14:50

    Evolve Your Identity Strategy for Digital Transformation

    Homegrown, manual identity and access management (IAM) systems are no longer sufficient for digital businesses. Trends in customer experience, cloud-based services, regulation compliance and security are among many factors driving businesses toward a more comprehensive customer IAM strategy. This is a significant shift from IAM’s original purpose, which focused primarily on employee access and compliance objectives.

    Speakers

    Photo Speaker Name Profile
    Neill Brookman Neill Brookman View Profile
    Todd Etchieson Todd Etchieson View Profile
  • ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts Add to Schedule Kevin Kiley  |   OneTrust   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 14:20 to 14:50

    ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts

    Together, security and privacy teams share a common goal: Protect the organization from reputational damage, lawsuits, and regulatory trouble. On one hand, ISO 27001 focuses on the assessment of risks and protection of the organization. On the other, the GDPR aims to assess and protect the rights and freedoms of individuals. With a joint goal in mind, it is crucial that security and privacy teams work together to develop a common language that produces greater productivity and takes advantage of collective efforts. In this session, OneTrust will present findings from research conducted in cooperation with the International Association of Privacy Professionals (IAPP), sharing how ISO 27001 and the GDPR overlap, as well as how security and privacy teams can work together to become more effective.

    Speaker

    Photo Speaker Name Profile
    Kevin Kiley Kevin Kiley View Profile
  • Scoping infections and disrupting breaches with Splunk Add to Schedule Greg Wiley  |   Splunk, Inc.   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 14:20 to 14:50

    Scoping infections and disrupting breaches with Splunk

    Infection and exploits will occur. The new goal is to prevent those infections from becoming a data breach. To do this successfully, security analysts need the ability to continuously collect, analyze, correlate and investigate a diverse set of data.
    Listen to this session to hear the specific data sources and capabilities required to determine the scope of an infection before it turns into a breach. See a live incident investigation that demonstrates this approach.

    Speaker

    Speaker Name Profile
    Greg Wiley View Profile
  • Pathway to the Future of Security & SD-WAN Add to Schedule David van Schravendijk  |   Cisco Meraki   |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 14:20 to 14:50

    Pathway to the Future of Security & SD-WAN

    SaaS applications are straining existing network infrastructure and cybersecurity threats are consistently evolving. Learn how a network can be re-architected to prepare for the upcoming digital transformation using simplicity. Security & SD-WAN can be delivered together intuitively and effectively.

    Speaker

    Photo Speaker Name Profile
    David van Schravendijk David van Schravendijk View Profile
  • Thu 4th Oct 15:00 - 15:30
  • Is your Board of Directors Cyber-Ready? Add to Schedule Georgie Collins  |   Irwin Mitchell LLP  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 15:00 to 15:30

    Is your Board of Directors Cyber-Ready?

    A primary responsibility of every board of directors is to secure the future of the company.  The overwhelming number of cyber incidents has escalated the issue of cybersecurity to being on the shortlist of organisation’s risk portfolio and board’s crucial responsibilities.  Against a backdrop of increasing pressure from regulators and ongoing cyber-attacks, board directors have a critical role to play to ensure proper oversight of cyber risks for their companies. Directors need to understand and approach cybersecurity as an enterprise-wide risk management issue, not just an IT issue.

    Speaker

    Photo Speaker Name Profile
    Georgie Collins Georgie Collins View Profile
  • How Client-Side Application Shielding Can Tackle Fraud and Detect Tampering On Your Website Add to Schedule Carlos M. Gonçalves  |   Jscrambler  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 15:00 to 15:30

  • The Role of Threat Hunting in Breach Prevention and Compliance Add to Schedule Daniel Alexander Shepherd  |   Agile Response Technologies A/S  |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 15:00 to 15:30

    The Role of Threat Hunting in Breach Prevention and Compliance

    Threat Hunting is an emerging discipline that aims to reduce companies' "time to detection". This seminar aims to provide an integrated view of hunting applied to both threats and risks, as applied to breach prevention and compliance-oriented processes, exploring themes around why this should be a priority activity for any organisation and how it should be done to maximise effectiveness and quality of remediation decisions.

    Speaker

    Photo Speaker Name Profile
    Daniel Alexander Shepherd Daniel Alexander Shepherd View Profile
  • Head in the Clouds? Let’s get serious about how to benefit from Cloud platforms whilst staying protected Add to Schedule Richard Flanders  |   Check Point Software Technologies  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 15:00 to 15:30

    Head in the Clouds? Let’s get serious about how to benefit from Cloud platforms whilst staying protected

    Richard will look at the reasoning behind the current move towards Cloud-based resource usage and identify the many areas of risk that must be considered when a migration project is being planned. He will look closely at emerging threats and explain how these can be confronted using the appropriate Cloud security strategy and solutions. He will also look at the various different models of Cloud and define methodologies to assist any organisation to be compliant with current and future legislation that governs data usage and protection.

    Speaker

    Speaker Name Profile
    Richard Flanders View Profile
  • No Walls: The Future of Enterprise Security with Zero-Trust Networks Add to Schedule Josh Green  |   Duo Security  |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 15:00 to 15:30

    No Walls: The Future of Enterprise Security with Zero-Trust Networks

    Just as we stopped using walls to protect our physical cities when they became ineffective, we must now confront the reality that perimeter-based network security is reaching the end of its effectiveness. The approach going forward is zero-trust networks. Join us to learn about what they are, and how Duo can partner with organisations to save money, reduce complexity, and enter the future.

    Speaker

    Photo Speaker Name Profile
    Josh Green Josh Green View Profile
  • PANEL: IP EXPO Bytesize - The Year Ahead Add to Schedule Panel  |  Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 15:00 to 15:50

    PANEL: IP EXPO Bytesize - The Year Ahead

    The IP EXPO Bytesize panels are designed to give attendees an executive overview of the latest trends in IT. Four panellists, each a leading expert in their respective field will each share a ten minute bite sized overview of a given topic during one education packed session. The sessions are designed to be interactive so attendees, plus our social followers, will have the opportunity to ask their questions to the panel in an extended Q&A.

    The four topics in this instance are Smart Cities, Data Driven, GDPR and Data Breaches.

    Speakers

    Photo Speaker Name Profile
    Ade Adewunmi Ade Adewunmi View Profile
    Barry Lyne Barry Lyne View Profile
    Kevin Kiley Kevin Kiley View Profile
    Paul Adams Paul Adams View Profile

Your schedule where you can plan your day, viewing all your scheduled seminars print or email them to yourself

Top