Speakers
10:20AM - Day 2
What is really important to your business? Managing key...
03:40PM - Day 2
Data is now everywhere, and as companies grow, organisations...
10:50AM - Day 2
The future of cyber security correlates with the future...
View Panel: The future of cyber security: where do we go from here?
10:50AM - Day 2
What does the concept of standards really mean in...
View Panel: The role of regulations and standards for cybersecurity and privacy compliance
02:40PM - Day 2
The rationale and structure of the programme Progress to...
View Keynote: NHS Digital’s Cyber Security Programme: Providing Security at the Point of Need
03:40PM - Day 2
Data is now everywhere, and as companies grow, organisations...
10:50AM - Day 2
Blockchain, AI, IoT or increasing your cyber security –...
View Panel: Breaking Down the Convergence; how to Implement the Technologies of Now
12:10PM - Day 2
How can banks ensure they are using a layered...
View The human element: changing security in the financial sector
02:30PM - Day 2
Who should have access to what data, and why?...
View Panel: The devil you know – Leveraging the human factor
03:10PM - Day 1
• What is resilience and why are organisations focused...
09:50AM - Day 2
How to ensure your company makes the right choices...
View It’s on everyone: How to create a security culture within your business
02:30PM - Day 1
The cyber skills shortage is still the number one...
12:40PM - Day 2
Defining identity – what really is it, and how...
View Panel: Digital Identity & Security for modern Enterprise
02:30PM - Day 1
The cyber skills shortage is still the number one...
12:40PM - Day 2
Defining identity – what really is it, and how...
View Panel: Digital Identity & Security for modern Enterprise
11:50AM - Day 1
Are you breach ready? Identifying where the biggest improvements...
12:40PM - Day 2
Defining identity – what really is it, and how...
View Panel: Digital Identity & Security for modern Enterprise
03:40PM - Day 2
Data is now everywhere, and as companies grow, organisations...
10:20AM - Day 2
As the adoption of multi-cloud is becoming the new...
View Securing the Enterprise and Minimising Risk in a Multi-Cloud World
11:50AM - Day 1
Are you breach ready? Identifying where the biggest improvements...
10:50AM - Day 2
The future of cyber security correlates with the future...
View Panel: The future of cyber security: where do we go from here?
10:50AM - Day 1
Discussing the benefits vs challenges of implementing cloud based...
View Panel: The evolution of cloud for enterprise cybersecurity
12:10PM - Day 2
Investors look at the structure of start-ups & how...
View Panel: David v Goliath: How Start-ups are Breaking Boundaries
02:30PM - Day 1
The cyber skills shortage is still the number one...
02:30PM - Day 1
The cyber skills shortage is still the number one...
11:50AM - Day 1
Are you breach ready? Identifying where the biggest improvements...
02:30PM - Day 1
The cyber skills shortage is still the number one...
02:30PM - Day 2
While many organizations still struggle to enable a seamless...
View Delivering Innovative Solutions with AI & Machine Learning
01:00PM - Day 1
There are many challenges facing organisations that have embraced...
03:00PM - Day 1
What role white and grey hat hackers can play...
12:40PM - Day 2
Defining identity – what really is it, and how...
View Panel: Digital Identity & Security for modern Enterprise
12:30PM - Day 1
Machine Learning techniques in security have focused on detecting...
View Building an AI Analyst to Combat Offensive Machine Learning
10:20AM - Day 2
What actually is Digital Transformation and Industry 4.0 -...
No talk associated with this Speaker.
02:10PM - Day 2
Insider threats are among the top IT security risks...
View How to counter data theft by eliminating the insider threat
04:30PM - Day 1
Physical systems – metrics, access and devices People, processes...
03:00PM - Day 1
What role white and grey hat hackers can play...
02:20PM - Day 2
What role white and grey hat hackers can play...
03:40PM - Day 1
Speed is a crucial factor when it comes to...
10:20AM - Day 2
Speed is a crucial factor when it comes to...
03:10PM - Day 2
Data breaches are increasingly happening through the supply chain...
No talk associated with this Speaker.
11:50AM - Day 1
Are you breach ready? Identifying where the biggest improvements...
04:30PM - Day 1
Physical systems – metrics, access and devices People, processes...
12:00PM - Day 2
Physical systems – metrics, access and devices People, processes...
10:50AM - Day 2
What does the concept of standards really mean in...
View Panel: The role of regulations and standards for cybersecurity and privacy compliance
04:30PM - Day 1
Physical systems – metrics, access and devices People, processes...
11:40AM - Day 2
Map the most common security operations standard, ISO 27001...
View ISO27001 & the GDPR: Identifying Overlap and Streamlining Efforts
No talk associated with this Speaker.
10:50AM - Day 2
Blockchain, AI, IoT or increasing your cyber security –...
View Panel: Breaking Down the Convergence; how to Implement the Technologies of Now
10:50AM - Day 2
Blockchain, AI, IoT or increasing your cyber security –...
View Panel: Breaking Down the Convergence; how to Implement the Technologies of Now
No talk associated with this Speaker.
01:10PM - Day 2
When shifting to the cloud, many organizations find that...
10:50AM - Day 2
The future of cyber security correlates with the future...
View Panel: The future of cyber security: where do we go from here?
12:00PM - Day 2
Today’s world of DevOps/Cloud-Native and container architecture demands a...
10:50AM - Day 2
The future of cyber security correlates with the future...
View Panel: The future of cyber security: where do we go from here?
04:30PM - Day 1
Physical systems – metrics, access and devices People, processes...
12:00PM - Day 2
Physical systems – metrics, access and devices People, processes...
03:00PM - Day 2
Artificial intelligence, machine learning, and blockchain, are emerging tech...
12:40PM - Day 2
With increased focus on cyber security from boards, senior...
View Can data-driven cyber security give back a third of your week?
11:00AM - Day 1
Your vendors often handle your most sensitive data. This...
View Risk Exchanges: The Key to Vendor Risk Management Efficiency
12:20PM - Day 2
Passwords, tokenization, biometric, user behavior. New technologies continue to...
View Next Generation Authentication: Dynamic One-Time Authentication Codes
11:20AM - Day 2
IONOS' Sab Knight will point out how you can...
11:50AM - Day 1
Are you breach ready? Identifying where the biggest improvements...
No talk associated with this Speaker.
04:10PM - Day 1
Discover how assurance is moving organisations with IT or...
View IT/OT Assurance – How do you keep your Cyber promise to the board?
10:50AM - Day 2
Cybersecurity tool sprawl has reached unsustainable levels, and research...
View Defense in Diversification: Improving Cybersecurity Through Smart Consolidation
02:30PM - Day 1
The cyber skills shortage is still the number one...
02:30PM - Day 2
Models that don’t get used are useless. Yet, many...
View The Convergence of Engineering and Data Science in Applied Data Science
No talk associated with this Speaker.
2019 Speakers
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
10:50AM - Day 2
The future of cyber security correlates with the future...
View Panel: The future of cyber security: where do we go from here?
10:50AM - Day 1
Discussing the benefits vs challenges of implementing cloud based...
View Panel: The evolution of cloud for enterprise cybersecurity
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
05:00PM - Day 1
This group is for anyone involved or interested in...
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
10:40AM - Day 2
This talk will explore the challenges of cloud transformation....
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
12:00PM - Day 2
Security shifting from an afterthought to critical, foundational and...
No talk associated with this Speaker.
Nigel Stanley
Chief Technology Officer - Global OT and Industrial Cyber Security CoE
TÜV Rheinland Group
10:50AM - Day 2
The future of cyber security correlates with the future...
View Panel: The future of cyber security: where do we go from here?
04:30PM - Day 1
Physical systems – metrics, access and devices People, processes...
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
12:20PM - Day 2
Current secure device authentication and encryption technology has serious...
12:20PM - Day 2
Current secure device authentication and encryption technology has serious...
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
Stephen Owen
Principal Cloud Security Architect & Data Protection Officer
Camelot UK National Lottery
No talk associated with this Speaker.
11:50AM - Day 1
Are you breach ready? Identifying where the biggest improvements...
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
No talk associated with this Speaker.
Are you interested in sharing your knowledge and experiences of the cyber security and cloud? We’d love to hear from you.