2019 Event Speakers

Arash Ghazanfari

Field CTO | UK & Ireland Enterprise

Dell Technologies

10:00AM - Day 1

During this session, we will explore how the Dell...

View Dell Technologies approach to Security Transformation

View Full Info

Biraja Prasad Ghoshal

Deep Learning Evangelist

Tata Consultancy Services

05:00PM - Day 1

This group is for anyone involved or interested in...

View MeetUp – Digital Transformation London

View Full Info

Klaus McDonald-Maier

CEO

Metrarc

Alfred Rolington

CEO

Cyber Security Intelligence

No talk associated with this Speaker.

View Full Info

Andrew Lord

Head of Optical Research

BT

Jason Reed

Senior Analyst, Cyber Security

Frost & Sullivan

Luke Potter

Operations Director (Cybersecurity)

SureCloud

03:10PM - Day 1

What role white and grey hat hackers can play...

View Panel: Role of ethical hacking and penetration testing

View Full Info

Martin Overton

Founder and CEO

OMG Cyber Security

No talk associated with this Speaker.

View Full Info

Deborah Haworth

Chief Information Security Officer

Penguin Random House UK

02:00PM - Day 2

Gartner’s report on the app security hype cycle states...

View Panel: Breaking the static security approach to application security

View Full Info

Jon Townsend

Chief Information Officer

National Trust

11:00AM - Day 2

What does the concept of standards really mean in...

View Panel: The role of regulations & standards for cybersecurity compliance

View Full Info

Orlando Scott-Cowley

Principal Technology Evangelist

Amazon Web Services

12:50PM - Day 2

Applying Artificial Intelligence and Machine Learning to enhance security;...

View Using AI/ML to enhance security with AWS

View Full Info

Lisa Ventura

CEO and Founder

UK Cyber Security Association

No talk associated with this Speaker.

View Full Info

Robin Vann

Commercial Director | Non-Executive Director

Reliance ACSN | Blue Solutions

02:40PM - Day 2

Humio, Blue Solutions, Reliance ACSN “A SERIES OF HIGH...

View Defencing the SMB Supply Chain with Full Visibility in Real-Time

11:20AM - Day 2

Discussing the need for DevSecOps for your security team?...

View Panel: Implementing DevSecOps in Enterprise

View Full Info

Steffen Sorrell

Principal Analyst

Juniper Research

No talk associated with this Speaker.

View Full Info

Wendy Ng

DevSecOps Security Managing Advisor, Experian Global Security Office

Experian

11:20AM - Day 2

Discussing the need for DevSecOps for your security team?...

View Panel: Implementing DevSecOps in Enterprise

View Full Info

Andy Bates

Executive Director

Global Cyber Alliance

Piotr Ciepiela

EMEIA IoT/OT Security & Critical Infrastructure Leader

EY

12:20PM - Day 1

Enabling data security in IoT – protecting integrity, authenticity...

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Dave Barnett

Head of CASB

Forcepoint EMEA

11:50AM - Day 1

Security in the cloud is – and always has...

View Panel: Sharing responsibility for cloud security

View Full Info

Mostafa Siraj

Head of UK Application Security

Capital One

02:00PM - Day 2

Gartner’s report on the app security hype cycle states...

View Panel: Breaking the static security approach to application security

View Full Info

Robin Fewster

Offensive Security Manager, Global Security

Sage

03:10PM - Day 1

What role white and grey hat hackers can play...

View Panel: Role of ethical hacking and penetration testing

View Full Info

Eduardo Helering

Lead Solutions Engineer EMEA

OneLogin

12:10PM - Day 2

Despite the best efforts of cyber security professionals to...

View Panel: Exploring Identity Access Management

View Full Info

Jon Noble

Senior Sales Executive

OneLogin

10:20AM - Day 1

Examining the common mistakes made my enterprises globally, and...

View Keynote: Common cyber security mistakes made by enterprises and how to avoid them

View Full Info

Paul Knott

Director, Security Strategist Northern Europe

Symantec

03:00PM - Day 1

Organisations embracing digital transformation are disrupting industries by out...

View Security as an Accelerator for Digital Transformation

View Full Info

Francesco Cipollone

Director of Events - UK Chapter

Cloud Security Alliance

10:40AM - Day 2

This talk will explore the challenges of cloud transformation....

View Is the Cloud secure? It’s easy if you do it smart

11:50AM - Day 1

Security in the cloud is – and always has...

View Panel: Sharing responsibility for cloud security

View Full Info

David Atkinson

Founder & CEO

Senseon

02:50PM - Day 1

False positives or ‘innocent anomalies’ are a huge distraction...

View AI: Positive forces at work, or false positives?

02:50PM - Day 2

Artificial intelligence, machine learning, and blockchain, are emerging tech...

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

View Full Info

Mary-Jo de Leeuw

Director of Cybersecurity Advocacy Europe Middle East & Africa

(ISC)²

11:00AM - Day 2

What does the concept of standards really mean in...

View Panel: The role of regulations & standards for cybersecurity compliance

10:20AM - Day 2

This talk will look at the need for commonality...

View Implications of high profile data breaches

View Full Info

Thorsten Henkel

Director of Industrial Security Solutions

Fraunhofer SIT

04:00PM - Day 1

The Fraunhofer Institute for Secure Information Technology realized a...

View Cognitive Security for the Industry 4.0 – Anomaly Detection and Integrity Protection

View Full Info

Maninder Singh

Associate Director - Cyber Risk Services

Deloitte

12:10PM - Day 2

Despite the best efforts of cyber security professionals to...

View Panel: Exploring Identity Access Management

View Full Info

Miguel Ornelas

Head of Continuous Assurance

HSBC

11:20AM - Day 2

Discussing the need for DevSecOps for your security team?...

View Panel: Implementing DevSecOps in Enterprise

View Full Info

Daniel Power

General Manager, Northern Europe

OneLogin

10:50AM - Day 1

Understanding the threat lansdcape from shadow IT Delivering different...

View Keynote: Does Multi Factor Authentication (MFA) without Single Sign On (SSO) make sense

11:50AM - Day 1

Security in the cloud is – and always has...

View Panel: Sharing responsibility for cloud security

View Full Info

Paul McCourt

Head of Information Security

MADE.com

04:20PM - Day 1

 - What is it and where is the value...

View Breach and attack simulation

03:10PM - Day 1

What role white and grey hat hackers can play...

View Panel: Role of ethical hacking and penetration testing

View Full Info

Nigel Stanley

Chief Technology Officer - Global OT and Industrial Cyber Security CoE

TÜV Rheinland Group

10:50AM - Day 1

Understanding the unique challenges of cyber security across industry,...

View Panel: The importance of collaboration for enterprise cybersecurity

03:30PM - Day 1

This talk will cover a specific case study from...

View Cyber security for the transport industry

View Full Info

Mike Bursell

Chief Security Architect

Red Hat

12:00PM - Day 2

Security shifting from an afterthought to critical, foundational and...

View It’s not all tech: cultural change for DevSecOps

View Full Info

Dave Palmer

Director of Technology

Darktrace

02:50PM - Day 2

Artificial intelligence, machine learning, and blockchain, are emerging tech...

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

View Full Info

Andy Thomas

CEO

KYND

George Tunnicliffe

Head of IT Operations

National Theatre

10:50AM - Day 1

Understanding the unique challenges of cyber security across industry,...

View Panel: The importance of collaboration for enterprise cybersecurity

View Full Info

Stu Hirst

Head of Cloud Security

Photobox Group

10:20AM - Day 1

What Stu found when he joined Photobox and why...

View Securing a multi-brand e-commerce business in the Cloud

View Full Info

Yiru Zhong

Lead Analyst, IoT & Enterprise

GSMA Intelligence

Sarah Janes

Managing Director

Layer8

12:00PM - Day 2

Why we’re stuck in a perpetual loop of telling...

View Security Behaviours: moving from knowing to doing

View Full Info

Eduardo Diaz

Deputy General Counsel/Deputy Chief Compliance Officer

UniTeller - Banorte

03:30PM - Day 2

How can blockchain make Internet of Things ("IOT") devices...

View Cloud security – is Blockchain the missing link

View Full Info

Marilise de Villiers

Director of Security Skills & Culture

Centrica

12:20PM - Day 1

Enabling data security in IoT – protecting integrity, authenticity...

View Panel: An E2E approach to tackling data security challenges of the IoT

02:30PM - Day 1

How to ensure that cyber education and awareness awareness...

View Getting the Board on board

View Full Info

Anthony Sabella

Principal Architect

Cisco

01:00PM - Day 1

The “Intent-Based Networking” concept Leveraging an open standard-based platform...

View Security Automation & Orchestration for IoT/Enterprise Delivered Through “Intent-Based Networking”

View Full Info

Stephen Owen

Principal Cloud Security Architect & Data Protection Officer

Camelot UK National Lottery

11:50AM - Day 1

Security in the cloud is – and always has...

View Panel: Sharing responsibility for cloud security

View Full Info

Steve Wright

Former DPO | CEO

Bank of England | Privacy Culture

11:00AM - Day 2

What does the concept of standards really mean in...

View Panel: The role of regulations & standards for cybersecurity compliance

09:50AM - Day 2

Role of private, enterprise and governmental agencies in cyber...

View Evolving cyber intelligence landscapes

View Full Info

Kevin Fielder

CISO

Just Eat

10:20AM - Day 2

How to ensure security enables the business Continuously delivering...

View Building a genuinely agile security team, enhancing productivity and visibility with minimal overhead

11:20AM - Day 2

Discussing the need for DevSecOps for your security team?...

View Panel: Implementing DevSecOps in Enterprise

View Full Info

Shahram Mossayebi, Ph.D.

CEO

Crypto Quantique

11:50AM - Day 1

Importance of end to end security Challenges of achieving...

View End to End security in IoT

12:20PM - Day 1

Enabling data security in IoT – protecting integrity, authenticity...

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Ben Russell

Head of Cyber Threat Response

National Crime Agency

02:20PM - Day 1

How are cyber criminals currently targeting businesses? What is...

View Afternoon Keynote: Policing in cyber space – The Law Enforcement response to cyber crime

View Full Info

John Elliott

Data Protection Advisor

Open Banking

11:00AM - Day 2

What does the concept of standards really mean in...

View Panel: The role of regulations & standards for cybersecurity compliance

View Full Info

Are you interested in sharing your knowledge and experiences of the cyber security and cloud? We’d love to hear from you.