2021 Speakers Included
10:40AM - Day 1
Rebooting an outdated security strategy - how far should you...
View LIVE PANEL: Women in TechEx – Strengthening your security posture
No talk associated with this Speaker.
12:40PM - Day 1
Are you breach ready? Identifying where the biggest improvements...
11:40AM - Day 1
• Looking at key insights, what is the current...
View VIRTUAL PRESENTATION: Mitigating Risk and Building Resilience in the Age of Ransomware
10:40AM - Day 1
Rebooting an outdated security strategy - how far should you...
View LIVE PANEL: Women in TechEx – Strengthening your security posture
12:10PM - Day 1
Reviewing the current cyber crime surge during Covid crisis...
03:10PM - Day 1
How to do secure, fast innovation in a corporate...
Erika Lewis
Director, Cyber Security and Digital Identity
Department for Digital, Culture Media & Sport
10:40AM - Day 1
Is your architecture actually working? What can organisations look at...
View ON-DEMAND PANEL: Observable architecture – security for the SDLC
10:50AM - Day 1
Is your security architecture actually working? What can organisations look at...
03:30PM - Day 1
Organisations constantly talk about user experience, but are we...
10:00AM - Day 2
Discussing the impact of track and trace, lockdowns and...
View Under control: are Coronavirus restrictions a new reality for government surveillance?
12:40PM - Day 1
Are you breach ready? Identifying where the biggest improvements...
02:30PM - Day 2
Are you breach ready? Identifying where the biggest improvements...
09:50AM - Day 1
Using technology to boost security, efficiency and compliance efforts ...
View VIRTUAL PRESENTATION: Reducing tolerance for human error
Nick Bell
Detective Superintendent | National Policing Director
NPCC National Cybercrime Programme | Cyber Resilience Centres
02:30PM - Day 2
Threats and Challenges The UK Law Enforcement response -...
12:00PM - Day 2
With an ever-increasing threat of cybercrime, tighter regulations on the use...
10:40AM - Day 1
Rebooting an outdated security strategy - how far should you...
View LIVE PANEL: Women in TechEx – Strengthening your security posture
12:20PM - Day 1
Using cloud-based resources safely – moving sensitive workloads out...
View ON-DEMAND PANEL: Get out of my cloud! Preventing a data breach
01:50PM - Day 1
Using cloud-based resources safely – moving sensitive workloads out...
11:20AM - Day 1
How can you maintain consistent security across hybrid, multi-cloud...
View VIRTUAL PRESENTATION: Securing Any Application on Any Cloud
12:20PM - Day 1
Using cloud-based resources safely – moving sensitive workloads out...
View ON-DEMAND PANEL: Get out of my cloud! Preventing a data breach
01:50PM - Day 1
Using cloud-based resources safely – moving sensitive workloads out...
10:20AM - Day 1
Developers are often regarded as the superhumans that know...
View VIRTUAL PRESENTATION: One simple missed vulnerability, one big headache
12:20PM - Day 2
What are the best things to happen in the...
View ON-DEMAND PANEL: Levelling the playing field – what to have in your arsenal
11:40AM - Day 2
In this talk we will: Investigate the challenges faced...
02:10PM - Day 2
In this talk we will: Investigate the challenges faced...
View Winning The Phishing Arms Race – Graphical Attack Vectors – Are You Ready?
01:30PM - Day 2
What are the best things to happen in the...
View Panel: Levelling the playing field – what to have in your arsenal
12:20PM - Day 1
Using cloud-based resources safely – moving sensitive workloads out...
View ON-DEMAND PANEL: Get out of my cloud! Preventing a data breach
10:40AM - Day 1
Is your architecture actually working? What can organisations look at...
View ON-DEMAND PANEL: Observable architecture – security for the SDLC
01:50PM - Day 1
Using cloud-based resources safely – moving sensitive workloads out...
10:50AM - Day 1
Is your security architecture actually working? What can organisations look at...
No talk associated with this Speaker.
12:20PM - Day 2
What are the best things to happen in the...
View ON-DEMAND PANEL: Levelling the playing field – what to have in your arsenal
01:30PM - Day 2
What are the best things to happen in the...
View Panel: Levelling the playing field – what to have in your arsenal
10:20AM - Day 2
The evolution of backup and data management has dramatically...
View VIRTUAL PRESENTATION: The ever-changing landscape of Backup and Data Management
10:20AM - Day 2
The evolution of backup and data management has dramatically...
View The ever-changing landscape of Backup and Data Management
No talk associated with this Speaker.
No talk associated with this Speaker.
11:50 - Day 1
Hear about security detection challenges facing organizations today and...
01:50PM - Day 1
Using cloud-based resources safely – moving sensitive workloads out...
01:00PM - Day 1
Insider threat, whether malicious or unintentional, remains a significant...
View VIRTUAL PRESENTATION: Insider Threat: Is your biggest cyber risk inside your organisation?
11:20AM - Day 1
Why you should have a cyber and data risks...
12:00PM - Day 1
Understanding your risk Getting the most value from your...
View VIRTUAL PRESENTATION: Dramatically lower your cyber risk without blowing your budget
02:50PM - Day 1
Understanding your risk Getting the most value from your...
View Dramatically lower your cyber risk without blowing your budget
11:30AM - Day 1
Security Teams are struggling to detect all attacks, use...
12:30PM - Day 1
Security Teams are struggling to detect all attacks, use all...
10:50AM - Day 1
Is your security architecture actually working? What can organisations look at...
12:40PM - Day 1
Are you breach ready? Identifying where the biggest improvements...
11:20AM - Day 2
IONOS Cloud’s Sab Knight will provide insights on how...
View VIRTUAL PRESENTATION: Cloud Data Sovereignty and the CLOUD Act
11:40AM - Day 2
IONOS Cloud’s Sab Knight will provide insights on how...
12:40PM - Day 1
Are you breach ready? Identifying where the biggest improvements...
12:00PM - Day 2
Why should access rights be managed by the business...
View VIRTUAL PRESENTATION: How the business takes control of access rights
12:20PM - Day 2
Why should access rights be managed by the business...
01:00PM - Day 2
Highlight 5 core considerations for IoT security Examination of...
View VIRTUAL PRESENTATION: 5 things you should think about to secure your IoT project
03:00PM - Day 2
How cellular devices can be tracked Privacy and other...
10:50AM - Day 1
Breaches bring to mind big headline-grabbing incidents and of...
View Incident Management: Building Trust from the Inside Out
10:10AM - Day 1
The world of third-party risk management is rapidly changing....
View VIRTUAL PRESENTATION: Navigating the Top 7 Trends in Third-Party Risk Management
10:20AM - Day 1
The world of third-party risk management is rapidly changing....
View Navigating the Top 7 Trends in Third-Party Risk Management
Are you interested in sharing your knowledge and experiences of the cyber security and cloud? We’d love to hear from you.