Day 3 - 15th September

09:50AM

Joyce Rodriguez

Head of Cyber Threat Prevention

Shell

Associated Talks:

09:50AM - Day 1

View VIRTUAL PRESENTATION: The weakest link – securing your supply chain

View Full Info

VIRTUAL PRESENTATION: The weakest link – securing your supply chain

  • Creating a strategy for selection, approval and management of third parties 
  • Understanding your stakeholders and their individual requirements, and where this causes vulnerabilities 
  • Taking a risk-based approach to all new and existing interactions 
. Joyce Rodriguez, Head of Cyber Threat Prevention, Shell

10:10AM

VIRTUAL PRESENTATION: Extended detection & response

  • Delivering visibility into data across your entire infrastructure 
  • How XDR has evolved from traditional endpoint protection 
  • Layering additional tools within your current architecture 

10:40AM

LIVE PANEL: Women in TechEx – Strengthening your security posture

  • Rebooting an outdated security strategy – how far should you go? 
  • Exploring 4 technologies to transform security – AI, quantum computing, identity management and ubiquitous connectivity 
  • How to identify deficits in your strategy and incorporate into your risk management program 

11:20AM

VIRTUAL PRESENTATION: Protecting your reputation – the legal implications of a data breach

  • Why you should have a cyber and data risks insurance policy in place 
  • The costs of getting back to business after an attack 
  • Where do you stand in terms of reputation? 

11:40AM

VIRTUAL PRESENTATION: All patches are not created equal – a risk-based approach for vulnerability management

  • Understanding both the technical and the business problem – which is being actively compromised?  
  • Prioritising vulnerability depending on business impact  
  • How to keep up with new developments whilst still securing legacy systems and software 

12:00PM

VIRTUAL PRESENTATION: Doing more with less?

  • Combining connectivity with cloud security capabilities  
  • Consolidating network and security as a service
  • The future of network security 

12:20PM

VIRTUAL PRESENTATION: The enemy within – Protecting against insider threat

  • How has the move to remote working created new challenges in managing insider threat levels? 
  • Trends in phishing and malicious actors 
  • Managing your data security protocol 

12:40PM

Jamie Randall

Head of Technical Strategy

IASME Consortium

View Full Info

James Hamon

Chief Information Security Officer

Financial Ombudsman Service

Associated Talks:

12:40PM - Day 1

View LIVE PANEL: Getting the board on board – Proving ROI

02:30PM - Day 2

View Panel: Getting the board on board – Proving ROI

View Full Info

Franco De Bonis

Marketing Director

Visua

Associated Talks:

12:40PM - Day 1

View LIVE PANEL: Getting the board on board – Proving ROI

11:40AM - Day 2

View VIRTUAL PRESENTATION: Winning The Phishing Arms Race: Detecting The Undetectable With Visual-AI

12:20PM - Day 2

View Winning The Phishing Arms Race: Detecting The Undetectable With Visual-AI

View Full Info

Ian Parker

Chief Information Security Officer

Menzies Distribution

Associated Talks:

12:40PM - Day 1

View LIVE PANEL: Getting the board on board – Proving ROI

12:40PM - Day 2

View ON-DEMAND PANEL: Levelling the playing field – what to have in your arsenal

02:30PM - Day 2

View Panel: Getting the board on board – Proving ROI

01:30PM - Day 2

View Panel: Levelling the playing field – what to have in your arsenal

View Full Info

LIVE PANEL: Getting the board on board – Proving ROI

  • Are you breach ready? 
  • Identifying where the biggest improvements can be made to your cyber security policy 
  • Evaluating the cost of a potential breach and the most cost-effective solution to industry-specific threats 
  • How important is a good cybereducation? 
Moderator: . Jamie Randall, Head of Technical Strategy, IASME Consortium
. James Hamon, Chief Information Security Officer, Financial Ombudsman Service
. Franco De Bonis, Marketing Director, Visua
. Ian Parker, Chief Information Security Officer, Menzies Distribution

01:20PM

VIRTUAL PRESENTATION: Cyber in the physical world

  • Exploring security for industrial control systems and critical infrastructure   
  • The convergence of IT & OT – addressing new vulnerabilities and risks posed   
  • Best practices for security in today’s industrial networks 

01:30PM

End of Day Three