Day 1 - 6 September 2021
Cyber Security for Business: Chairperson’s Welcome
Overview of sessions and key highlights of the morning of Cyber for Business and afternoon of Blockchain for Business sessions
- Top ways to improve your posture for free
- Getting messaging from the security industry clear
- Threat hunting with free tools
Extended detection & response
- Delivering visibility into data across your entire infrastructure
- How XDR has evolved from traditional endpoint protection
- Layering additional tools within your current architecture
Panel: Levelling the playing field – what to have in your arsenal
- What are the best things to happen in the cyber arena in the last 18 months, and where is the future of the industry headed?
- How are start-ups approaching new and evolved threat models, and how can they ensure they can keep up with a constant new set of challenges?
- How are organisations developing creative solutions?
The enemy within: Protecting against insider threat
- How has the move to remote working created new challenges in managing insider threat levels?
- Trends in phishing and malicious actors
- Managing your data security protocol
Sharing the load: Tips for cloud workload protection
- Understanding what your workload is – processes, applications and resources
- Keeping cloud-based workloads secure whilst ensuring visibility and compliance
- Simplifying protection in the hybrid era
End of Sessions - Day 1
Day 2 - 7 September 2021
Cyber Security for Business Day 2: Chairperson’s Welcome
Overview of sessions and key highlights of the morning Blockchain for Business sessions and afternoon of Cyber for Business sessions
Panel: Getting the board on board – Proving ROI
- Are you breach ready?
- Identifying where the biggest improvements can be made to your cyber security policy
- Evaluating the cost of a potential breach and the most cost-effective solution to industry-specific threats
- How important is a good cybereducation?
Protecting your reputation – the legal implications of a data breach
- Why you should have a cyber and data risks insurance policy in place
- The costs of getting back to business after an attack
- Where do you stand in terms of reputation?
Creating a powerful culture of awareness
- How can you make your staff safer online – at ‘work’ and at home?
- Discussing social engineering, vishing and spearphishing, and the impact of social media
- Evaluating methods such as punishment and gamification to manage behaviour
All patches are not created equal: A risk-based approach for vulnerability management
- Understanding both the technical and the business problem – which is being actively compromised?
- Prioritising vulnerability depending on business impact
- How to keep up with new developments whilst still securing legacy systems and software