fbpx

Day 2 - 18 March 2020

09:00AM

Registration Opens

10:00AM

Dr. Sanjana Mehta

Head of Market Research Strategy

(ISC)2

Associated Talks:

10:00AM - Day 2

View Cyber Security Solutions: Chair’s Welcome & Opening Comments

11:00AM - Day 2

View Panel: The role of regulations & standards for cybersecurity compliance

View Full Info

Cyber Security Solutions: Chair’s Welcome & Opening Comments

. Dr. Sanjana Mehta, Head of Market Research Strategy, (ISC)2

10:20AM

Senior Representative

Dell Technologies

.

Associated Talks:

10:20AM - Day 2

View Keynote Presentation: Dell Technologies

03:10PM - Day 1

View Keynote Presentation: Dell Technologies

View Full Info

Keynote Presentation: Dell Technologies

. Senior Representative, Dell Technologies, .

10:50AM

Jamie Moles

Senior Security Engineer

ExtraHop

Associated Talks:

10:50AM - Day 2

View Defense in Diversification: Improving Cybersecurity Through Smart Consolidation

02:30PM - Day 1

View Panel: Attracting & retaining the best talent

View Full Info

Defense in Diversification: Improving Cybersecurity Through Smart Consolidation

Cybersecurity tool sprawl has reached unsustainable levels, and research shows 66% of businesses are striving to consolidate their security portfolio. But over-consolidating to a few platform solutions risks creating a vulnerable, innovation-stifling monoculture. If every organization uses a nearly identical set of security tools, compromising one means compromising them all. Heterogeneity of cybersecurity systems is itself a defense, so security teams need to approach consolidation differently. In this session, attendees will learn:

  • How a data-first approach to security architectures can illuminate natural consolidation points
  • How collaboration with other parts of the IT organization can improve security posture and reduce tool sprawl.
  • How this collaborative approach also creates an opportunity to leverage other parts of the organization to improve security posture through smarter processes and practices.
. Jamie Moles, Senior Security Engineer, ExtraHop

11:20AM

Justin List

Regional Director

Humio

Associated Talks:

11:20AM - Day 2

View Modern SIEM for a Hybrid World

10:50AM - Day 2

View Panel: The future of cyber security: where do we go from here?

-

View Humio

View Full Info

Modern SIEM for a Hybrid World

Today’s world of DevOps/Cloud-Native and container architecture demands a new approach to security. Move from batch-based indexed systems with pre-built rules to modern, low-latency index-free logging at scale with ad-hoc queries on any data. Learn how Humio was built from the ground up to meet these requirements, supporting threat hunting and DevSecOps as we move to a post-SIEM world.

. Justin List, Regional Director, Humio

11:40AM

Networking Break

12:00PM

Sab Knight

Head of Sales UK

IONOS

Associated Talks:

-

View IONOS

12:00PM - Day 2

View Cloud Data Sovereignty and the CLOUD Act

11:50AM - Day 1

View Panel: Getting the board on board: Proving ROI

View Full Info

Cloud Data Sovereignty and the CLOUD Act

IONOS’ Sab Knight will point out how you can maintain data sovereignty while serving your company’s global business needs in a Public Cloud scenario.  Learn about a „Sovereign Cloud“, how to protect your data, and be regulation-compliant.

  • A deep dive into US CLOUD Act and its relationship to GDPR with some interesting facts.
  • How to know what risks you could face.
  • How to avoid legalized exposure of your data.
. Sab Knight, Head of Sales UK , IONOS

12:20PM

David Choe

Chief Development Officer

swIDch Ltd.

Associated Talks:

12:20PM - Day 2

View Next Generation Authentication: Dynamic One-Time Authentication Codes

View Full Info

Next Generation Authentication: Dynamic One-Time Authentication Codes

Talk information to follow…

. David Choe, Chief Development Officer, swIDch Ltd.

12:40PM

Chris Burtenshaw

Founder

Strata Security

Associated Talks:

12:40PM - Day 2

View Can data-driven cyber security give back a third of your week?

View Full Info

Can data-driven cyber security give back a third of your week?

With increased focus on cyber security from boards, senior management and investors, security teams are under increasing pressure to not only deliver effective cyber security, but also demonstrate it to stakeholders, auditors and others.  For the security team, tool proliferation, cloud and digital transformation has made this even more complex; maintaining visibility and governance of modern environments is a never-ending task.  Chris describes some common challenges, and strategies to streamline this process and regain control.

. Chris Burtenshaw, Founder, Strata Security

12:50PM

Are you breach ready?

According to recent surveys, 83% of SMEs have put no money aside to responding to a security incident, and 25% are unaware that there are even costs involved. Breaches are inevitable, and this talk will outline steps to ensure your cyber defences are up to scratch.

01:00PM

You shall not pass: why you should kill your password

Twitter’s CEO Jack Dorsey was recently the victim of a passcode-based hack, and this is the latest in the series of incidents showing how easy it is to gain access to cloud-based networks using mobile devices.
– 3 reasons killing passwords can help cloud security
– Why organisations should stop being so dependent on passwords
– Zero Trust – the future for the cloud

01:30PM

Networking Break

02:30PM

Senior Representative, Crayon

Crayon

.

Associated Talks:

02:30PM - Day 2

View Protecting your bubble: How strong is your network defence?

View Full Info

Protecting your bubble: How strong is your network defence?

. Senior Representative, Crayon, Crayon, .

03:00PM

Go phish! Best practices for email security

03:30PM

Training and education for staff -the first line of defence

04:00PM

Session Close