Day 2 - 7 September 2021
09:00AM
Registration Opens
09:40AM
Dr. Sanjana Mehta
Head of Market Research Strategy
(ISC)2
09:40AM - Day 2
View Cyber Security Solutions: Chair’s Welcome & Opening Comments
Cyber Security Solutions: Chair’s Welcome & Opening Comments
10:00AM
Mike Polatsek
Co-Founder & Chief Strategy Officer
CyberReady
10:00AM - Day 2
View Redefining Awareness – Best Practices for Transforming Your CyberSecurity Culture
Redefining Awareness – Best Practices for Transforming Your CyberSecurity Culture
Most companies invest in security awareness training programs. Yet, the human factor continues to be the main weakness, with email being the entry point for most data breaches (96% of cases). This trend is expected to continue as cyber attacks become more sophisticated and awareness training programs keep falling short. What are we doing wrong?
This presentation will address common challenges in employee training, and what best practices can enterprises implement to truly transform employee behavior and build a positive cybersecurity culture.
10:20AM
Arash Ghazanfari
Field CTO & Principal Technologist
Dell Technologies
10:20AM - Day 2
View Securing the Enterprise and Minimising Risk in a Multi-Cloud World
11:50AM - Day 1
View Panel: Getting the board on board: Proving ROI
Securing the Enterprise and Minimising Risk in a Multi-Cloud World
As the adoption of multi-cloud is becoming the new normal in 2020 and beyond, security must become an underpinning component of a data driven business strategy to accelerate innovation.
Arash will discuss the need for architectural and operational consistency across multiple cloud environments, which is critical to reducing the cost and risk associated with multi-cloud application deployment and technology services delivery.
10:50AM
Jamie Moles
Senior Security Engineer
ExtraHop
10:50AM - Day 2
View Defense in Diversification: Improving Cybersecurity Through Smart Consolidation
02:30PM - Day 1
View Panel: Attracting & retaining the best talent
Defense in Diversification: Improving Cybersecurity Through Smart Consolidation
Cybersecurity tool sprawl has reached unsustainable levels, and research shows 66% of businesses are striving to consolidate their security portfolio. But over-consolidating to a few platform solutions risks creating a vulnerable, innovation-stifling monoculture. If every organization uses a nearly identical set of security tools, compromising one means compromising them all. Heterogeneity of cybersecurity systems is itself a defense, so security teams need to approach consolidation differently. In this session, attendees will learn:
- How a data-first approach to security architectures can illuminate natural consolidation points
- How collaboration with other parts of the IT organization can improve security posture and reduce tool sprawl.
- How this collaborative approach also creates an opportunity to leverage other parts of the organization to improve security posture through smarter processes and practices.
11:20AM
Sab Knight
Head of Sales UK
IONOS
-
View IONOS
11:20AM - Day 2
View Cloud Data Sovereignty and the CLOUD Act
11:50AM - Day 1
View Panel: Getting the board on board: Proving ROI
Cloud Data Sovereignty and the CLOUD Act
IONOS’ Sab Knight will point out how you can maintain data sovereignty while serving your company’s global business needs in a Public Cloud scenario. Learn about a „Sovereign Cloud“, how to protect your data, and be regulation-compliant.
- A deep dive into US CLOUD Act and its relationship to GDPR with some interesting facts.
- How to know what risks you could face.
- How to avoid legalized exposure of your data.
11:40AM
Networking Break
12:00PM
Justin List
Regional Director
Humio
12:00PM - Day 2
View Modern SIEM for a Hybrid World
10:50AM - Day 2
View Panel: The future of cyber security: where do we go from here?
-
View Humio
Modern SIEM for a Hybrid World
Today’s world of DevOps/Cloud-Native and container architecture demands a new approach to security. Move from batch-based indexed systems with pre-built rules to modern, low-latency index-free logging at scale with ad-hoc queries on any data. Learn how Humio was built from the ground up to meet these requirements, supporting threat hunting and DevSecOps as we move to a post-SIEM world.
12:20PM
David Choe
Chief Development Officer
swIDch Ltd.
12:20PM - Day 2
View Next Generation Authentication: Dynamic One-Time Authentication Codes
Next Generation Authentication: Dynamic One-Time Authentication Codes
Passwords, tokenization, biometric, user behavior. New technologies continue to emerge for more secure authentication. However, we continue to see data breaches at massive scale. The heart of the problem is static information. Learn how swIDch’s technology is using their algorithms to generate dynamic authentication codes to increase security in payments, access management, and even IoT.
12:40PM
Chris Burtenshaw
Founder
Strata Security
12:40PM - Day 2
View Can data-driven cyber security give back a third of your week?
Can data-driven cyber security give back a third of your week?
With increased focus on cyber security from boards, senior management and investors, security teams are under increasing pressure to not only deliver effective cyber security, but also demonstrate it to stakeholders, auditors and others. For the security team, tool proliferation, cloud and digital transformation has made this even more complex; maintaining visibility and governance of modern environments is a never-ending task. Chris describes some common challenges, and strategies to streamline this process and regain control.
12:50PM
Senior Representative, Synopsys
Synopsys
12:50PM - Day 2
View Are you breach ready?
Are you breach ready?
According to recent surveys, 83% of SMEs have put no money aside to responding to a security incident, and 25% are unaware that there are even costs involved. Breaches are inevitable, and this talk will outline steps to ensure your cyber defences are up to scratch.
01:10PM
Jeremy Snyder
VP International Strategy
DivvyCloud
01:10PM - Day 2
View Freedom is good, chaos is bad. Also in the cloud.
10:50AM - Day 2
View Panel: The future of cyber security: where do we go from here?
Freedom is good, chaos is bad. Also in the cloud.
When shifting to the cloud, many organizations find that there is a completely new set of problems – a new set of people creating an interacting with infrastructure in ways that they never did before. Additionally, cloud adopting enterprises find that the speed of change is now minutes, not days or weeks. These factors combined mean that they need to change their operational approach. In this session, DivvyCloud will present a session on how good cloud governance, combined with continuous security and compliance, have allowed leading enterprises like 3M, Pizza Hut, Spotify, Autodesk and others to shift to the cloud with a renewed sense of speed and agility.
01:30PM
Networking Break
02:30PM
Hilda Kosorus
AI Advisor
Crayon
02:30PM - Day 2
View Delivering Innovative Solutions with AI & Machine Learning
Delivering Innovative Solutions with AI & Machine Learning
While many organizations still struggle to enable a seamless value chain with AI, we have had the opportunity to guide multiple organizations from various industries on a successful AI transformation journey.
As a result, we have developed and established a unique AI practice which was successfully applied to over 100 projects. In this talk I will provide insights into our methodology and share some of our success stories.