Day 2 - 18 March 2020
Dr. Sanjana Mehta
Head of Market Research Strategy
09:40AM - Day 2
Cyber Security Solutions: Chair’s Welcome & Opening Comments
Co-Founder & Chief Strategy Officer
10:00AM - Day 2
Redefining Awareness – Best Practices for Transforming Your CyberSecurity Culture
Most companies invest in security awareness training programs. Yet, the human factor continues to be the main weakness, with email being the entry point for most data breaches (96% of cases). This trend is expected to continue as cyber attacks become more sophisticated and awareness training programs keep falling short. What are we doing wrong?
This presentation will address common challenges in employee training, and what best practices can enterprises implement to truly transform employee behavior and build a positive cybersecurity culture.
Field CTO & Principal Technologist
10:20AM - Day 2
11:50AM - Day 1
Securing the Enterprise and Minimising Risk in a Multi-Cloud World
As the adoption of multi-cloud is becoming the new normal in 2020 and beyond, security must become an underpinning component of a data driven business strategy to accelerate innovation.
Arash will discuss the need for architectural and operational consistency across multiple cloud environments, which is critical to reducing the cost and risk associated with multi-cloud application deployment and technology services delivery.
Senior Security Engineer
10:50AM - Day 2
02:30PM - Day 1
Defense in Diversification: Improving Cybersecurity Through Smart Consolidation
Cybersecurity tool sprawl has reached unsustainable levels, and research shows 66% of businesses are striving to consolidate their security portfolio. But over-consolidating to a few platform solutions risks creating a vulnerable, innovation-stifling monoculture. If every organization uses a nearly identical set of security tools, compromising one means compromising them all. Heterogeneity of cybersecurity systems is itself a defense, so security teams need to approach consolidation differently. In this session, attendees will learn:
- How a data-first approach to security architectures can illuminate natural consolidation points
- How collaboration with other parts of the IT organization can improve security posture and reduce tool sprawl.
- How this collaborative approach also creates an opportunity to leverage other parts of the organization to improve security posture through smarter processes and practices.
Head of Sales UK
11:20AM - Day 2
11:50AM - Day 1
Cloud Data Sovereignty and the CLOUD Act
IONOS’ Sab Knight will point out how you can maintain data sovereignty while serving your company’s global business needs in a Public Cloud scenario. Learn about a „Sovereign Cloud“, how to protect your data, and be regulation-compliant.
- A deep dive into US CLOUD Act and its relationship to GDPR with some interesting facts.
- How to know what risks you could face.
- How to avoid legalized exposure of your data.
12:00PM - Day 2
10:50AM - Day 2
Modern SIEM for a Hybrid World
Today’s world of DevOps/Cloud-Native and container architecture demands a new approach to security. Move from batch-based indexed systems with pre-built rules to modern, low-latency index-free logging at scale with ad-hoc queries on any data. Learn how Humio was built from the ground up to meet these requirements, supporting threat hunting and DevSecOps as we move to a post-SIEM world.
Chief Development Officer
12:20PM - Day 2
Next Generation Authentication: Dynamic One-Time Authentication Codes
Passwords, tokenization, biometric, user behavior. New technologies continue to emerge for more secure authentication. However, we continue to see data breaches at massive scale. The heart of the problem is static information. Learn how swIDch’s technology is using their algorithms to generate dynamic authentication codes to increase security in payments, access management, and even IoT.
12:40PM - Day 2
Can data-driven cyber security give back a third of your week?
With increased focus on cyber security from boards, senior management and investors, security teams are under increasing pressure to not only deliver effective cyber security, but also demonstrate it to stakeholders, auditors and others. For the security team, tool proliferation, cloud and digital transformation has made this even more complex; maintaining visibility and governance of modern environments is a never-ending task. Chris describes some common challenges, and strategies to streamline this process and regain control.
Senior Representative, Synopsys
12:50PM - Day 2
Are you breach ready?
According to recent surveys, 83% of SMEs have put no money aside to responding to a security incident, and 25% are unaware that there are even costs involved. Breaches are inevitable, and this talk will outline steps to ensure your cyber defences are up to scratch.
VP International Strategy
01:10PM - Day 2
10:50AM - Day 2
Freedom is good, chaos is bad. Also in the cloud.
When shifting to the cloud, many organizations find that there is a completely new set of problems – a new set of people creating an interacting with infrastructure in ways that they never did before. Additionally, cloud adopting enterprises find that the speed of change is now minutes, not days or weeks. These factors combined mean that they need to change their operational approach. In this session, DivvyCloud will present a session on how good cloud governance, combined with continuous security and compliance, have allowed leading enterprises like 3M, Pizza Hut, Spotify, Autodesk and others to shift to the cloud with a renewed sense of speed and agility.
02:30PM - Day 2
Delivering Innovative Solutions with AI & Machine Learning
While many organizations still struggle to enable a seamless value chain with AI, we have had the opportunity to guide multiple organizations from various industries on a successful AI transformation journey.
As a result, we have developed and established a unique AI practice which was successfully applied to over 100 projects. In this talk I will provide insights into our methodology and share some of our success stories.