Day 2 - 18 March 2020
Dr. Sanjana Mehta
Head of Market Research Strategy
10:00AM - Day 2
11:00AM - Day 2
Cyber Security Solutions: Chair’s Welcome & Opening Comments
10:20AM - Day 2
03:10PM - Day 1
Keynote Presentation: Dell Technologies
Senior Security Engineer
10:50AM - Day 2
02:30PM - Day 1
Defense in Diversification: Improving Cybersecurity Through Smart Consolidation
Cybersecurity tool sprawl has reached unsustainable levels, and research shows 66% of businesses are striving to consolidate their security portfolio. But over-consolidating to a few platform solutions risks creating a vulnerable, innovation-stifling monoculture. If every organization uses a nearly identical set of security tools, compromising one means compromising them all. Heterogeneity of cybersecurity systems is itself a defense, so security teams need to approach consolidation differently. In this session, attendees will learn:
- How a data-first approach to security architectures can illuminate natural consolidation points
- How collaboration with other parts of the IT organization can improve security posture and reduce tool sprawl.
- How this collaborative approach also creates an opportunity to leverage other parts of the organization to improve security posture through smarter processes and practices.
11:20AM - Day 2
10:50AM - Day 2
Modern SIEM for a Hybrid World
Today’s world of DevOps/Cloud-Native and container architecture demands a new approach to security. Move from batch-based indexed systems with pre-built rules to modern, low-latency index-free logging at scale with ad-hoc queries on any data. Learn how Humio was built from the ground up to meet these requirements, supporting threat hunting and DevSecOps as we move to a post-SIEM world.
Head of Sales UK
12:00PM - Day 2
11:50AM - Day 1
Cloud Data Sovereignty and the CLOUD Act
IONOS’ Sab Knight will point out how you can maintain data sovereignty while serving your company’s global business needs in a Public Cloud scenario. Learn about a „Sovereign Cloud“, how to protect your data, and be regulation-compliant.
- A deep dive into US CLOUD Act and its relationship to GDPR with some interesting facts.
- How to know what risks you could face.
- How to avoid legalized exposure of your data.
Chief Development Officer
12:20PM - Day 2
Next Generation Authentication: Dynamic One-Time Authentication Codes
Talk information to follow…
12:40PM - Day 2
Can data-driven cyber security give back a third of your week?
With increased focus on cyber security from boards, senior management and investors, security teams are under increasing pressure to not only deliver effective cyber security, but also demonstrate it to stakeholders, auditors and others. For the security team, tool proliferation, cloud and digital transformation has made this even more complex; maintaining visibility and governance of modern environments is a never-ending task. Chris describes some common challenges, and strategies to streamline this process and regain control.
Are you breach ready?
According to recent surveys, 83% of SMEs have put no money aside to responding to a security incident, and 25% are unaware that there are even costs involved. Breaches are inevitable, and this talk will outline steps to ensure your cyber defences are up to scratch.
You shall not pass: why you should kill your password
Twitter’s CEO Jack Dorsey was recently the victim of a passcode-based hack, and this is the latest in the series of incidents showing how easy it is to gain access to cloud-based networks using mobile devices.
– 3 reasons killing passwords can help cloud security
– Why organisations should stop being so dependent on passwords
– Zero Trust – the future for the cloud
Senior Representative, Crayon
02:30PM - Day 2