Day 2 - 18 March 2020

09:00AM

Registration Opens

09:40AM

Dr. Sanjana Mehta

Head of Market Research Strategy

(ISC)2

Associated Talks:

09:40AM - Day 2

View Cyber Security Solutions: Chair’s Welcome & Opening Comments

11:00AM - Day 2

View Panel: The role of regulations & standards for cybersecurity compliance

View Full Info

Cyber Security Solutions: Chair’s Welcome & Opening Comments

. Dr. Sanjana Mehta, Head of Market Research Strategy, (ISC)2

10:00AM

Mike Polatsek

Co-Founder & Chief Strategy Officer

CyberReady

Associated Talks:

10:00AM - Day 2

View Redefining Awareness – Best Practices for Transforming Your CyberSecurity Culture

View Full Info

Redefining Awareness – Best Practices for Transforming Your CyberSecurity Culture

Most companies invest in security awareness training programs. Yet, the human factor continues to be the main weakness, with email being the entry point for most data breaches (96% of cases). This trend is expected to continue as cyber attacks become more sophisticated and awareness training programs keep falling short. What are we doing wrong?
This presentation will address common challenges in employee training, and what best practices can enterprises implement to truly transform employee behavior and build a positive cybersecurity culture.

. Mike Polatsek, Co-Founder & Chief Strategy Officer, CyberReady

10:20AM

Arash Ghazanfari

Field CTO & Principal Technologist

Dell Technologies

Associated Talks:

10:20AM - Day 2

View Securing the Enterprise and Minimising Risk in a Multi-Cloud World

11:50AM - Day 1

View Panel: Getting the board on board: Proving ROI

View Full Info

Securing the Enterprise and Minimising Risk in a Multi-Cloud World

As the adoption of multi-cloud is becoming the new normal in 2020 and beyond, security must become an underpinning component of a data driven business strategy to accelerate innovation.

Arash will discuss the need for architectural and operational consistency across multiple cloud environments, which is critical to reducing the cost and risk associated with multi-cloud application deployment and technology services delivery.

. Arash Ghazanfari, Field CTO & Principal Technologist, Dell Technologies

10:50AM

Jamie Moles

Senior Security Engineer

ExtraHop

Associated Talks:

10:50AM - Day 2

View Defense in Diversification: Improving Cybersecurity Through Smart Consolidation

02:30PM - Day 1

View Panel: Attracting & retaining the best talent

View Full Info

Defense in Diversification: Improving Cybersecurity Through Smart Consolidation

Cybersecurity tool sprawl has reached unsustainable levels, and research shows 66% of businesses are striving to consolidate their security portfolio. But over-consolidating to a few platform solutions risks creating a vulnerable, innovation-stifling monoculture. If every organization uses a nearly identical set of security tools, compromising one means compromising them all. Heterogeneity of cybersecurity systems is itself a defense, so security teams need to approach consolidation differently. In this session, attendees will learn:

  • How a data-first approach to security architectures can illuminate natural consolidation points
  • How collaboration with other parts of the IT organization can improve security posture and reduce tool sprawl.
  • How this collaborative approach also creates an opportunity to leverage other parts of the organization to improve security posture through smarter processes and practices.
. Jamie Moles, Senior Security Engineer, ExtraHop

11:20AM

Sab Knight

Head of Sales UK

IONOS

Associated Talks:

-

View IONOS

11:20AM - Day 2

View Cloud Data Sovereignty and the CLOUD Act

11:50AM - Day 1

View Panel: Getting the board on board: Proving ROI

View Full Info

Cloud Data Sovereignty and the CLOUD Act

IONOS’ Sab Knight will point out how you can maintain data sovereignty while serving your company’s global business needs in a Public Cloud scenario.  Learn about a „Sovereign Cloud“, how to protect your data, and be regulation-compliant.

  • A deep dive into US CLOUD Act and its relationship to GDPR with some interesting facts.
  • How to know what risks you could face.
  • How to avoid legalized exposure of your data.
. Sab Knight, Head of Sales UK , IONOS

11:40AM

Networking Break

12:00PM

Justin List

Regional Director

Humio

Associated Talks:

12:00PM - Day 2

View Modern SIEM for a Hybrid World

10:50AM - Day 2

View Panel: The future of cyber security: where do we go from here?

-

View Humio

View Full Info

Modern SIEM for a Hybrid World

Today’s world of DevOps/Cloud-Native and container architecture demands a new approach to security. Move from batch-based indexed systems with pre-built rules to modern, low-latency index-free logging at scale with ad-hoc queries on any data. Learn how Humio was built from the ground up to meet these requirements, supporting threat hunting and DevSecOps as we move to a post-SIEM world.

. Justin List, Regional Director, Humio

12:20PM

David Choe

Chief Development Officer

swIDch Ltd.

Associated Talks:

12:20PM - Day 2

View Next Generation Authentication: Dynamic One-Time Authentication Codes

View Full Info

Next Generation Authentication: Dynamic One-Time Authentication Codes

Passwords, tokenization, biometric, user behavior. New technologies continue to emerge for more secure authentication. However, we continue to see data breaches at massive scale. The heart of the problem is static information. Learn how swIDch’s technology is using their algorithms to generate dynamic authentication codes to increase security in payments, access management, and even IoT.

. David Choe, Chief Development Officer, swIDch Ltd.

12:40PM

Chris Burtenshaw

Founder

Strata Security

Associated Talks:

12:40PM - Day 2

View Can data-driven cyber security give back a third of your week?

View Full Info

Can data-driven cyber security give back a third of your week?

With increased focus on cyber security from boards, senior management and investors, security teams are under increasing pressure to not only deliver effective cyber security, but also demonstrate it to stakeholders, auditors and others.  For the security team, tool proliferation, cloud and digital transformation has made this even more complex; maintaining visibility and governance of modern environments is a never-ending task.  Chris describes some common challenges, and strategies to streamline this process and regain control.

. Chris Burtenshaw, Founder, Strata Security

12:50PM

Senior Representative, Synopsys

Synopsys

Associated Talks:

12:50PM - Day 2

View Are you breach ready?

View Full Info

Are you breach ready?

According to recent surveys, 83% of SMEs have put no money aside to responding to a security incident, and 25% are unaware that there are even costs involved. Breaches are inevitable, and this talk will outline steps to ensure your cyber defences are up to scratch.

. Senior Representative, Synopsys, Synopsys,

01:10PM

Jeremy Snyder

VP International Strategy

DivvyCloud

Associated Talks:

01:10PM - Day 2

View Freedom is good, chaos is bad. Also in the cloud.

10:50AM - Day 2

View Panel: The future of cyber security: where do we go from here?

View Full Info

Freedom is good, chaos is bad. Also in the cloud.

When shifting to the cloud, many organizations find that there is a completely new set of problems – a new set of people creating an interacting with infrastructure in ways that they never did before. Additionally, cloud adopting enterprises find that the speed of change is now minutes, not days or weeks. These factors combined mean that they need to change their operational approach. In this session, DivvyCloud will present a session on how good cloud governance, combined with continuous security and compliance, have allowed leading enterprises like 3M, Pizza Hut, Spotify, Autodesk and others to shift to the cloud with a renewed sense of speed and agility.

. Jeremy Snyder, VP International Strategy, DivvyCloud

01:30PM

Networking Break

02:30PM

Hilda Kosorus

AI Advisor

Crayon

Associated Talks:

02:30PM - Day 2

View Delivering Innovative Solutions with AI & Machine Learning

View Full Info

Delivering Innovative Solutions with AI & Machine Learning

While many organizations still struggle to enable a seamless value chain with AI, we have had the opportunity to guide multiple organizations from various industries on a successful AI transformation journey.
As a result, we have developed and established a unique AI practice which was successfully applied to over 100 projects. In this talk I will provide insights into our methodology and share some of our success stories.

. Hilda Kosorus, AI Advisor , Crayon

02:50PM

Protecting your bubble: How strong is your network defence?

03:10PM

Training and education for staff -the first line of defence

03:30PM

Malware: most wanted

04:00PM

Session Close