Day 1 - 1 December 2022
10:00AM
(GMT)
Chair’s Welcome
Chairpersons welcome and opening remarks.
10:15AM
(GMT)
Presentation: The Perils and Promises of Cybersecurity Technology in 2022
- Exploring the risks and opportunities of technological transformation in the Cybersecurity eco-system.
- Reviewing the best Cyber practices in 2022.
- What poses a concern for 2023 in Cybersecurity?
10:45AM
(GMT)
Presentation: Head Stuck in the Cloud? – What you Haven’t Considered
- Should we be automatically moving to the cloud? Where is cloud not being adopted and why?
- Using cloud-based resources safely – moving sensitive workloads out of legacy data centres.
- Success stories of Organizations using the cloud securely to enhance CX and UX.
11:15AM
(GMT)
Panel: Tricky Business – How to Evaluate Risk
- Defining what risk is in today’s Cyber and Cloud environment.
- The benefits and pitfalls of metrics, access, and devices.
- How People, processes & products are utilised to evaluate risk.
- Whose job should it be? Should there be restrictions when working with other companies?
11:55AM
(GMT)
Presentation: Organized Cybercrimes – What Can We Do?
- What are the most common types of Organized Cybercrimes we see today?
- Review Examples of Organized Cybercrime.
- Cyber Crime Prevention: What Do I Need?
12:15PM
(GMT)
Lunch & Networking
01:15PM
(GMT)
Presentation: No Phish for Me Please !
- What is a Phishing Attack and why is it still a threat to businesses in 2022?
- What is the result of a Phishing Attack? How does it affect me?
- How to recognise a typical Phishing Attack and How to Respond.
01:45PM
(GMT)
Presentation: The Ransomware Rising
- Ransomware attacks are evolving their strategies in light of heavy crackdowns: how do we evolve alongside this?
- Learn more about ransomware prevention, mitigation, and response.
02:05PM
(GMT)
Women in TechEx Panel: Working With Cybermen
- Empowering the Next Generation of Women in Cybersecurity One byte at a time.
- How to drive and sustain change in the cybersecurity industry.
- How to Stay Motivated and Inspired in a Cybersecurity Role.
- The Importance of Integrating Cybersecurity in Academia.
02:45PM
(GMT)
Networking
03:15PM
(GMT)
Presentation: Creating a Cyber Resilient Business
- The impact of combining cybersecurity, business continuity and enterprise resilience.
- How to elevate the role of security in your business.
03:35PM
(GMT)
Presentation: Understanding Digital Identity – Lessons Learned from an Ethical Hacker
- With an ever-increasing threat of cybercrime, tighter regulations on the use of data– there has never been such an important time to create a Secure Culture and learn more about how to protect your digital identity.
- What is the role of an ethical hacker?
- The best way to understand digital identity from the perspective of an ethical hacker.