Day 1 - 17 March 2020
Cyber Security for Business – Chair’s Welcome & Opening Comments
Are you a sitting duck? How good is your cyber security posture
Evaluating your cloud environment: Security tools for secure migration
Keynote: Zero Trust Security – the next phase of cloud identity
– With more apps being used ‘as a service’ in the cloud, and more employees working remotely, traditional identity and access management doesn’t cut it today. What’s more, ZTS assumes there will be bad actors both inside and outside your company’s network.
– This session will explore what Zero Trust Security is, how it relates to organisations today in an IoT-heavy landscape, and how technologies such as machine learning can make an even greater impact.
EMEA Security Specialist
12:00PM - Day 1
10:50AM - Day 1
Panel: The evolution of cloud security – safeguarding the future
- Public, Private or Hybrid: How cloud architecture impacts enterprise security
- The risks of the Cloud as a big data centre
- Who is responsible for security at which stage? Strategies for sharing responsibility
You shall not pass: why you should kill your password
Twitter’s CEO Jack Dorsey was recently the victim of a passcode-based hack, and this is the latest in the series of incidents showing how easy it is to gain access to cloud-based networks using mobile devices.
- 3 reasons killing passwords can help cloud security
- Why organisations should stop being so dependent on passwords
- Zero Trust – the future for the cloud
VPN for the secure enterprise
VPNs are one of the most exciting security technologies to come out of recent security developments, but how can they be beneficial to your business?
Protecting your bubble: How strong is your network defence?
Yann van Ewijk
Information Risk Analyst
03:00PM - Day 1
02:20PM - Day 2
Panel: The power of trust: bug bounty programs
- What role white and grey hat hackers can play in developing secure systems?
- Benefits and challenges – getting senior level buy in
- Best practices when considering a hack
Security Automation Engineer | OWASP ZAP Project leader
03:40PM - Day 1
Best practices for application security
With nearly a third of all security compromises happening at application level, why are many organisations avoiding the issue? This talk will cover how to gain all the advantages of scaling your business in the cloud whilst keeping your perimeter secure.
To me, to you: sharing files safely
Day 2 - 18 March 2020
Cyber Security for Business Day 2: Chair’s Welcome & Opening Remarks
Staying ahead in threat detection
Speed is a crucial factor when it comes to detecting and mitigating threats, so how can we stop them early? This talk will outline how to identify types of threat, and how to deal with them without disrupting your business.
Threat landscapes: 2020 and beyond
Keynote: Are you breach ready?
According to recent surveys, 83% of SMEs have put no money aside to responding to a security incident, and 25% are unaware that there are even costs involved. Breaches are inevitable, and this talk will outline steps to ensure your cyber defences are up to scratch.
UKI Cyber Operations Lead
12:00PM - Day 2
12:00PM - Day 2
03:00PM - Day 2
Information Security Officer Europe
12:00PM - Day 2
10:50AM - Day 2
Panel: Evaluating risk to your business
- Physical systems – metrics, access and devices
- People, processes & products
- Who’s job is it anyway? How strict should we be when working with other companies?
Malware: most wanted
Under siege – avoiding DDoS
Since 2010 we have seen huge developments in the sophistication of DDoS attacks, so how can you begin to protect yourself?
Head of Security Awareness
12:20PM - Day 2
02:30PM - Day 2
Panel: The devil you know – Leveraging the human factor
- Who should have access to what data, and why?
- Insider threats: exploring the dangers of irresponsible and uninformed employees
- How can human nature be manipulated? Ensuring your training policy is up to scratch