Day 1 - 17 March 2020

Cyber Security for Business

Gartner predicts that over $75 billion will be spent worldwide on infrastructure protection and security services in 2019.  As cloud computing takes a forefront for both consumer and enterprise computing, development of cloud security solutions and the need for secure infrastructure is imperative – Learn more on Day 1. Day 2 of top level content covers threat detection, responding to a data breach and how to manage your human risk factor and ensure your business is protected.

10:00AM

Cyber Security for Business – Chair’s Welcome & Opening Comments

10:20AM

Are you a sitting duck? How good is your cyber security posture

10:50AM

Evaluating your cloud environment: Security tools for secure migration

11:10AM

Networking Break

11:30AM

Keynote: Zero Trust Security – the next phase of cloud identity

– With more apps being used ‘as a service’ in the cloud, and more employees working remotely, traditional identity and access management doesn’t cut it today. What’s more, ZTS assumes there will be bad actors both inside and outside your company’s network.
– This session will explore what Zero Trust Security is, how it relates to organisations today in an IoT-heavy landscape, and how technologies such as machine learning can make an even greater impact.

12:00PM

Andy Kennedy

EMEA Security Specialist

Google

Associated Talks:

12:00PM - Day 1

View Panel: The evolution of cloud security – safeguarding the future

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

View Full Info

Panel: The evolution of cloud security – safeguarding the future

  • Public, Private or Hybrid: How cloud architecture impacts enterprise security
  • The risks of the Cloud as a big data centre
  • Who is responsible for security at which stage? Strategies for sharing responsibility
. Andy Kennedy, EMEA Security Specialist, Google

12:40PM

You shall not pass: why you should kill your password

Twitter’s CEO Jack Dorsey was recently the victim of a passcode-based hack, and this is the latest in the series of incidents showing how easy it is to gain access to cloud-based networks using mobile devices.

  • 3 reasons killing passwords can help cloud security
  • Why organisations should stop being so dependent on passwords
  • Zero Trust – the future for the cloud

01:00PM

VPN for the secure enterprise

VPNs are one of the most exciting security technologies to come out of recent security developments, but how can they be beneficial to your business?

01:30PM

Networking Break

02:30PM

Protecting your bubble: How strong is your network defence?

03:00PM

Yann van Ewijk

Information Risk Analyst

Shell

Associated Talks:

03:00PM - Day 1

View Panel: The power of trust: bug bounty programs

02:20PM - Day 2

View Panel: Role of ethical hacking and penetration testing

View Full Info

Panel: The power of trust: bug bounty programs

  • What role white and grey hat hackers can play in developing secure systems?
  • Benefits and challenges – getting senior level buy in
  • Best practices when considering a hack
. Yann van Ewijk, Information Risk Analyst, Shell

03:40PM

Simon Bennetts

Security Automation Engineer | OWASP ZAP Project leader

Mozilla

Associated Talks:

03:40PM - Day 1

View Best practices for application security

View Full Info

Best practices for application security

With nearly a third of all security compromises happening at application level, why are many organisations avoiding the issue? This talk will cover how to gain all the advantages of scaling your business in the cloud whilst keeping your perimeter secure.

. Simon Bennetts, Security Automation Engineer | OWASP ZAP Project leader, Mozilla

04:00PM

To me, to you: sharing files safely

04:30PM

Session Close

Day 2 - 18 March 2020

10:00AM

Cyber Security for Business Day 2: Chair’s Welcome & Opening Remarks

10:20AM

Staying ahead in threat detection

Speed is a crucial factor when it comes to detecting and mitigating threats, so how can we stop them early? This talk will outline how to identify types of threat, and how to deal with them without disrupting your business.

10:50AM

Threat landscapes: 2020 and beyond

11:10AM

Networking Break

11:30AM

Keynote: Are you breach ready?

According to recent surveys, 83% of SMEs have put no money aside to responding to a security incident, and 25% are unaware that there are even costs involved. Breaches are inevitable, and this talk will outline steps to ensure your cyber defences are up to scratch.

12:00PM

Diana Moldovan

UKI Cyber Operations Lead

Aviva

Associated Talks:

12:00PM - Day 2

View Panel: Evaluating risk to your business

View Full Info

Rafael Narezzi

CISO

WiseEnergy

Associated Talks:

12:00PM - Day 2

View Panel: Evaluating risk to your business

03:00PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

View Full Info

Cyril Segretain

Information Security Officer Europe

UNIQLO

Associated Talks:

12:00PM - Day 2

View Panel: Evaluating risk to your business

10:50AM - Day 2

View Panel: The role of regulations and standards for cybersecurity and privacy compliance

View Full Info

Panel: Evaluating risk to your business

  • Physical systems – metrics, access and devices
  • People, processes & products
  • Who’s job is it anyway? How strict should we be when working with other companies?
. Diana Moldovan, UKI Cyber Operations Lead, Aviva
. Rafael Narezzi, CISO, WiseEnergy
. Cyril Segretain, Information Security Officer Europe, UNIQLO

12:40PM

Malware: most wanted

01:00PM

Networking Break

02:00PM

Under siege – avoiding DDoS

Since 2010 we have seen huge developments in the sophistication of DDoS attacks, so how can you begin to protect yourself?

02:30PM

Lesley Marjoribanks

Head of Security Awareness

RBS

Associated Talks:

12:20PM - Day 2

View The human element: changing security in the financial sector

02:30PM - Day 2

View Panel: The devil you know – Leveraging the human factor

View Full Info

Panel: The devil you know – Leveraging the human factor

  • Who should have access to what data, and why?
  • Insider threats: exploring the dangers of irresponsible and uninformed employees
  • How can human nature be manipulated? Ensuring your training policy is up to scratch
. Lesley Marjoribanks, Head of Security Awareness, RBS

03:10PM

Go phish! Best practices for email security

03:40PM

Training and education for staff – the first line of defence

04:00PM

Session Close