Day 1 - 1 December 2022

10:15AM

(GMT)

Jack Nyhof

Australian journalist and ISCEA Media producer

ISCEA

Associated Talks:

10:15AM - Day 1

View Chair’s Welcome

View Full Info

Chair’s Welcome

. Jack Nyhof, Australian journalist and ISCEA Media producer, ISCEA

10:30AM

(GMT)

Robert de Schiavi

Head of Cyber Security

UK Civil Service

Associated Talks:

03:10PM - Day 1

View Panel: Assessing Cybersecurity and Risk in a Modern Landscape

10:30AM - Day 1

View Presentation: Measuring Cyber Resilience and Risk Remediation

View Full Info

Presentation: Measuring Cyber Resilience and Risk Remediation

Content To Follow Soon…

. Robert de Schiavi, Head of Cyber Security, UK Civil Service

11:00AM

(GMT)

Hal Cooke

Cyber Enterprise Reporting Team Lead

Bank of England

Associated Talks:

11:00AM - Day 1

View Presentation: Security Reporting that Actually Makes a Difference

View Full Info

Presentation: Security Reporting that Actually Makes a Difference

Reporting is a key process of any security function used to highlight issues of note. However often, not only is there a wide gap between techies and the business there is also one between cyber security and the techies. There must be a better way of implementing and integrating security reporting. Come listen to the Bank of England’s adventure in Cyber data reporting.

. Hal Cooke, Cyber Enterprise Reporting Team Lead, Bank of England

11:30AM

(GMT)

Thomas Van Havere

Solutions Engineer

Lansweeper

Associated Talks:

11:30AM - Day 1

View Presentation: You Can’t Protect What You Don’t Know You Have

View Full Info

Presentation: You Can’t Protect What You Don’t Know You Have

For many years, Asset Inventory lists at the very top of most industry-leading security frameworks such as ISO, NIST, and CIS. The discovery of hard- and software data plays a critical role in maintaining an up-to-date synopsis of your entire IT estate to protect yourself against cyber security attacks. Leveraging that collected Cybersecurity Asset Management data is a fundamental starting point for implementing security measures across your organization.

The first step in protecting anything is knowing that an asset exists. Sounds so simple, but a solid cybersecurity program requires reliable inventory and discovery as its foundation. Once you’ve established your asset inventory baseline, you can start to dig deeper.

Making IT Discovery a key process of your Cybersecurity Asset Management enables you to discover new devices as they come into the organization and inventory all software and hardware across your IT environment.

Find out how Lansweeper can help you achieve full visibility across – and control over the IT, IOT and OT estate.

. Thomas Van Havere, Solutions Engineer, Lansweeper

11:50AM

(GMT)

Laszlo Koszegi

Industrial Cybersecurity Researcher

Aerospace Industry

Associated Talks:

11:50AM - Day 1

View Presentation: Killware in aspect of Industry 4.0/5.0

View Full Info

Presentation: Killware in aspect of Industry 4.0/5.0

  • What are killwares?
  • History.
  • Targets.
  • What are the challenges with industry 4.0/5.0?
. Laszlo Koszegi, Industrial Cybersecurity Researcher, Aerospace Industry

12:10PM

Networking Break

12:30PM

(GMT)

Severin Collins

Director - Sales Engineering, Europe

D3 Security

Associated Talks:

12:30PM - Day 1

View Presentation: Security Automation – Realizing Business Benefits, Without Adding Headcount

View Full Info

Presentation: Security Automation – Realizing Business Benefits, Without Adding Headcount

The next generation of cyber threats have arrived and there aren’t enough security people or budgets to handle the growing volume and complexity. This presentation will explore why organizations — and not just their security teams — need security automation. We will look at the reasons why security teams utilize SOAR (Security Orchestration, Automation, and Response) to keep pace with threats and technological innovations, without their organizations needing to add headcount. Learn how when the security team automates traditional Tier 1 work, the entire organization benefits – from upskilling staff to eliminating spend on managed services. This session draws from real-world European enterprises whose adoption of NextGen SOAR was the catalyst for fundamental security and organizational improvements.

. Severin Collins, Director - Sales Engineering, Europe , D3 Security

12:50PM

(GMT)

Rob Hockey

Senior Information Security Consultant

Zurich Insurance

Associated Talks:

12:50PM - Day 1

View Presentation: Will Technology ever be Hack Proof?

03:10PM - Day 1

View Panel: Assessing Cybersecurity and Risk in a Modern Landscape

View Full Info

Presentation: Will Technology ever be Hack Proof?

Content to Follow Soon…

. Rob Hockey, Senior Information Security Consultant, Zurich Insurance

01:10PM

(GMT)

Matt Fooks

Head of Presales Architecture

boxxe

Associated Talks:

01:10PM - Day 1

View Presentation: Keeping the Small or Medium Sized Business Secure

View Full Info

Presentation: Keeping the Small or Medium Sized Business Secure

As we see the threat landscape evolving we see ever increasing threats to organisations of any size and in any sector. This increased threat activity brings complications to organisations looking to stay secure at a time when IT budgets are tighter than ever. Matt Fooks a Security and Cloud Solutions Architect at boxxe will cover some of the activities, tools, methods and options you can employ to reduce your chance of being the next victim of an attack.

. Matt Fooks, Head of Presales Architecture, boxxe

01:30PM

(GMT)

Oz Alashe MBE

CEO & Founder

CybSafe

Associated Talks:

01:30PM - Day 1

View Presentation: Security Awareness is Dead (or Dying)

View Full Info

Presentation: Security Awareness is Dead (or Dying)

Security awareness is dead. Or, at the very least, is dying.

Think about it. You have a modern business. Or maybe you’re just trying to keep up with the times. Despite that, you’re still using an approach from 20 years ago to manage your human cyber risk.

Over 90% of cyber security incidents are linked to people.

So why are organizations only paying lip service to human cyber risk? Why are tick-box training and phishing simulations still used? How can we make meaningful progress to quantify human cyber risk and change security behaviors?

In this session, CybSafe’s CEO Oz Alashe will share a deep dive on how to build on security awareness training to influence real and lasting behaviour change in your organization.

We’ve gathered the latest research, industry insight, and data from the CybSafe machine. And we’re going to tell you everything about changing human security behaviors that other security vendors won’t.

. Oz Alashe MBE, CEO & Founder, CybSafe

01:50PM

Lunch & Networking

02:40PM

(GMT)

Kerry Chambers

Chief Commercial Officer

Acuity Risk Management

Associated Talks:

02:40PM - Day 1

View Presentation: ‘More Harm than Good’? How Using Spreadsheets for Risk can Increase Business Exposure

View Full Info

Presentation: ‘More Harm than Good’? How Using Spreadsheets for Risk can Increase Business Exposure

Recently there’s been an undeniable increase in the demand for effective risk management, which is unsurprising considering the growing complexity of threats organizations face globally – from pandemic and supply chain issues, to emerging cyber risks and changing consumer expectations around Environmental, Social, & Governance (ESG) and more.

Spreadsheets are an obvious and seemingly easy first step for an initial introduction of risk management, but in all but the simplest applications, the use of spreadsheets in managing risk falls short and can actually cause more harm than good.

Risk and security professionals are aware that getting risk management wrong can result in missed risks, complacency, looking in the wrong direction, overspending in the wrong areas, underspending in the right areas – ultimately exposing the business to intolerable risk. However, with limited resources and budgets, how can this be avoided?

Kerry Chambers, Acuity Risk Management’s Chief Commercial Officer, draws from her varied experience working with global customers in highly-regulated industries implementing integrated risk management solutions. In this session, Kerry will explore why using spreadsheets for risk management can actually increase your business exposure, and explore the key requirements for effective risk management.

. Kerry Chambers, Chief Commercial Officer, Acuity Risk Management

03:00PM

(GMT)

Adrian Young

Sales Director – EMEA

Mitiga

Associated Talks:

03:00PM - Day 1

View Presentation: Redefining Cloud and SaaS IR with Mitiga

View Full Info

Presentation: Redefining Cloud and SaaS IR with Mitiga

  • Content to Follow Soon…
. Adrian Young, Sales Director – EMEA, Mitiga

03:10PM

(GMT)

Aleksander Gorkowienko

SecurityLabs Senior Managing Consultant

Spirent Communications

Associated Talks:

03:10PM - Day 1

View Panel: Assessing Cybersecurity and Risk in a Modern Landscape

View Full Info

Rob Hockey

Senior Information Security Consultant

Zurich Insurance

Associated Talks:

12:50PM - Day 1

View Presentation: Will Technology ever be Hack Proof?

03:10PM - Day 1

View Panel: Assessing Cybersecurity and Risk in a Modern Landscape

View Full Info

Chris Cooper

Cyber Security Practice Director

Six Degrees

Associated Talks:

03:10PM - Day 1

View Panel: Assessing Cybersecurity and Risk in a Modern Landscape

View Full Info

Alex Challis

Solutions Architect Senior Manager

Elastic

Associated Talks:

03:10PM - Day 1

View Panel: Assessing Cybersecurity and Risk in a Modern Landscape

-

View Elastic

View Full Info

Hanah-Darley

Head of Threat Research

Darktrace

Associated Talks:

03:10PM - Day 1

View Panel: Assessing Cybersecurity and Risk in a Modern Landscape

11:15AM - Day 2

View Panel: Looking to the Future – What Can We Expect to See in the Cyber Security Ecosystem in 2023?

12:00PM - Day 1

View Presentation: Know Yourself, Know Your Enemy – The Realities of Cyber Risk

View Full Info

Robert de Schiavi

Head of Cyber Security

UK Civil Service

Associated Talks:

03:10PM - Day 1

View Panel: Assessing Cybersecurity and Risk in a Modern Landscape

10:30AM - Day 1

View Presentation: Measuring Cyber Resilience and Risk Remediation

View Full Info

Panel: Assessing Cybersecurity and Risk in a Modern Landscape

  • What are the main cyber risks which we are faced with today? 
  • Exploring the importance of Cybersecurity from a UX view. 
  • Reviewing the upcoming tech of Confidential Computing and how it can enhance your enterprise protection. 
. Aleksander Gorkowienko, SecurityLabs Senior Managing Consultant , Spirent Communications
. Rob Hockey, Senior Information Security Consultant, Zurich Insurance
. Chris Cooper, Cyber Security Practice Director, Six Degrees
. Alex Challis, Solutions Architect Senior Manager, Elastic
. Hanah-Darley, Head of Threat Research, Darktrace
. Robert de Schiavi, Head of Cyber Security, UK Civil Service

04:00PM

(GMT)

Josh Howard

CEO & Founder

Single Use Ain't Sexy

Associated Talks:

04:00PM - Day 1

View ISCEA Sustainability Awards

View Full Info

Dr. Sally Uren

Chief Executive

Forum for the Future

Associated Talks:

04:00PM - Day 1

View ISCEA Sustainability Awards

View Full Info

Sergio Fernandez de Cordova

Chairman

PVBLIC Foundation & P3 Smart City

Associated Talks:

04:00PM - Day 1

View ISCEA Sustainability Awards

View Full Info

Ann Rosenberg

Member

World Economic Forum Advisory Network on Climate

Associated Talks:

04:00PM - Day 1

View ISCEA Sustainability Awards

View Full Info

ISCEA Sustainability Awards

Recognizing Sustainability Influencers around the World!

 

https://www.iscea.org/recognition-awards

. Josh Howard, CEO & Founder , Single Use Ain't Sexy
. Dr. Sally Uren, Chief Executive, Forum for the Future
. Sergio Fernandez de Cordova, Chairman, PVBLIC Foundation & P3 Smart City
. Ann Rosenberg, Member, World Economic Forum Advisory Network on Climate

06:00PM

(GMT)

End of Day 1

View Day 2 Content Here: