Day 1 - 25 April 2019

Developing Security Solutions

Gartner predicts that over $75 billion will be spent worldwide on infrastructure protection and security services in 2019.  As cloud computing takes a forefront for both consumer and enterprise computing, development of cloud security solutions is due to make up a large proportion of that spending.  With so much data now being stored in the cloud, the need for secure infrastructure is imperative.  On day 2, we then shift focus to discussing network security – hearing from industry professionals about their latest solutions, how they work and what results are being seen by the companies using them.

09:40AM

Andy Bates

Executive Director

Global Cyber Alliance

Associated Talks:

09:40AM - Day 1

View Developing security solutions: Chair’s welcome and opening comments

View Full Info

Developing security solutions: Chair’s welcome and opening comments

. Andy Bates, Executive Director, Global Cyber Alliance
Hide Details
More Details

10:00AM

Arash Ghazanfari

Field CTO | UK & Ireland Enterprise

Dell Technologies

Associated Talks:

10:00AM - Day 1

View Dell Technologies approach to Security Transformation

View Full Info

Dell Technologies approach to Security Transformation

During this session, we will explore how the Dell Technologies ecosystem of capabilities is providing a pathway to security transformation for next generation applications and multi-cloud platforms. We will discuss the need for intrinsically secure architectures and how Dell Technologies help organisations adopt a unified approach around aligning their attitude towards risk with their security spend.

. Arash Ghazanfari, Field CTO | UK & Ireland Enterprise, Dell Technologies
Hide Details
More Details

Cloud Security

10:20AM

Dinis Cruz

CISO

Photobox Group

Associated Talks:

10:20AM - Day 1

View Creating a graph based security organisation

View Full Info

Creating a graph based security organisation

This presentation will show real-word examples of how Photobox Group Security uses graph technology to allow the business to make Fact/Risk based decisions. Using Slack Bots to allow the easy consumption and visualisation of data (from risks, to vulns, to projects, to okrs, to decisions, to business owners, etc…), the eco-system created, takes data stored in JIRA and makes it consumable in multiple formats (Pdfs, Google Sheets, Google Slides, Elastic Search). The end result are risk rating dashboards that represent reality (since they are interconnected with all the relevant data) and are easy to understand by business/management owners

. Dinis Cruz, CISO, Photobox Group
Hide Details
More Details

10:50AM

Eduardo Helering

Lead Solutions Engineer EMEA

OneLogin

Associated Talks:

10:50AM - Day 1

View Keynote: Does Multi Factor Authentication (MFA) without Single Sign On (SSO) make sense

12:10PM - Day 2

View Panel: Exploring Identity Access Management

View Full Info

Keynote: Does Multi Factor Authentication (MFA) without Single Sign On (SSO) make sense

  • Understanding the threat lansdcape from shadow IT
  • Delivering different MFA strategies for different user populations
  • Using machine learning and adaptive authentication to reduce friction whist maintaining a secure environment
. Eduardo Helering, Lead Solutions Engineer EMEA, OneLogin
Hide Details
More Details

11:20AM

Networking Break

11:50AM

Andy Bates

Executive Director

Global Cyber Alliance

Associated Talks:

09:40AM - Day 1

View Developing security solutions: Chair’s welcome and opening comments

View Full Info

Dave Barnett

Head of CASB

Forcepoint EMEA

Associated Talks:

11:50AM - Day 1

View Panel: Sharing responsibility for cloud security

01:00PM - Day 1

View Case Study: Cloud access security brokers (CASBs) – the gatekeeper between on-prem and cloud infrastructure

View Full Info

Francesco Cipollone

Director of Events - UK Chapter

Cloud Security Alliance

Associated Talks:

10:40AM - Day 2

View Is the Cloud secure? It’s easy if you do it smart

11:50AM - Day 1

View Panel: Sharing responsibility for cloud security

View Full Info

Daniel Power

General Manager, Northern Europe

OneLogin

Associated Talks:

10:20AM - Day 1

View Keynote: Can you enable SaaS based Line of Business agility, without compromising IT security?

11:50AM - Day 1

View Panel: Sharing responsibility for cloud security

View Full Info

Stephen Owen

Principal Cloud Security Architect & Data Protection Officer

Camelot UK National Lottery

Associated Talks:

11:50AM - Day 1

View Panel: Sharing responsibility for cloud security

View Full Info

Panel: Sharing responsibility for cloud security

  • Security in the cloud is – and always has been – a two-way street defined as the vendor being responsible for security ‘of’ the cloud – software and hardware – while the customer is responsible for security ‘in’ the cloud – data, OS, identity and access management, and so forth. So why do companies still struggle?
  • Which stakeholders throughout the business and beyond have to take responsibility for cloud security, and what education and training is required?
  • How do consumers fit into all this?
  • Discussing effective strategies for sharing this responsibility effectively from Enterprise.
Moderator: . Andy Bates, Executive Director, Global Cyber Alliance
. Dave Barnett, Head of CASB, Forcepoint EMEA
. Francesco Cipollone, Director of Events - UK Chapter, Cloud Security Alliance
. Daniel Power, General Manager, Northern Europe, OneLogin
. Stephen Owen, Principal Cloud Security Architect & Data Protection Officer, Camelot UK National Lottery
Hide Details
More Details

12:30PM

Nick Thomas

CIO

Rubicom Solutions

Associated Talks:

12:30PM - Day 1

View Security in a clouded future – focus on Office 365

View Full Info

Magnus Cohn

Sales Director

KeepIt

Associated Talks:

12:30PM - Day 1

View Security in a clouded future – focus on Office 365

View Full Info

Security in a clouded future – focus on Office 365

    • Moving in the cloud with office 365 – benefits and pitfalls
    • Continue best practice in the cloud in regards to security
    • Customer case: why we moved to 365 and what we found out we needed before going into the clouded future
. Nick Thomas, CIO, Rubicom Solutions
. Magnus Cohn, Sales Director, KeepIt
Hide Details
More Details

01:00PM

Dave Barnett

Head of CASB

Forcepoint EMEA

Associated Talks:

11:50AM - Day 1

View Panel: Sharing responsibility for cloud security

01:00PM - Day 1

View Case Study: Cloud access security brokers (CASBs) – the gatekeeper between on-prem and cloud infrastructure

View Full Info

Case Study: Cloud access security brokers (CASBs) – the gatekeeper between on-prem and cloud infrastructure

  • What CASBs do and how they differ from more traditional cloud security solutions
  • How CASBs help with shadow IT policies and rising employee use of cloud apps
  • Combining visibility, compliance, data security and threat protection
. Dave Barnett, Head of CASB, Forcepoint EMEA
Hide Details
More Details

01:20PM

Networking Break

Threat Detection & Response

02:20PM

Ben Russell

Head of Cyber Threat Response

National Crime Agency

Associated Talks:

02:20PM - Day 1

View Afternoon Keynote: Policing in cyber space – The Law Enforcement response to cyber crime

View Full Info

Afternoon Keynote: Policing in cyber space – The Law Enforcement response to cyber crime

  • How are cyber criminals currently targeting businesses?
  • What is law enforcement doing to tackle the threat?
  • How can Law Enforcement and business work together more effectively?
. Ben Russell, Head of Cyber Threat Response, National Crime Agency
Hide Details
More Details

02:50PM

David Atkinson

Founder & CEO

Senseon

Associated Talks:

02:50PM - Day 1

View AI: Positive forces at work, or false positives?

02:50PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

View Full Info

AI: Positive forces at work, or false positives?

False positives or ‘innocent anomalies’ are a huge distraction for over-stretched security teams who would be better off investigating genuine malicious activity. Join David Atkinson, Founder and CEO of Senseon as he shares insight into his unique AI approach that gathers context and triangulates threats across the entire digital estate. Find out how Senseon automates investigation, reduces false positives and simplifies the security stack to save you time and precious resource.

. David Atkinson, Founder & CEO, Senseon
Hide Details
More Details

03:10PM

Andy Bates

Executive Director

Global Cyber Alliance

Associated Talks:

09:40AM - Day 1

View Developing security solutions: Chair’s welcome and opening comments

View Full Info

Luke Potter

Operations Director (Cybersecurity)

SureCloud

Associated Talks:

03:10PM - Day 1

View Panel: Role of ethical hacking and penetration testing

View Full Info

Robin Fewster

Offensive Security Manager, Global Security

Sage

Associated Talks:

03:10PM - Day 1

View Panel: Role of ethical hacking and penetration testing

View Full Info

Paul McCourt

Head of Information Security

MADE.com

Associated Talks:

04:20PM - Day 1

View Breach and attack simulation

03:10PM - Day 1

View Panel: Role of ethical hacking and penetration testing

View Full Info

Panel: Role of ethical hacking and penetration testing

  • What role white and grey hat hackers can play in developing secure systems?
  • Discussing the challenges and opportunities in this field
  • Real life examples from enterprise of how pen testing and ethical hackers are improving their organisations cyber security.

 

Moderator: . Andy Bates, Executive Director, Global Cyber Alliance
. Luke Potter, Operations Director (Cybersecurity), SureCloud
. Robin Fewster, Offensive Security Manager, Global Security , Sage
. Paul McCourt, Head of Information Security, MADE.com
Hide Details
More Details

03:50PM

Networking Break

04:10PM

Andy Thomas

CEO

KYND

Associated Talks:

04:10PM - Day 1

View Cyber Risk – it’s IT’s problem isn’t it?

View Full Info

Cyber Risk – it’s IT’s problem isn’t it?

A few years ago cyber wasn’t even mentioned when considering major risks facing businesses. Fast forward a few years and cyber risk is now recognised as one of the biggest perils facing any organisation and many IT professionals now find themselves solely responsible for this systemic risk.

Email spoofing, data breaches, whaling, phishing…the list goes on. How do you manage when your cyber risks increase but your budgets and resources don’t? In this exciting presentation, Andy will show you how you it is now possible to gain a simple understanding of the cyber risks that could affect your organisation and how to manage and mitigate these without spending huge amounts.

. Andy Thomas, CEO, KYND
Hide Details
More Details

04:20PM

Paul McCourt

Head of Information Security

MADE.com

Associated Talks:

04:20PM - Day 1

View Breach and attack simulation

03:10PM - Day 1

View Panel: Role of ethical hacking and penetration testing

View Full Info

Breach and attack simulation

  •  What is it and where is the value
  •  Evolution of ‘pre-incident management’
  •  The current state of technology tooling and platforms in this sector
  •  Forging tooling and mitigations in an organisation
  •  Prioritising efforts and resources
  •  Future trends in this area
. Paul McCourt, Head of Information Security, MADE.com
Hide Details
More Details

04:50PM

Session Close

Networking Party – 6pm – Pergola @ Olympia

An evening of networking on Thursday 25 April from 6pm. Access for Ultimate, Gold & Expo Plus holders in addition to speakers, sponsors, press and exhibitors. Taking place at the rooftop bar of Olympia with spectacular views across London,  join us for drinks and networking opportunities.

Day 2 - 26 April 2019

10:00AM

Jason Reed

Senior Analyst, Cyber Security

Frost & Sullivan

Associated Talks:

10:00AM - Day 2

View Developing Security Solutions Day 2 – Chair’s Welcome and Opening Comments

View Full Info

Developing Security Solutions Day 2 – Chair’s Welcome and Opening Comments

. Jason Reed, Senior Analyst, Cyber Security, Frost & Sullivan
Hide Details
More Details

Network Security

10:20AM

Kevin Fielder

CISO

Just Eat

Associated Talks:

10:20AM - Day 2

View Building a genuinely agile security team, enhancing productivity and visibility with minimal overhead

11:20AM - Day 2

View Panel: Implementing DevSecOps in Enterprise

View Full Info

Building a genuinely agile security team, enhancing productivity and visibility with minimal overhead

  • How to ensure security enables the business
  • Continuously delivering value and ensuring no / minimum wasted effort
  • Closely aligning to business needs
  • Not hiding behind SLAs
. Kevin Fielder, CISO, Just Eat
Hide Details
More Details

10:50AM

Ros Smith

Senior Product Manager - Identity Access Management

BBC

Associated Talks:

10:50AM - Day 2

View Re-inventing Identity Management at the BBC

View Full Info

Re-inventing Identity Management at the BBC

You don’t need to go to many Identity Management conferences to realise that Identity and Access Management projects are hard to implement and also that IAM is one of the least “technological” of the Security disciplines, with it being 10% technology and 90% business change.

The BBC is currently meeting the challenge of IAM transformation head on. As one of the 90% Ros Smith will explain the approach being taken, what has happened so far and where they are going next.

. Ros Smith, Senior Product Manager - Identity Access Management, BBC
Hide Details
More Details

11:20AM

Jason Reed

Senior Analyst, Cyber Security

Frost & Sullivan

Associated Talks:

10:00AM - Day 2

View Developing Security Solutions Day 2 – Chair’s Welcome and Opening Comments

View Full Info

Pieter Heyn

Director, Sales & Alliances UK & Ireland

Humio

Associated Talks:

11:20AM - Day 2

View Panel: Implementing DevSecOps in Enterprise

View Full Info

Wendy Ng

DevSecOps Security Managing Advisor, Experian Global Security Office

Experian

Associated Talks:

11:20AM - Day 2

View Panel: Implementing DevSecOps in Enterprise

View Full Info

Miguel Ornelas

Head of Continuous Assurance

HSBC

Associated Talks:

11:20AM - Day 2

View Panel: Implementing DevSecOps in Enterprise

View Full Info

Kevin Fielder

CISO

Just Eat

Associated Talks:

10:20AM - Day 2

View Building a genuinely agile security team, enhancing productivity and visibility with minimal overhead

11:20AM - Day 2

View Panel: Implementing DevSecOps in Enterprise

View Full Info

Panel: Implementing DevSecOps in Enterprise

  • Discussing the need for DevSecOps for your security team?
  • Reconciling the goals and needs of your organisation with the ever shifting cyber security landscape.
  • Barriers to security: lack of security ‘culture’ in your organisation, getting C level buy in.
  • Examples of success from DevSecOps teams.
Moderator: . Jason Reed, Senior Analyst, Cyber Security, Frost & Sullivan
. Pieter Heyn, Director, Sales & Alliances UK & Ireland, Humio
. Wendy Ng, DevSecOps Security Managing Advisor, Experian Global Security Office, Experian
. Miguel Ornelas, Head of Continuous Assurance, HSBC
. Kevin Fielder, CISO, Just Eat
Hide Details
More Details

12:00PM

Mike Bursell

Chief Security Architect

Red Hat

Associated Talks:

12:00PM - Day 2

View It’s not all tech: cultural change for DevSecOps

02:50PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

View Full Info

It’s not all tech: cultural change for DevSecOps

  • Security shifting from an afterthought to critical, foundational and pervasive
  • The importance of automation for embedding and scaling security expertise
  • How governance models must be extended through the development and operations process to auditing and beyond
  • Some of the key organisational obstacles you will meet – and how to address them
  • The importance of tools and process, but how you will need culture and executive buy-in to succeed
. Mike Bursell, Chief Security Architect, Red Hat
Hide Details
More Details

12:20PM

Prof Gareth Howells

CTO

Metrarc Ltd

Associated Talks:

12:20PM - Day 2

View IoT and Device Authentication with ICMetrics

View Full Info

Prof Klaus McDonald-Maier

CEO

Metrarc Ltd

Associated Talks:

12:20PM - Day 2

View IoT and Device Authentication with ICMetrics

View Full Info

IoT and Device Authentication with ICMetrics

Current secure device authentication and encryption technology has serious limitations in assuring the identity of a given device and its users.

ICMetrics, the electronic equivalent of biometrics is a novel, efficient and robust system for device authentication, based on deriving secure encryption keys from the properties of digital systems. This addresses a major area in the security domain, which is currently recognised as inhibiting the economic expansion of digital services at a time where there is a need for increasing security which is relevant to many sectors including mobile commerce, communication, smart devices and Internet of Things (IoT).

. Prof Gareth Howells, CTO, Metrarc Ltd
. Prof Klaus McDonald-Maier, CEO, Metrarc Ltd
Hide Details
More Details

12:30PM

Networking Break

02:40PM

Robin Vann

Commercial Director | Non-Executive Director

Reliance ACSN | Blue Solutions

Associated Talks:

02:40PM - Day 2

View Defencing the SMB Supply Chain with Full Visibility in Real-Time

View Full Info

Defencing the SMB Supply Chain with Full Visibility in Real-Time

Humio, Blue Solutions, Reliance ACSN

“A SERIES OF HIGH PROFILE, VERY DAMAGING ATTACKS ON COMPANIES HAS DEMONSTRATED THAT ATTACKERS HAVE BOTH THE INTENT AND ABILITY TO EXPLOIT VULNERABILITIES IN SUPPLY CHAIN SECURITY. THIS TREND IS REAL AND GROWING. SO, THE NEED TO ACT IS CLEAR.” – NATIONAL CYBER SECURITY CENTRE (NCSC)

Supply chain risk challenges nearly all businesses, and whether you’re a SMB supplier or the enterprise buyer, you need to understand and mitigate cyber risks. Yet, despite enterprises spending millions on people and technology to fight cyber crime, cyber threats continue to travel down the supply chain. How do we protect and secure the entire supply chain when limited by systems observability, availability, and budget?

In this talk, Rob will discuss ways to defend the whole of the chain, bringing enterprise grade defences to the SMB supply chain. For the SMB, this mitigates your cyber risk and defends your business.

For the enterprise, this mitigates your supply chain cyber risk and defends your business.

. Robin Vann, Commercial Director | Non-Executive Director, Reliance ACSN | Blue Solutions
Hide Details
More Details

03:10PM

Kathryn Brett Goldman

Director of Development | CEO

Ladies of London Hacking Society | Cybermaniacs

Associated Talks:

03:10PM - Day 2

View Case Study: Women in Cybersecurity

View Full Info

Case Study: Women in Cybersecurity

. Kathryn Brett Goldman, Director of Development | CEO, Ladies of London Hacking Society | Cybermaniacs
Hide Details
More Details

03:30PM

Session Close