Day 1 - 1 December 2022
09:30AM
(GMT)
Chair’s Welcome
Chairpersons welcome and opening remarks.
09:45AM
(GMT)
Presentation: The Perils and Promises of Cybersecurity Technology in 2022
- Exploring the risks and opportunities of technological transformation in the Cybersecurity eco-system.
- Reviewing the best Cyber practices in 2022.
- What poses a concern for 2023 in Cybersecurity?
10:15AM
(GMT)
×
Senior Representative, Manage Engine
10:15AM - Day 1
View Presentation: Wiped Out – Solutions to a Wiper Attack
Presentation: Wiped Out – Solutions to a Wiper Attack
- What is meant by a ‘Wiper Attack’
- The threats a Wiper Attack can have on your enterprise
- What would protect me from a Wiper Attack?
. Senior Representative, Manage Engine, ,
10:45AM
(GMT)
Panel: Tricky Business – How to Evaluate Risk
- Defining what risk is in today’s Cyber and Cloud environment.
- The benefits and pitfalls of metrics, access, and devices.
- How People, processes & products are utilised to evaluate risk.
- Whose job should it be? Should there be restrictions when working with other companies?
11:25AM
(GMT)
Networking Break
11:40AM
(GMT)
×
Senior Representative, Darktrace
11:40AM - Day 1
View Presentation: Organized Cybercrimes – What Can We Do?
12:00PM - Day 1
View VIRTUAL PRESENTATION: Darktrace TBC
03:50PM - Day 1
View Presentation TBC: Darktrace
Presentation: Organized Cybercrimes – What Can We Do?
- What are the most common types of Organized Cybercrimes we see today?
- Review Examples of Organized Cybercrime.
- Cyber Crime Prevention: What Do I Need?
. Senior Representative, Darktrace, ,
12:10PM
(GMT)
Presentation: No Phish for Me Please!
- What is a Phishing Attack and why is it still a threat to businesses in 2022?
- What is the result of a Phishing Attack? How does it affect me?
- How to recognise a typical Phishing Attack and How to Respond.
12:40PM
(GMT)
Presentation: The Ransomware Rising
- Ransomware attacks are evolving their strategies in light of heavy crackdowns: how do we evolve alongside this?
- Learn more about ransomware prevention, mitigation, and response.
01:00PM
(GMT)
Lunch & Networking
01:50PM
(GMT)
Panel: Head Stuck in the Cloud? What You Need to Consider
- Should we be automatically moving to the cloud? Where is cloud not being adopted and why?
- Industry success stories of organizations using the cloud securely.
- Using cloud-based resources safely – moving sensitive workloads out of legacy data centres.
02:30PM
(GMT)
Presentation: Creating a Cyber Resilient Business
- The impact of combining cybersecurity, business continuity and enterprise resilience.
- How to elevate the role of security in your business.
02:50PM
(GMT)
Fireside Chat : Women in TechEx
- Empowering the Next Generation of Women in Cybersecurity One byte at a time.
- How to drive and sustain change in the cybersecurity industry.
- How to Stay Motivated and Inspired in a Cybersecurity Role.
- The Importance of Cybersecurity Academic Integration.
03:20PM
(GMT)
Networking Break
03:40PM
(GMT)
Presentation: Securing the Enterprise Against Potential Data Breaches
- Understanding why the consequences of a data breach are worse than ever.
- Learn how to minimize the risk of a data breach with a comprehensive policy.
03:50PM
(GMT)
Presentation: The Latest Social Engineering Threats
- What are the current social engineering threats?
- Understanding the consequences of social engineering on enterprise.
- How to effectively equip your workforce to be prepared for social engineering threats.
04:00PM
(GMT)
Presentation: Faking It – Deepfake Crime Exposing Cyber Security Gaps
- Understanding the Deepfake Threat, why it is a current threat and not a future concern?
- How should I respond to Deepfake?
- Why Cybersecurity needs People, not just Technology.
04:30PM
(GMT)
Chair’s Closing Remarks
04:40PM
(GMT)
End of Day 1
View Day 2 Content Here:
Accelerating Digital Transformation