Day 1 - 6 September 2021
08:30AM
Registration Opens
09:40AM
Alex Hilton
Chief Executive
Cloud Industry Forum
09:40AM - Day 1
View Enterprise Security – Digital Transformation: Chair’s Welcome & Opening Remarks
09:30AM - Day 1
View Enterprise Security – IOT & Digital Transformation: Chair’s Welcome and Opening Remarks
Enterprise Security – Digital Transformation: Chair’s Welcome & Opening Remarks
10:00AM
Adri Purkayastha
Head of Technology | Cyber Risk Analytics
BNP Paribas
10:00AM - Day 1
View Understanding risk: how to translate into actionable tasks for the board
Understanding risk: how to translate into actionable tasks for the board
10:30AM
Senior Representative
National Cyber Security Centre
.
10:30AM - Day 1
View Defending digital freedoms: the evolution of national cyber threats
Defending digital freedoms: the evolution of national cyber threats
A representative from the National Cyber Security Centre will discuss how to interpret ‘digital freedoms’ and help to establish resilient services in support of their mission objectives. Does migrating to cloud help or hinder?
11:00AM
Ryan Manyika
Solutions Engineer
OneTrust Vendorpedia
-
View OneTrust Vendorpedia
11:00AM - Day 1
View Risk Exchanges: The Key to Vendor Risk Management Efficiency
Risk Exchanges: The Key to Vendor Risk Management Efficiency
Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, sourcing, IT, and privacy teams struggle to vet and manage vendor risks in real time. So, how can organizations proactively monitor vendors to protect against emerging threats? Additionally, how can risk exchanges help organizations manage the third-party risk management lifecycle with more efficiency? In this session, we’ll answer these questions and breakdown how risk exchanges offer a mature approach to vendor risk monitoring.
11:30AM
Networking Break
11:50AM
Andy Bates
Executive Director
Global Cyber Alliance
Arash Ghazanfari
Field CTO & Principal Technologist
Dell Technologies
10:20AM - Day 2
View Securing the Enterprise and Minimising Risk in a Multi-Cloud World
11:50AM - Day 1
View Panel: Getting the board on board: Proving ROI
Tony Povoas
Chief Information Security Officer
Aegon UK
11:50AM - Day 1
View Panel: Getting the board on board: Proving ROI
Sab Knight
Head of Sales UK
IONOS
-
View IONOS
11:20AM - Day 2
View Cloud Data Sovereignty and the CLOUD Act
11:50AM - Day 1
View Panel: Getting the board on board: Proving ROI
Andy Wall
Chief Security Officer
Office for National Statistics
11:50AM - Day 1
View Panel: Getting the board on board: Proving ROI
Steve Watt
Chief Information Officer
University of St Andrews
11:50AM - Day 1
View Panel: Getting the board on board: Proving ROI
Panel: Getting the board on board: Proving ROI
- Are you breach ready?
- Identifying where the biggest improvements can be made to your cyber security policy
- Evaluating the cost of a potential breach and the most cost-effective solution to industry-specific threats
- How important is a good cybereducation?
12:30PM
Andrew Tsonchev
Director of Technology
Darktrace
12:30PM - Day 1
View Building an AI Analyst to Combat Offensive Machine Learning
Building an AI Analyst to Combat Offensive Machine Learning
Machine Learning techniques in security have focused on detecting threats. We have trained systems to recognise previous attacks and learn how the bad guys operate. This approach works really well for detection. But what about investigation? How do we use machine learning to automate the tasks analysts perform every day? If we want to build an AI Analyst, we need to learn how the good guys operate instead. As attacks become more and more bespoke, and attackers begin to leverage machine learning themselves, automating detection is not enough. Our security tools need to be able to interpret and investigate. This session will explore the need for automating investigation and introduce Darktrace’s AI Analyst technology.
01:00PM
Ashraf Aboukass
Global Head of Security Architecture, Ops & Eng
Schroders
01:00PM - Day 1
View Defending your hybrid cloud deployment
03:00PM - Day 1
View Panel: The power of trust: bug bounty programs
10:50AM - Day 1
View Defending your hybrid cloud deployment
Defending your hybrid cloud deployment
There are many challenges facing organisations that have embraced the cloud. The presentation will be exploring areas such as
- Do you use traditional security toolsets or adopt cloud native security tools?
- Can you truly support innovation without losing control?
- How do you respond to a security incident in the cloud?
01:30PM
Networking Break
02:30PM
Alex Hilton
Chief Executive
Cloud Industry Forum
09:40AM - Day 1
View Enterprise Security – Digital Transformation: Chair’s Welcome & Opening Remarks
09:30AM - Day 1
View Enterprise Security – IOT & Digital Transformation: Chair’s Welcome and Opening Remarks
Jamie Moles
Senior Security Engineer
ExtraHop
10:50AM - Day 2
View Defense in Diversification: Improving Cybersecurity Through Smart Consolidation
02:30PM - Day 1
View Panel: Attracting & retaining the best talent
Soraya Viloria Montes de Oca
Group Information Security Officer
Harvey Nichols
02:30PM - Day 1
View Panel: Attracting & retaining the best talent
Reena Shah
Director, Cyber Security Culture & Strategy
Refinitiv
02:30PM - Day 1
View Panel: Attracting & retaining the best talent
James Packer
Head of Cyber Security
EF Education First
02:30PM - Day 1
View Panel: Attracting & retaining the best talent
John Scott
Head of Security Education
Bank of England
09:50AM - Day 2
View It’s on everyone: How to create a security culture within your business
02:30PM - Day 1
View Panel: Attracting & retaining the best talent
Lucy Payne
Security Awareness and Engagement Lead
Aviva
02:30PM - Day 1
View Panel: Attracting & retaining the best talent
Panel: Attracting & retaining the best talent
- The cyber skills shortage is still the number one cause of rising security incidents – where do we start?
- How to accelerate & improve the recruitment process
- How can support from government be useful?
- Improving & encouraging diversity
03:10PM
Elizabeth Green
Cyber Resilience Specialist UKI
Dell Technologies
03:10PM - Day 1
View Building Cyber Resilience
Building Cyber Resilience
• What is resilience and why are organisations focused on building cyber resilience?
• What are the steps organisations can take to be more resilient today?
• How can organisations protect and recover critical assets in the event of a catastrophic cyber attack?
• Share lessons learnt and insights from my work with clients to improve cyber resilience by building vault to protect critical data
03:40PM
Jon Hawes
Head of Security Operations
Photobox Group
03:40PM - Day 1
View Incident response, from panic to picnic
10:20AM - Day 2
View Incident response, from panic to picnic
Incident response, from panic to picnic
Speed is a crucial factor when it comes to detecting and mitigating threats, so how can we stop them early? This talk will outline how to identify types of threat, and how to deal with them without disrupting your business.
04:10PM
Paul Robinson
Chief Technology Advisor
World Wide Technology
04:10PM - Day 1
View IT/OT Assurance – How do you keep your Cyber promise to the board?
IT/OT Assurance – How do you keep your Cyber promise to the board?
Discover how assurance is moving organisations with IT or OT environments to their desired security end state through foundational visibility, tech debt reductions and trackable transformation activities.
04:30PM
Alex Hilton
Chief Executive
Cloud Industry Forum
09:40AM - Day 1
View Enterprise Security – Digital Transformation: Chair’s Welcome & Opening Remarks
09:30AM - Day 1
View Enterprise Security – IOT & Digital Transformation: Chair’s Welcome and Opening Remarks
Vinnit Patel
CISO - EMEA Cyber Lead
World Wide Technology
-
View World Wide Technology
04:30PM - Day 1
View Panel: Evaluating risk to your business
Yann van Ewijk
Cyber Security Consultant
Ultimum
04:30PM - Day 1
View Panel: Evaluating risk to your business
03:00PM - Day 1
View Panel: The power of trust: bug bounty programs
02:20PM - Day 2
View Panel: Role of ethical hacking and penetration testing
Rafael Narezzi
CISO
WiseEnergy
04:30PM - Day 1
View Panel: Evaluating risk to your business
12:00PM - Day 2
View Panel: Evaluating risk to your business
03:00PM - Day 2
View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars
Cyril Segretain
Information Security Officer Europe
UNIQLO
04:30PM - Day 1
View Panel: Evaluating risk to your business
12:00PM - Day 2
View Panel: Evaluating risk to your business
10:50AM - Day 2
View Panel: The role of regulations and standards for cybersecurity and privacy compliance
Nigel Stanley
Chief Technology Officer - Global OT and Industrial Cyber Security CoE
TÜV Rheinland Group
10:50AM - Day 2
View Panel: The future of cyber security: where do we go from here?
04:30PM - Day 1
View Panel: Evaluating risk to your business
Panel: Evaluating risk to your business
- Physical systems – metrics, access and devices
- People, processes & products
- Who’s job is it anyway? How strict should we be when working with other companies?