Day 1 - 13th September
09:50AM
(GMT)
Mathieu Lahierre
Principal Application & Data Security
BHP

09:50AM - Day 1
View VIRTUAL PRESENTATION: Reducing tolerance for human error
VIRTUAL PRESENTATION: Reducing tolerance for human error
- Using technology to boost security, efficiency and compliance efforts
- Embedding authentication into established business practices
- Understanding privilege and establishing a process
10:10AM
(GMT)
Sandrine Lagrange
Senior Solutions Engineer
OneTrust

10:50AM - Day 1
View Incident Management: Building Trust from the Inside Out

10:10AM - Day 1
View VIRTUAL PRESENTATION: Navigating the Top 7 Trends in Third-Party Risk Management

10:20AM - Day 1
View Navigating the Top 7 Trends in Third-Party Risk Management
VIRTUAL PRESENTATION: Navigating the Top 7 Trends in Third-Party Risk Management
- The world of third-party risk management is rapidly changing. Each day, organizations like yours face new security, privacy, and compliance threats when working with third parties. The good news is there are world-class teams around the world that are paving the way with new best practices for the next generation of third-party risk management. In working with hundreds of these organizations, we’ve seen first-hand what it takes to be successful and secure when working with third parties.
- So, is your third-party risk management program ahead of the curve? Attend this session to find out and learn more about:
- New trends in the third-party risk industry
- What emerging threats you can expect and how to address them
- How to find and leverage assessment communities and shared due diligence data
10:40AM
(GMT)
Joel Stradling
Research Director, European Security
IDC
Nick Vinson
Director, Head of DevSecOps
Pearson

10:40AM - Day 1
View ON-DEMAND PANEL: Observable architecture – security for the SDLC

10:50AM - Day 1
View Panel: Observable architecture – security for the SDLC
Abhishek Vyas
InfoSec Risk Manager: Cloud/DevSecOps
Admiral Group

12:20PM - Day 1
View ON-DEMAND PANEL: Get out of my cloud! Preventing a data breach

10:40AM - Day 1
View ON-DEMAND PANEL: Observable architecture – security for the SDLC

01:50PM - Day 1
View Panel: Get out of my cloud! Preventing a data breach

10:50AM - Day 1
View Panel: Observable architecture – security for the SDLC
ON-DEMAND PANEL: Observable architecture – security for the SDLC
- Is your architecture actually working?
- What can organisations look at in their infrastructure to enable proactive defence?
- How DevOps, ITOps and SecOps teams can collaborate
11:20AM
(GMT)
Paul Martin
Public Cloud Business Development Manager for the UK&I
Fortinet

11:20AM - Day 1
View VIRTUAL PRESENTATION: Securing Any Application on Any Cloud
VIRTUAL PRESENTATION: Securing Any Application on Any Cloud
- How can you maintain consistent security across hybrid, multi-cloud estates?
- Do you have the right tools to provide visibility and control?
- How to match the evolving threat landscape?
11:30AM
(GMT)
Amitabh Singh
Field CTO EMEA
Palo Alto Networks

11:30AM - Day 1
View VIRTUAL PRESENTATION: Next Generation Security Operations Centre: How to combat new threats effectively, efficiently and in near real time basis

12:30PM - Day 1
View Next Generation Security Operations Centre: How to combat new threats effectively, efficiently and in near real time basis

10:50AM - Day 1
View Panel: Observable architecture – security for the SDLC
VIRTUAL PRESENTATION: Next Generation Security Operations Centre: How to combat new threats effectively, efficiently and in near real time basis
Security Teams are struggling to detect all attacks, use all data effectively and have too many alerts and tasks to handle. EDR and SIEM products have not adequately solved the problem. There is a need for Next-Gen SOC- to detect and respond threats in real time/near real time basis. Join this session to discover:
- how to build a new Flywheel for SOC and why tradition needs to be ditched in favour of modernity
- the importance of stitching together Network, Endpoints, Cloud Telemetry, TIM and Forensics in SOC
- Next-Gen SOC – how it all works together
12:00PM
(GMT)
William Morrish
Chief Revenue Officer
Performanta

12:00PM - Day 1
View VIRTUAL PRESENTATION: Dramatically lower your cyber risk without blowing your budget

02:50PM - Day 1
View Dramatically lower your cyber risk without blowing your budget
VIRTUAL PRESENTATION: Dramatically lower your cyber risk without blowing your budget
- Understanding your risk
- Getting the most value from your tooling
- Do the right things, at the right time, to lower your risk
12:20PM
(GMT)
Neil Sinclair
National Cyber Lead
Police Digital Security Centre

10:00AM - Day 1
View Enterprise Security: Chairperson’s Welcome
Abhishek Vyas
InfoSec Risk Manager: Cloud/DevSecOps
Admiral Group

12:20PM - Day 1
View ON-DEMAND PANEL: Get out of my cloud! Preventing a data breach

10:40AM - Day 1
View ON-DEMAND PANEL: Observable architecture – security for the SDLC

01:50PM - Day 1
View Panel: Get out of my cloud! Preventing a data breach

10:50AM - Day 1
View Panel: Observable architecture – security for the SDLC
Sonya Moisset
Principal Security Engineer
Photobox

12:20PM - Day 1
View ON-DEMAND PANEL: Get out of my cloud! Preventing a data breach

01:50PM - Day 1
View Panel: Get out of my cloud! Preventing a data breach
Dr. Wendy Ng
Cloud Security Architect Lead
OneWeb

12:20PM - Day 1
View ON-DEMAND PANEL: Get out of my cloud! Preventing a data breach

01:50PM - Day 1
View Panel: Get out of my cloud! Preventing a data breach
ON-DEMAND PANEL: Get out of my cloud! Preventing a data breach
- Using cloud-based resources safely – moving sensitive workloads out of legacy data centres
- How training can help
- Examples of organisations using the cloud securely to enhance customer experience and user journey
01:00PM
(GMT)
Martin Nash
Head of Cyber Security & Information Assurance
CDS Defense & Security

01:00PM - Day 1
View VIRTUAL PRESENTATION: Insider Threat: Is your biggest cyber risk inside your organisation?
VIRTUAL PRESENTATION: Insider Threat: Is your biggest cyber risk inside your organisation?
- Insider threat, whether malicious or unintentional, remains a significant security risk to organisations in the UK.
- In this presentation, CDS DS will take you through the techniques and processes they developed which made the UK MOD compliant with the wider FVEYs community and how this approach can be scaled to provide a robust programme for any organisation looking to protect against both internal and external threats.