2022 Speakers

Roland Cloutier

Global Chief Security Officer

TikTok

10:40AM - Day 1

Sharing experiences as the CSO of TikTok- threat landscapes,...

View Fireside Chat: Managing Security in the spotlight

View Full Info

Bruce Kaalund

Cybersecurity Specialist

Governance, Risk & Compliance

Carmen Marsh

President & CEO

United Cybersecurity Alliance

Kavitha Venkataswamy

Director - Digital Product Security

Capital One

10:15AM - Day 1

In this talk, we will present the third party...

View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain

View Full Info

Elizabeth Cartier

Director - Information Security

Headspace Inc.

02:05PM - Day 1

Deterrence is key: ensuring you have appropriate policies, strong...

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Mel Reyes

Chief Information Officer | Chief Information Security Officer

Getaround

No talk associated with this Speaker.

View Full Info

Brian Jones

Head of Application Security & Vulnerability Management

Meta

11:15AM - Day 1

Discussing how to prevent compliance violations. Understanding future cloud-based...

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Vladimir Bacvanski

Distinguished Architect

PayPal

No talk associated with this Speaker.

View Full Info

M.K Palmore

Official Member

Forbes Technology Council

03:20PM - Day 1

Reviewing what we mean by a Smart City. Real...

View Chair’s Closing Remarks

04:00PM - Day 1

Reviewing what we mean by a Smart City. Real...

View Chair’s Closing Remarks

View Full Info

Srinivasan R.

Senior Manager Cyber - Technical

Capital One

10:15AM - Day 1

In this talk, we will present the third party...

View Presentation: There is No Free Lunch – Securing Third-Party Software Supply Chain

View Full Info

Michael Fulton

Adjunct Faculty

The Ohio State University

No talk associated with this Speaker.

View Full Info

Dr. Josef Schroefl

Deputy Director/ CoI on Strategy and Defense

Hybrid CoE - The European Centre of Excellence for Countering Hybrid Threats

Thorsten Stremlau

Co-Chair

TCG's Marketing Work Group - Trusted Computing Group

02:05PM - Day 1

Deterrence is key: ensuring you have appropriate policies, strong...

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Edward Tuorinsky

Managing Principal

DTS

Derek Kernus

Director of Cybersecurity Operations

DTS

Steve Van Lare

VP of Engineering

Anjuna

11:55AM - Day 1

Discussing the recent changes in AWS cloud technology and...

View VIRTUAL PRESENTATION: How to Utilize the AWS Cloud for the Most Sensitive Data Without Compromise

11:55AM - Day 1

Discussing the recent changes in public cloud technology and...

View Presentation: How to Utilize the Public Cloud for the Most Sensitive Data Without Compromise

11:15AM - Day 1

Discussing how to prevent compliance violations. Understanding future cloud-based...

View Panel: Addressing Cloud Computing Vulnerabilities

View Full Info

Andrew Egoroff

Senior Cybersecurity Specialist

ProcessUnity

10:45AM - Day 1

To follow soon ... Part of the Cyber Security...

View VIRTUAL PRESENTATION: ProcessUnity

02:05PM - Day 1

Deterrence is key: ensuring you have appropriate policies, strong...

View Panel: How to Stay Ahead of Insider Threats

10:45AM - Day 1

Why is it important to assess vendor risk management?...

View Presentation: Why Third Party Risk Management Should be Central to Your Cybersecurity Strategy

View Full Info

Oscar Minks

CTO

FRSecure

02:45PM - Day 2

To follow soon ... Part of the Cyber Security...

View VIRTUAL PRESENTATION: FRSecure

02:45PM - Day 2

Understanding the consequences of social engineering on businesses. How...

View Presentation: An Update on Latest Social Engineering Threats and How to Stay Vigilant Against Them

02:05PM - Day 1

Deterrence is key: ensuring you have appropriate policies, strong...

View Panel: How to Stay Ahead of Insider Threats

View Full Info

Willy Fabritius

Global Head of Strategy & Business Development

SGS

11:35AM - Day 2

Familiarisation with the cyber criminal’s toolkit: which threats are...

View Panel: Phishing, Smishing, Vishing and Whaling – What You Need to Know to Stay Ahead!

View Full Info

Are you interested in sharing your knowledge and experiences of the cyber security and cloud? We’d love to hear from you.

+44 (0)117 980 9020