Day 1 - 17 March 2021

10:30AM

(GMT)

Chris Cope

Head of Cyber Security Assurance Service

Home Office

Associated Talks:

10:30AM - Day 1

View Presentation: The agile CISO

View Full Info

Presentation: The agile CISO

  • Exposing the main tenants of CISO success
  • The CISO as Digital Trust Leader – How can we bridge the trust gap?
  • Integrating security & legal as part of digital transformation

On-Demand presentation 

. Chris Cope, Head of Cyber Security Assurance Service, Home Office

10:50AM

(GMT)

Mark Walmsley

CISO

Freshfields Bruckhaus Deringer LLP

Associated Talks:

10:50AM - Day 1

View Presentation: Next Generation Defence – Using Hackers to Beat Hackers

View Full Info

Justin Shaw-Gray

Sales Director

Synack

Associated Talks:

10:50AM - Day 1

View Presentation: Next Generation Defence – Using Hackers to Beat Hackers

View Full Info

Presentation: Next Generation Defence – Using Hackers to Beat Hackers

There are many dilemmas in today’s complex cybersecurity world. Year on year increases in cyber-attacks, an increase in the sophistication of these attacks, a widening cybersecurity talent gap – not to mention IT security budgets that haven’t kept up with growing demands. In this session, Synack’s Justin Shaw-Gray will host an open conversation with Mark Walmsley, CISO, Freshfields Bruckhaus Deringer LLP. Justin and Mark will discuss Synack’s innovative crowdsourced security model and how Freshfields has ultimately made their platform a more secure place. Attendees will learn how Freshfields Bruckhaus Deringer LLP:

  • Is using an army of ethical hackers to harden corporate assets.
  • Has transformed and simplified security operations.
  • Reduced the costs of legacy testing programs.
  • And is now quickly deploying safer applications.

On-Demand fireside chat

. Mark Walmsley, CISO, Freshfields Bruckhaus Deringer LLP
. Justin Shaw-Gray, Sales Director, Synack

11:20AM

(GMT)

Ingrid Dyer

Chief Security Officer

AXA Global Re & AXA Liabilities Managers

Associated Talks:

11:20AM - Day 1

View Presentation: Developing a business-driven security strategy

View Full Info

Presentation: Developing a business-driven security strategy

  • Ensuring your security team supports your company’s strategic goals
  • Are you getting the most bang for your buck in terms of cyber spend?
  • How can you identify key risk indicators and hit KPIs?

On-Demand presentation 

. Ingrid Dyer, Chief Security Officer, AXA Global Re & AXA Liabilities Managers

11:40AM

(GMT)

Carl Bourne

Global Solutions Architect

Venafi

Associated Talks:

11:40AM - Day 1

View Presentation: Why Does Machine Identity Management Matter Now?

View Full Info

Presentation: Why Does Machine Identity Management Matter Now?

Machine to machine communication is growing exponentially in today’s organisations, and that communication must be secured. Organisations rely more and more on their systems to communicate with each other to process critical data. And in an age of increasing cybercrime and security vulnerabilities, protecting the entire network throughout the entire certificate lifecycle is critical. Existing hardware systems, however, are outdated in a largely cloud-based environment; what’s an organization to do?

    • Why machine identity protection is important, especially in terms of automation, visibility, and intelligence
    • Why the security risks connected to machine identities are rising so quickly

On-Demand presentation

. Carl Bourne, Global Solutions Architect, Venafi

12:00PM

(GMT)

John Scott

Head of Education, Cyber Security

Bank of England

Associated Talks:

12:00PM - Day 1

View Presentation: The psychology behind awareness

View Full Info

Presentation: The psychology behind awareness

  • Everyone knows not to open a spam email, yet people are still hooked by phishing. Can you buy, train or educate to change human behaviours?
  • Awareness does not equal behaviour – can cyber security progress without behavioural change?
  • Examples of organisations excelling in this space

On-Demand presentation 

. John Scott, Head of Education, Cyber Security, Bank of England

12:20PM

(GMT)

Kelvin Cusack

Product Manager

nCipher Security

Associated Talks:

12:20PM - Day 1

View Presentation: IoT exploits, accidents and vulnerabilities

View Full Info

Presentation: IoT exploits, accidents and vulnerabilities

The Internet of Things (IoT) is opening up new opportunities for businesses and consumers, and is the linchpin of almost every digital transformation initiative. However, IoT also presents considerable security risks and challenges for organisations. Attackers impersonating a trusted device could conduct man-in-the-middle or other attacks; unsecured devices could expose protected content or enable access to other connected systems. Without a root of trust, communications could be compromised, altered, delivered incompletely, or lost.

Join this IoT security webcast and learn how to bring trust to the internet of things with hardware security modules (HSMs). We will cover:

    • Recent examples of IoT vulnerabilities
    • Challenges enterprises are facing
    • Security solutions to address the challenges
    • IoT market trends analysis

On-Demand presentation 

. Kelvin Cusack, Product Manager, nCipher Security

12:40PM

(GMT)

Tom Schmitt

Global Director, Cybersecurity

Anheuser-Busch InBev

Associated Talks:

12:40PM - Day 1

View Presentation: The future of cyber security: where do we go from here?

View Full Info

Presentation: The future of cyber security: where do we go from here?

  • The future of cyber security correlates with the future of information technology. How much of an impact will security have in our business and personal lives?
  • How will advancements in smart devices, artificial intelligence and big data impact the industry?
  • Developments in the attacker ecosystem.

On-Demand Presentation

. Tom Schmitt, Global Director, Cybersecurity, Anheuser-Busch InBev

01:00PM

Day 1- Lunch hour & speed networking on Grip

02:00PM

(GMT)

Elson Sutanto

Principal Analyst

Juniper Research

View Full Info

Josh Fritsch

Adjunct Instructor in Cybersecurity for the College of Information Sciences

Penn State University

Associated Talks:

02:00PM - Day 1

View Panel: Getting cloud security right amidst COVID-19 – in partnership with IEEE

View Full Info

Francesco Cipollone

Chapter Chair (UK & Ireland)

Cloud Security Alliance

Associated Talks:

02:00PM - Day 1

View Panel: Getting cloud security right amidst COVID-19 – in partnership with IEEE

View Full Info

Abhishek Vyas

Cloud Security Architect

Admiral Group

Associated Talks:

12:20PM - Day 1

View Cloud Security Architecture at Admiral Group

02:00PM - Day 1

View Panel: Getting cloud security right amidst COVID-19 – in partnership with IEEE

View Full Info

Panel: Getting cloud security right amidst COVID-19 – in partnership with IEEE

  • Understanding changes to threats, risks & opportunities
  • What are cloud providers doing for companies during the pandemic? Should they have more responsibility for security?
  • Catching up with security after the rush to get colleagues online – best practices for hybrid and multi-cloud environments

Live webinar panel

Moderator: . Elson Sutanto, Principal Analyst, Juniper Research
. Josh Fritsch, Adjunct Instructor in Cybersecurity for the College of Information Sciences , Penn State University
. Francesco Cipollone, Chapter Chair (UK & Ireland), Cloud Security Alliance
. Abhishek Vyas, Cloud Security Architect, Admiral Group

02:50PM

(GMT)

Les Correia

Director Enterprise Cybersecurity & Risk

Estée Lauder

Associated Talks:

02:50PM - Day 1

View Presentation: The Secrets of Evaluating Security Products

View Full Info

Presentation: The Secrets of Evaluating Security Products

  • Assessing which technologies to use and why – what is a worthwhile investment?
  • What has longevity, scalability and interoperability, and how useful is an ‘enterprise grade’ solution?
  • Identifying legacy and integration issues and strategies for overcoming them
  • Technology silos: Should they be avoided or are they important for certain business functions?

On-Demand presentation

. Les Correia, Director Enterprise Cybersecurity & Risk, Estée Lauder