Day 1 - 17 March 2021
10:30AM
(GMT)
Chris Cope
Head of Cyber Security Assurance Service
Home Office
10:30AM - Day 1
View Presentation: The agile CISO
Presentation: The agile CISO
- Exposing the main tenants of CISO success
- The CISO as Digital Trust Leader – How can we bridge the trust gap?
- Integrating security & legal as part of digital transformation
On-Demand presentation
10:50AM
(GMT)
Mark Walmsley
CISO
Freshfields Bruckhaus Deringer LLP
10:50AM - Day 1
View Presentation: Next Generation Defence – Using Hackers to Beat Hackers
Justin Shaw-Gray
Sales Director
Synack
10:50AM - Day 1
View Presentation: Next Generation Defence – Using Hackers to Beat Hackers
Presentation: Next Generation Defence – Using Hackers to Beat Hackers
There are many dilemmas in today’s complex cybersecurity world. Year on year increases in cyber-attacks, an increase in the sophistication of these attacks, a widening cybersecurity talent gap – not to mention IT security budgets that haven’t kept up with growing demands. In this session, Synack’s Justin Shaw-Gray will host an open conversation with Mark Walmsley, CISO, Freshfields Bruckhaus Deringer LLP. Justin and Mark will discuss Synack’s innovative crowdsourced security model and how Freshfields has ultimately made their platform a more secure place. Attendees will learn how Freshfields Bruckhaus Deringer LLP:
- Is using an army of ethical hackers to harden corporate assets.
- Has transformed and simplified security operations.
- Reduced the costs of legacy testing programs.
- And is now quickly deploying safer applications.
On-Demand fireside chat
11:20AM
(GMT)
Ingrid Dyer
Chief Security Officer
AXA Global Re & AXA Liabilities Managers
11:20AM - Day 1
View Presentation: Developing a business-driven security strategy
Presentation: Developing a business-driven security strategy
- Ensuring your security team supports your company’s strategic goals
- Are you getting the most bang for your buck in terms of cyber spend?
- How can you identify key risk indicators and hit KPIs?
On-Demand presentation
11:40AM
(GMT)
Carl Bourne
Global Solutions Architect
Venafi
11:40AM - Day 1
View Presentation: Why Does Machine Identity Management Matter Now?
Presentation: Why Does Machine Identity Management Matter Now?
Machine to machine communication is growing exponentially in today’s organisations, and that communication must be secured. Organisations rely more and more on their systems to communicate with each other to process critical data. And in an age of increasing cybercrime and security vulnerabilities, protecting the entire network throughout the entire certificate lifecycle is critical. Existing hardware systems, however, are outdated in a largely cloud-based environment; what’s an organization to do?
-
- Why machine identity protection is important, especially in terms of automation, visibility, and intelligence
- Why the security risks connected to machine identities are rising so quickly
On-Demand presentation
12:00PM
(GMT)
John Scott
Head of Education, Cyber Security
Bank of England
12:00PM - Day 1
View Presentation: The psychology behind awareness
Presentation: The psychology behind awareness
- Everyone knows not to open a spam email, yet people are still hooked by phishing. Can you buy, train or educate to change human behaviours?
- Awareness does not equal behaviour – can cyber security progress without behavioural change?
- Examples of organisations excelling in this space
On-Demand presentation
12:20PM
(GMT)
Kelvin Cusack
Product Manager
nCipher Security
12:20PM - Day 1
View Presentation: IoT exploits, accidents and vulnerabilities
Presentation: IoT exploits, accidents and vulnerabilities
The Internet of Things (IoT) is opening up new opportunities for businesses and consumers, and is the linchpin of almost every digital transformation initiative. However, IoT also presents considerable security risks and challenges for organisations. Attackers impersonating a trusted device could conduct man-in-the-middle or other attacks; unsecured devices could expose protected content or enable access to other connected systems. Without a root of trust, communications could be compromised, altered, delivered incompletely, or lost.
Join this IoT security webcast and learn how to bring trust to the internet of things with hardware security modules (HSMs). We will cover:
-
- Recent examples of IoT vulnerabilities
- Challenges enterprises are facing
- Security solutions to address the challenges
- IoT market trends analysis
On-Demand presentation
12:40PM
(GMT)
Tom Schmitt
Global Director, Cybersecurity
Anheuser-Busch InBev
12:40PM - Day 1
View Presentation: The future of cyber security: where do we go from here?
Presentation: The future of cyber security: where do we go from here?
- The future of cyber security correlates with the future of information technology. How much of an impact will security have in our business and personal lives?
- How will advancements in smart devices, artificial intelligence and big data impact the industry?
- Developments in the attacker ecosystem.
On-Demand Presentation
01:00PM
Day 1- Lunch hour & speed networking on Grip
02:00PM
(GMT)
Elson Sutanto
Principal Analyst
Juniper Research
Josh Fritsch
Adjunct Instructor in Cybersecurity for the College of Information Sciences
Penn State University
02:00PM - Day 1
View Panel: Getting cloud security right amidst COVID-19 – in partnership with IEEE
Francesco Cipollone
Chapter Chair (UK & Ireland)
Cloud Security Alliance
02:00PM - Day 1
View Panel: Getting cloud security right amidst COVID-19 – in partnership with IEEE
Abhishek Vyas
Cloud Security Architect
Admiral Group
12:20PM - Day 1
View Cloud Security Architecture at Admiral Group
02:00PM - Day 1
View Panel: Getting cloud security right amidst COVID-19 – in partnership with IEEE
Panel: Getting cloud security right amidst COVID-19 – in partnership with IEEE
- Understanding changes to threats, risks & opportunities
- What are cloud providers doing for companies during the pandemic? Should they have more responsibility for security?
- Catching up with security after the rush to get colleagues online – best practices for hybrid and multi-cloud environments
Live webinar panel
02:50PM
(GMT)
Les Correia
Director Enterprise Cybersecurity & Risk
Estée Lauder
02:50PM - Day 1
View Presentation: The Secrets of Evaluating Security Products
Presentation: The Secrets of Evaluating Security Products
- Assessing which technologies to use and why – what is a worthwhile investment?
- What has longevity, scalability and interoperability, and how useful is an ‘enterprise grade’ solution?
- Identifying legacy and integration issues and strategies for overcoming them
- Technology silos: Should they be avoided or are they important for certain business functions?
On-Demand presentation