Day 1 - 17 March 2021
Head of Cyber Security Assurance Service
10:30AM - Day 1
Presentation: The agile CISO
- Exposing the main tenants of CISO success
- The CISO as Digital Trust Leader – How can we bridge the trust gap?
- Integrating security & legal as part of digital transformation
Presentation: Next Generation Defence – Using Hackers to Beat Hackers
There are many dilemmas in today’s complex cybersecurity world. Year on year increases in cyber-attacks, an increase in the sophistication of these attacks, a widening cybersecurity talent gap – not to mention IT security budgets that haven’t kept up with growing demands. In this session, Synack’s Justin Shaw-Gray will host an open conversation with Mark Walmsley, CISO, Freshfields Bruckhaus Deringer LLP. Justin and Mark will discuss Synack’s innovative crowdsourced security model and how Freshfields has ultimately made their platform a more secure place. Attendees will learn how Freshfields Bruckhaus Deringer LLP:
- Is using an army of ethical hackers to harden corporate assets.
- Has transformed and simplified security operations.
- Reduced the costs of legacy testing programs.
- And is now quickly deploying safer applications.
On-Demand fireside chat
Chief Security Officer
AXA Global Re & AXA Liabilities Managers
11:20AM - Day 1
Presentation: Developing a business-driven security strategy
- Ensuring your security team supports your company’s strategic goals
- Are you getting the most bang for your buck in terms of cyber spend?
- How can you identify key risk indicators and hit KPIs?
Global Solutions Architect
11:40AM - Day 1
Presentation: Why Does Machine Identity Management Matter Now?
Machine to machine communication is growing exponentially in today’s organisations, and that communication must be secured. Organisations rely more and more on their systems to communicate with each other to process critical data. And in an age of increasing cybercrime and security vulnerabilities, protecting the entire network throughout the entire certificate lifecycle is critical. Existing hardware systems, however, are outdated in a largely cloud-based environment; what’s an organization to do?
- Why machine identity protection is important, especially in terms of automation, visibility, and intelligence
- Why the security risks connected to machine identities are rising so quickly
Head of Education, Cyber Security
Bank of England
12:00PM - Day 1
Presentation: The psychology behind awareness
- Everyone knows not to open a spam email, yet people are still hooked by phishing. Can you buy, train or educate to change human behaviours?
- Awareness does not equal behaviour – can cyber security progress without behavioural change?
- Examples of organisations excelling in this space
12:20PM - Day 1
Presentation: IoT exploits, accidents and vulnerabilities
The Internet of Things (IoT) is opening up new opportunities for businesses and consumers, and is the linchpin of almost every digital transformation initiative. However, IoT also presents considerable security risks and challenges for organisations. Attackers impersonating a trusted device could conduct man-in-the-middle or other attacks; unsecured devices could expose protected content or enable access to other connected systems. Without a root of trust, communications could be compromised, altered, delivered incompletely, or lost.
Join this IoT security webcast and learn how to bring trust to the internet of things with hardware security modules (HSMs). We will cover:
- Recent examples of IoT vulnerabilities
- Challenges enterprises are facing
- Security solutions to address the challenges
- IoT market trends analysis
Global Director, Cybersecurity
12:40PM - Day 1
Presentation: The future of cyber security: where do we go from here?
- The future of cyber security correlates with the future of information technology. How much of an impact will security have in our business and personal lives?
- How will advancements in smart devices, artificial intelligence and big data impact the industry?
- Developments in the attacker ecosystem.
Day 1- Lunch hour & speed networking on Grip
Adjunct Instructor in Cybersecurity for the College of Information Sciences
Penn State University
02:00PM - Day 1
Chapter Chair (UK & Ireland)
Cloud Security Alliance
02:00PM - Day 1
Cloud Security Architect
12:20PM - Day 1
02:00PM - Day 1
Panel: Getting cloud security right amidst COVID-19 – in partnership with IEEE
- Understanding changes to threats, risks & opportunities
- What are cloud providers doing for companies during the pandemic? Should they have more responsibility for security?
- Catching up with security after the rush to get colleagues online – best practices for hybrid and multi-cloud environments
Live webinar panel
Director Enterprise Cybersecurity & Risk
02:50PM - Day 1
Presentation: The Secrets of Evaluating Security Products
- Assessing which technologies to use and why – what is a worthwhile investment?
- What has longevity, scalability and interoperability, and how useful is an ‘enterprise grade’ solution?
- Identifying legacy and integration issues and strategies for overcoming them
- Technology silos: Should they be avoided or are they important for certain business functions?