Agenda

Date and TimeTitle
Jul 13, 2022
9:00am - 9:30am (London)
Darktrace for Cloud: Taking Cover with Self-Learning AI

Mass-scale migration to the cloud has surged as organizations embrace more flexible working patterns. This rapid transformation brings new security challenges as IT teams grapple with unfamiliar and complex technologies. Achieving visibility and control across third-party environments can be difficult, while attackers continue to find creative ways to scale their attacks and bypass common tools.

Join Dr Beverly McCann, Principal Analyst Consultant at Darktrace, as she discusses the challenges of securing the cloud and SaaS applications, and why organizations are turning to Self-Learning AI technology that learns its unique surroundings in order to stop cyber-attacks in their tracks. Includes real-world examples of attacks detected and stopped by this technology.

Jul 13, 2022
9:30am - 10:00am (London)
'Everything is Possible - You Can Fully Automate Software and Patch Management'

We will discuss how we can help IT Administrators shift away from traditional patch management and evolve to comprehensive software management instead.

We will share:

- Common Software-types that make you more exposed than you think

- How to re-prioritize your approach to vulnerability management

- Key pillars required for a modern software management strategy to work

Jul 13, 2022
10:00am - 10:30am (London)
Live Keynote: Ste Watts, Group Head of Security Operations, Aldermore Bank

Investigative journalist Geoff White has covered technology for BBC News, Channel 4 News, Audible, Forbes online & many others. ‘Crime Dot Com’, his book on cyber-crime was published in Aug. 2020.

His exclusives reveal tech’s impact on our lives: the controversial police use of facial recognition; the failure of artificial intelligence therapy apps; hi-tech call centre frauds that have cost victims their lives’ savings; fraud in the internet dating industry

With over 20 years in the IT industry, over 10 of which have been spent in information security, Ste Watts has worked in a number of sectors primarily tasked with protecting critical national infrastructure. 

Ste has been responsible for developing & managing key capabilities such as cyber forensics, penetration testing, cyber threat intelligence & incident response. 

Ste was recently appointed to the EC-Council’s Global Advisory Board, where his role is to help to build capacity & create awareness among businesses, government & citizens in the field of cyber incident response.

He is currently Group Head of Security Operations, Aldermore Bank plc, UK.

The encounter between the two should be memorable.

Jul 13, 2022
11:00am - 11:30am (London)
Give Me 25 Minutes. I’ll Give You The Truth About Cyber Security

Technology is at the core of our daily lives, be it professional or personal. Software is at the heart of technology, but it can often be fragile. Securing software is not only building walls and hoping they hold. It’s about aligning people and processes, so that cyber security is the foundation of all we do. Cyber security is not a tick box, but rather a way of life for your organisation.

Explore with Boris Cipot the importance of securing your software. Find out how you can achieve security, far greater than just a bodyguard on a door...

Jul 13, 2022
11:30am - 12:00pm (London)
'Find All Customer Information Gaps in an Instant'

Tune in to find out how to locate all the missing information you have on your customers without having to manually cross-check numerous documents or rely on employee knowledge.

The webinar will cover:

• How to achieve zero degrees of separation and link all customer information together

• How you can make better business decisions by identifying knowledge gaps and plugging holes

• How flexible asset tracking will instantly enable improved efficiency

The session will guide you through the following features:

• Relationship Mapping

• Completion Profile

• Flexible Assets / Asset Tracking

Jul 13, 2022
12:00pm - 12:30pm (London)
Keynote Session: Kevin Fielder, CISO, FNZ Group - Resilience

- Individuals

- Teams

- Organisation

- Security

Jul 13, 2022
12:30pm - 1:00pm (London)
Improve your Organisation’s Security with File Transfer Automation

Are you manually transferring numerous files daily in your workplace? If so, these file transfers may be taking up way too much of your time and opening the doors to security threats. It’s all about speed, scale, and security when it comes to transferring sensitive data, and an automated secure solution can be the answer.

Join us for a deep dive on:

  • Common file transfers pitfalls
  • File transfer/encryption automation for reduced user error
  • Why the lack of secure collaboration tools is a recipe for a data breach
  • The top tips for improving the security and efficiency of file transfers
Jul 13, 2022
1:30pm - 2:00pm (London)
Securing our World with Intelligence

In the fourth quarter of 2021 (Q4 2021) and first quarter of 2022 (Q1 2022), Insikt Group published TTP Instance notes highlighting tools and tactics, techniques, and procedures (TTPs) with the potential to be used in future adversarial campaigns.

Looking back on these tools and TTPs, we have identified a subset worth revisiting in further depth based on novelty in the threat landscape or continued or increased exploitation in the wild.

Jul 13, 2022
2:00pm - 2:30pm (London)
Live Keynote - James Linton - Spear Phishing: The Inbox Storyteller

What’s written within an email isn’t the full spear phishing story. It’s the anchor point of a compendium of stories; the stories of language, processes, biases, and trust.

So in this session we are going to strip away the hype around spear phishing, and see what really makes it tick.

First we will look at what decisions I made (with no cyber background) in an effort to ‘dupe’ CEOs during my email prankster days. Was I really a master manipulator? Looking back now, I think the success was there by default, I just had to not throw it away.

Then I will look at my time socially engineering BEC focused cyber criminals. Collecting mule accounts to share with FS-ISAC always went smoothly… But why were threat actors handing over 10+ bank accounts trying to secure a single invoice payment? I have new thoughts to share on this strange phenomenon.

Then we will look at CEO fraud, and BEC. How ‘hyper personalised’ does it need to be in 2022? Not very, is the worrying conclusion I’ve arrived at.

Jul 13, 2022
2:30pm - 3:00pm (London)
'Why Email Security Matters'

More than 90% of cyberattacks start with a phishing email. Email is the most successful delivery method for the costliest cyberattacks out there: business email compromise, credential theft, ransomware — the list goes on. Traditional email security solutions like filters or built-in tools in email applications are not enough for today’s sophisticated phishing threats.

Therefore, it is more important than ever to have a layered strategy to protect your business against threats. Graphus is the world’s first automated phishing defense platform that protects you from cybercriminals posing as trusted contacts.

With varying forms of risk cropping up from every corner, businesses lose SaaS data every day. The harsh reality is they, not SaaS providers, are responsible for the protection of their data. Microsoft, Google and Salesforce data centers are designed with world-class disaster recovery capabilities to protect data from infrastructure threats such as hardware or software failure, power outages, or natural disasters. However, these vendors cannot protect you from the most common causes of data loss: phishing, ransomware and malware attacks, human error, malicious behavior and configuration, and sync errors. That’s where Spanning Backup comes in! Spanning is the other side of the coin that works in tandem with Graphus to build a strong defense against phishing attacks.

What the session covers:

  • The Importance of email security for your organization
  • How email security and backup software work in harmony
  • A overview of Graphus and Spanning 

Speaker: Shyam Oza, Director of Product Management

As Director of Product Management, Shyam is responsible for understanding the needs of Spanning’s G Suite and Salesforce customers and defining the future of the company’s innovative line of products for protecting data in the cloud. Shyam brings 10 years of experience managing, marketing, designing, delivering, and supporting enterprise software products. Over the years he has done everything from teach video game design to transforming legacy enterprise business models to fully take advantage of SaaS technology and Agile methodologies. Shyam graduated from the New Jersey Institute of Technology with a B.A. in Information Systems and holds a CSPO® (Certified Product Owner) certification from the Scrum Alliance.

https://www.linkedin.com/in/shyamo/ 

Jul 13, 2022
3:15pm - 3:45pm (London)
Keynote Presentation: Sandip Patel QC

Case Studies: Facebook Hacker, Anonymous and Boy Who Almost Broke the Internet

Jul 14, 2022
8:55am - 9:30am (London)
Building Your Own SOC: Is it Worth It?

There is a significant gap between what is perceived vs the reality of successfully building and maintaining an effective SOC. If a DIY approach is something you’re considering, this session will provide valuable insights and best practices when considering a DIY Build vs. Buy approach to a SOC

Jul 14, 2022
9:30am - 10:00am (London)
How To Juggle Cyber Essentials and GDPR Along With All Your Other Cyber Security and Compliance Requirements

Managing compliance with the expanding list of UK government and industry standards is becoming a daunting task for any IT professional – it’s close to impossible to juggle them all!

  • Cyber Essentials and Cyber Essentials Plus
  • GDPR and other privacy conditions built into business contracts
  • External audits and government regulations
  • Plus your own internal IT policies and procedures

 

In this session we’ll reduce the complexity by showing you:

  • What every IT professional needs to know about legally-recognised IT security requirements such as Cyber Essentials
  • How to manage IT requirements efficiently and seamlessly at a fraction of the time
  • 5 steps to get certified with Cyber Essentials – known to reduce up to 80% of cyber attacks
  • How to leverage your certification
  • How to get exclusive access to our free Cyber Essentials Starter Kit

Speaker: Max Pruger, GM Compliance – Compliance Manager GR

Max has been a pioneer in the managed services industry since the late 1990s. He currently serves as SVP and GM of Compliance Manager, VulScan and MyITProcess and is responsible for Kaseya’s go to market strategy for his respective business units. Max’s first stint with Kaseya spanned nearly a decade, before he left to become the Chief Revenue Officer of CloudJumper (acquired by NetApp). Max began his MSP career at USWeb as a founding member of that company’s managed service division. He has also held the position of Senior Architect at IBM. Max holds a BS in Computer Science and an MBA. 

Jul 14, 2022
10:00am - 10:30am (London)
Keynote Session: 'Neurodiversity and the Cyber Security Skills Gap' - Purvi Kay, Head of Cyber Transformation and GRC, BAeSystems

• How can we get a better understanding of the security skills gap and its causes?

• Are we creating an artificial skills/talent gap by putting an excessive focus on technical skills?

• What role does Neurodiversity play in creating and developing a robust talent pipeline of security professionals to tackle today’s security issues?

• What’s been done so far and what can we do to make things better?

Jul 14, 2022
11:00am - 11:30am (London)
Examining 2022's SaaS Security Landscape and Threats

The explosion in the number and variety of SaaS apps used by enterprises has created both opportunities and a wider attack surface. Examine today's SaaS security landscape and threats with Maor Bin, CEO and co-founder of Adaptive Shield as he reveals the new attack method called "the SaaS Rootkit" as well as perspectives gleaned from security leaders in the 2022 SSPM Survey Report (completed in conjunction with CSA).

Speaker: Maor Bin, Chief Executive & Co-Founder

A former cybersecurity intelligence officer in the IDF, Maor has over 16 yrs in cybersecurity leadership. In his career, he led SaaS Threat Detection Research at Proofpoint and won the operational excellence award during his IDI service. Maor got his BSc in Computer Science and is CEO and co-founder of Adaptive Shield, the SaaS Security Posture Management solution built to help security teams gain control over their SaaS app security and prevent vulnerabilities that could lead to a leak or breach.

Jul 14, 2022
11:30am - 12:00pm (London)
'Dark Web Defence Guide: “Not if, but when”. Preparing Employees for the Inevitable Attack with Security Awareness Training'

Employees are the first and primary line of defense against online crime. Equip them with the knowledge and skills they need to protect their business from cyber-attack with BullPhish ID.

By providing regular, evolving security & phishing awareness training, you’ll educate them on potential security threats and encourage behavior change. Preparing employees for the inevitable attack, whether they are working in the office, on the road, or from home will provide peace of mind, shore up security, and fulfill and document compliance. BullPhish ID provides user-friendly, regular training in bite-size pieces, so employees are more likely to retain what they learn.

This 15-minute presentation includes:

• How BullPhish ID simulates phishing attacks so all employees become trained to spot and stop phishing attacks.

• Why you’ll love the freedom of the choice between plug-and-play phishing kits or fully customizable content

• What you can do to start benefiting from security awareness training right away

Speaker: Amelia Paro, Channel Development Director 

Amelia Paro is Channel Development Manager with ID Agent. Amelia is a cybersecurity and channel sales professional with over 10 years of experience in the technology industry, in both B2B and B2C environments. In her current role, she works with MSPs, channel partners and strategic partners to keep the IT Channel growing and thriving.

Jul 14, 2022
12:30pm - 1:00pm (London)
An Alert Has Fired. Now What?

Speaker: Alex Kirk, Global Principal Engineer

Alex Kirk is an open source security veteran. He spent 10 years with Sourcefire research - where he wrote the team's first malware sandbox and established its global customer outreach program - followed by time as an enterprise sales engineer for Cisco and Tenable. He currently serves as Corelight's Global Principal for Suricata, working with end-users and technology partners to improve security outcomes with Suricata and Zeek.

Jul 14, 2022
1:00pm - 1:30pm (London)
Your Guide to Incident Response Planning & Ransomware Preparedness with Unitrends Unified BCDR

2021 stacked up as one of the most costly years on record as ransomware attacks exploded with a 148% increase in frequency year over year. Over the last 6 months at Unitrends, we’ve seen a 20x increase in the number of organizations engaging our Support and Cloud teams due to a ransomware attack. In response to these rampant threats, Unitrends is more focused on securing your backup infrastructure and helping organizations recover than ever before Join our team for an in-depth look at incident response planning and ransomware preparedness.

You will learn…

- How to optimize your incident response plan in the face of rising cyber threats

- The necessary steps to protect the integrity of your digital assets related to a security incident

- How Unitrends Unified BCDR mitigates threats and improves time-to-recover

Jul 14, 2022
1:30pm - 2:00pm (London)
Keynote Presentation from Heidi Holm - 'If not me – who?’

If not me – who? The security culture begins with me - how do we at Inter IKEA work with Security by Design.

At IKEA we have strong company culture and values. We work with togetherness, simplicity, finding new ways and taking and delegating responsibility, as some of our values. How does this reflect on our security culture and enable that we work with Security by Design? How do we bring the best in our people and enable complex digital projects to embrace the activities that needs to be done to ensure that our digital products are secure and compliant?

Heidi will give some insights in how they work with the topic and what has been the success factors in their information security and data privacy journey to support the business during a digital transformation, and what are the focus areas and challenges right now. Basically it boils down to taking responsible ownership over the risks, and it covers all co-workers: “If not me – who?”

Jul 14, 2022
2:00pm - 3:00pm (London)
14.00 – 15.00 – LIVE Keynote Session: Jenny Radcliffe, People Hacker and Social Engineer

Colonel John Doody is the Author of new book “From Stripes to Stars” & Director of Interlocutor Services, a company established to promote Information Assurance & Cyber Security issues nationally & internationally Prior to this John served at CESG/GCHQ for 10 years in the role of Head of Information Assurance Customer Services.

Jenny Radcliffe is a world-renowned Social Engineer, hired to bypass security systems through a mixture of psychology, con-artistry, cunning  guile.

A “burglar” for hire & entertaining educator, she has spent a lifetime talking her way into secure locations, protecting clients from scammers, & leading simulated criminal attacks on organisations of all sizes in order to help secure money, data & information from malicious attacks.

Jenny was recognised as one of the top 25 Women in Cyber in 2020 by IT Security Guru, & as a Top 50 Women of Influence in Cyber in 2019. She was nominated for the prestigious “Godmother of Security” award in 2020 & won the “Most Educational Security Blog 2020.” Most recently Woman of Influence & a Top 30 Cybersecurity Leader.

Jenny is a sought-after keynote speaker at major conferences & corporate events & is a multiple TEDx contributor. A go-to guest expert on the human element of security, scams, cons & hacks, she has appeared on numerous television & radio shows, as well as online media & traditional press outlets.

She is also the host of the award-winning podcast “The Human Factor” interviewing industry leaders, bloggers, experts, fellow social engineers, & con-artists about all elements of security & preventing people from becoming victims of malicious social engineering.

The encounter between the two should be memorable.

Jul 14, 2022
3:15pm - 3:45pm (London)
Keynote Session: Enhancing cybersecurity around Europe - Richard Parlour, Financial Markets Law International

Digital Europe is a keystone of the future EU economy. This brings with it certain cybersecurity challenges. How can those challenges be met? What is the European approach and what can be learned from it?