Date and Time | Title | |
---|---|---|
Jul 13, 2022 9:00am - 9:30am (London) | Darktrace for Cloud: Taking Cover with Self-Learning AI Mass-scale migration to the cloud has surged as organizations embrace more flexible working patterns. This rapid transformation brings new security challenges as IT teams grapple with unfamiliar and complex technologies. Achieving visibility and control across third-party environments can be difficult, while attackers continue to find creative ways to scale their attacks and bypass common tools. Join Dr Beverly McCann, Principal Analyst Consultant at Darktrace, as she discusses the challenges of securing the cloud and SaaS applications, and why organizations are turning to Self-Learning AI technology that learns its unique surroundings in order to stop cyber-attacks in their tracks. Includes real-world examples of attacks detected and stopped by this technology. | |
Jul 13, 2022 9:30am - 10:00am (London) | 'Everything is Possible - You Can Fully Automate Software and Patch Management' We will discuss how we can help IT Administrators shift away from traditional patch management and evolve to comprehensive software management instead. We will share: - Common Software-types that make you more exposed than you think - How to re-prioritize your approach to vulnerability management - Key pillars required for a modern software management strategy to work | |
Jul 13, 2022 10:00am - 10:30am (London) | Live Keynote: Ste Watts, Group Head of Security Operations, Aldermore Bank Investigative journalist Geoff White has covered technology for BBC News, Channel 4 News, Audible, Forbes online & many others. ‘Crime Dot Com’, his book on cyber-crime was published in Aug. 2020. His exclusives reveal tech’s impact on our lives: the controversial police use of facial recognition; the failure of artificial intelligence therapy apps; hi-tech call centre frauds that have cost victims their lives’ savings; fraud in the internet dating industry With over 20 years in the IT industry, over 10 of which have been spent in information security, Ste Watts has worked in a number of sectors primarily tasked with protecting critical national infrastructure. Ste has been responsible for developing & managing key capabilities such as cyber forensics, penetration testing, cyber threat intelligence & incident response. Ste was recently appointed to the EC-Council’s Global Advisory Board, where his role is to help to build capacity & create awareness among businesses, government & citizens in the field of cyber incident response. He is currently Group Head of Security Operations, Aldermore Bank plc, UK. The encounter between the two should be memorable. | |
Jul 13, 2022 11:00am - 11:30am (London) | Give Me 25 Minutes. I’ll Give You The Truth About Cyber Security Technology is at the core of our daily lives, be it professional or personal. Software is at the heart of technology, but it can often be fragile. Securing software is not only building walls and hoping they hold. It’s about aligning people and processes, so that cyber security is the foundation of all we do. Cyber security is not a tick box, but rather a way of life for your organisation. Explore with Boris Cipot the importance of securing your software. Find out how you can achieve security, far greater than just a bodyguard on a door... | |
Jul 13, 2022 11:30am - 12:00pm (London) | 'Find All Customer Information Gaps in an Instant' Tune in to find out how to locate all the missing information you have on your customers without having to manually cross-check numerous documents or rely on employee knowledge. The webinar will cover: • How to achieve zero degrees of separation and link all customer information together • How you can make better business decisions by identifying knowledge gaps and plugging holes • How flexible asset tracking will instantly enable improved efficiency The session will guide you through the following features: • Relationship Mapping • Completion Profile • Flexible Assets / Asset Tracking | |
Jul 13, 2022 12:00pm - 12:30pm (London) | Keynote Session: Kevin Fielder, CISO, FNZ Group - Resilience - Individuals - Teams - Organisation - Security | |
Jul 13, 2022 12:30pm - 1:00pm (London) | Improve your Organisation’s Security with File Transfer Automation Are you manually transferring numerous files daily in your workplace? If so, these file transfers may be taking up way too much of your time and opening the doors to security threats. It’s all about speed, scale, and security when it comes to transferring sensitive data, and an automated secure solution can be the answer. Join us for a deep dive on:
| |
Jul 13, 2022 1:30pm - 2:00pm (London) | Securing our World with Intelligence In the fourth quarter of 2021 (Q4 2021) and first quarter of 2022 (Q1 2022), Insikt Group published TTP Instance notes highlighting tools and tactics, techniques, and procedures (TTPs) with the potential to be used in future adversarial campaigns. Looking back on these tools and TTPs, we have identified a subset worth revisiting in further depth based on novelty in the threat landscape or continued or increased exploitation in the wild. | |
Jul 13, 2022 2:00pm - 2:30pm (London) | Live Keynote - James Linton - Spear Phishing: The Inbox Storyteller What’s written within an email isn’t the full spear phishing story. It’s the anchor point of a compendium of stories; the stories of language, processes, biases, and trust. So in this session we are going to strip away the hype around spear phishing, and see what really makes it tick. First we will look at what decisions I made (with no cyber background) in an effort to ‘dupe’ CEOs during my email prankster days. Was I really a master manipulator? Looking back now, I think the success was there by default, I just had to not throw it away. Then I will look at my time socially engineering BEC focused cyber criminals. Collecting mule accounts to share with FS-ISAC always went smoothly… But why were threat actors handing over 10+ bank accounts trying to secure a single invoice payment? I have new thoughts to share on this strange phenomenon. Then we will look at CEO fraud, and BEC. How ‘hyper personalised’ does it need to be in 2022? Not very, is the worrying conclusion I’ve arrived at. | |
Jul 13, 2022 2:30pm - 3:00pm (London) | 'Why Email Security Matters' More than 90% of cyberattacks start with a phishing email. Email is the most successful delivery method for the costliest cyberattacks out there: business email compromise, credential theft, ransomware — the list goes on. Traditional email security solutions like filters or built-in tools in email applications are not enough for today’s sophisticated phishing threats. Therefore, it is more important than ever to have a layered strategy to protect your business against threats. Graphus is the world’s first automated phishing defense platform that protects you from cybercriminals posing as trusted contacts. With varying forms of risk cropping up from every corner, businesses lose SaaS data every day. The harsh reality is they, not SaaS providers, are responsible for the protection of their data. Microsoft, Google and Salesforce data centers are designed with world-class disaster recovery capabilities to protect data from infrastructure threats such as hardware or software failure, power outages, or natural disasters. However, these vendors cannot protect you from the most common causes of data loss: phishing, ransomware and malware attacks, human error, malicious behavior and configuration, and sync errors. That’s where Spanning Backup comes in! Spanning is the other side of the coin that works in tandem with Graphus to build a strong defense against phishing attacks. What the session covers:
Speaker: Shyam Oza, Director of Product Management As Director of Product Management, Shyam is responsible for understanding the needs of Spanning’s G Suite and Salesforce customers and defining the future of the company’s innovative line of products for protecting data in the cloud. Shyam brings 10 years of experience managing, marketing, designing, delivering, and supporting enterprise software products. Over the years he has done everything from teach video game design to transforming legacy enterprise business models to fully take advantage of SaaS technology and Agile methodologies. Shyam graduated from the New Jersey Institute of Technology with a B.A. in Information Systems and holds a CSPO® (Certified Product Owner) certification from the Scrum Alliance. | |
Jul 13, 2022 3:15pm - 3:45pm (London) | Keynote Presentation: Sandip Patel QC Case Studies: Facebook Hacker, Anonymous and Boy Who Almost Broke the Internet | |
Jul 14, 2022 8:55am - 9:30am (London) | Building Your Own SOC: Is it Worth It? There is a significant gap between what is perceived vs the reality of successfully building and maintaining an effective SOC. If a DIY approach is something you’re considering, this session will provide valuable insights and best practices when considering a DIY Build vs. Buy approach to a SOC | |
Jul 14, 2022 9:30am - 10:00am (London) | How To Juggle Cyber Essentials and GDPR Along With All Your Other Cyber Security and Compliance Requirements Managing compliance with the expanding list of UK government and industry standards is becoming a daunting task for any IT professional – it’s close to impossible to juggle them all!
In this session we’ll reduce the complexity by showing you:
Speaker: Max Pruger, GM Compliance – Compliance Manager GR Max has been a pioneer in the managed services industry since the late 1990s. He currently serves as SVP and GM of Compliance Manager, VulScan and MyITProcess and is responsible for Kaseya’s go to market strategy for his respective business units. Max’s first stint with Kaseya spanned nearly a decade, before he left to become the Chief Revenue Officer of CloudJumper (acquired by NetApp). Max began his MSP career at USWeb as a founding member of that company’s managed service division. He has also held the position of Senior Architect at IBM. Max holds a BS in Computer Science and an MBA. | |
Jul 14, 2022 10:00am - 10:30am (London) | Keynote Session: 'Neurodiversity and the Cyber Security Skills Gap' - Purvi Kay, Head of Cyber Transformation and GRC, BAeSystems • How can we get a better understanding of the security skills gap and its causes? • Are we creating an artificial skills/talent gap by putting an excessive focus on technical skills? • What role does Neurodiversity play in creating and developing a robust talent pipeline of security professionals to tackle today’s security issues? • What’s been done so far and what can we do to make things better? | |
Jul 14, 2022 11:00am - 11:30am (London) | Examining 2022's SaaS Security Landscape and Threats The explosion in the number and variety of SaaS apps used by enterprises has created both opportunities and a wider attack surface. Examine today's SaaS security landscape and threats with Maor Bin, CEO and co-founder of Adaptive Shield as he reveals the new attack method called "the SaaS Rootkit" as well as perspectives gleaned from security leaders in the 2022 SSPM Survey Report (completed in conjunction with CSA). Speaker: Maor Bin, Chief Executive & Co-Founder A former cybersecurity intelligence officer in the IDF, Maor has over 16 yrs in cybersecurity leadership. In his career, he led SaaS Threat Detection Research at Proofpoint and won the operational excellence award during his IDI service. Maor got his BSc in Computer Science and is CEO and co-founder of Adaptive Shield, the SaaS Security Posture Management solution built to help security teams gain control over their SaaS app security and prevent vulnerabilities that could lead to a leak or breach. | |
Jul 14, 2022 11:30am - 12:00pm (London) | 'Dark Web Defence Guide: “Not if, but when”. Preparing Employees for the Inevitable Attack with Security Awareness Training' Employees are the first and primary line of defense against online crime. Equip them with the knowledge and skills they need to protect their business from cyber-attack with BullPhish ID. By providing regular, evolving security & phishing awareness training, you’ll educate them on potential security threats and encourage behavior change. Preparing employees for the inevitable attack, whether they are working in the office, on the road, or from home will provide peace of mind, shore up security, and fulfill and document compliance. BullPhish ID provides user-friendly, regular training in bite-size pieces, so employees are more likely to retain what they learn. This 15-minute presentation includes: • How BullPhish ID simulates phishing attacks so all employees become trained to spot and stop phishing attacks. • Why you’ll love the freedom of the choice between plug-and-play phishing kits or fully customizable content • What you can do to start benefiting from security awareness training right away Speaker: Amelia Paro, Channel Development Director Amelia Paro is Channel Development Manager with ID Agent. Amelia is a cybersecurity and channel sales professional with over 10 years of experience in the technology industry, in both B2B and B2C environments. In her current role, she works with MSPs, channel partners and strategic partners to keep the IT Channel growing and thriving. | |
Jul 14, 2022 12:30pm - 1:00pm (London) | An Alert Has Fired. Now What? Speaker: Alex Kirk, Global Principal Engineer Alex Kirk is an open source security veteran. He spent 10 years with Sourcefire research - where he wrote the team's first malware sandbox and established its global customer outreach program - followed by time as an enterprise sales engineer for Cisco and Tenable. He currently serves as Corelight's Global Principal for Suricata, working with end-users and technology partners to improve security outcomes with Suricata and Zeek. | |
Jul 14, 2022 1:00pm - 1:30pm (London) | Your Guide to Incident Response Planning & Ransomware Preparedness with Unitrends Unified BCDR 2021 stacked up as one of the most costly years on record as ransomware attacks exploded with a 148% increase in frequency year over year. Over the last 6 months at Unitrends, we’ve seen a 20x increase in the number of organizations engaging our Support and Cloud teams due to a ransomware attack. In response to these rampant threats, Unitrends is more focused on securing your backup infrastructure and helping organizations recover than ever before Join our team for an in-depth look at incident response planning and ransomware preparedness. You will learn… - How to optimize your incident response plan in the face of rising cyber threats - The necessary steps to protect the integrity of your digital assets related to a security incident - How Unitrends Unified BCDR mitigates threats and improves time-to-recover | |
Jul 14, 2022 1:30pm - 2:00pm (London) | Keynote Presentation from Heidi Holm - 'If not me – who?’ If not me – who? The security culture begins with me - how do we at Inter IKEA work with Security by Design. At IKEA we have strong company culture and values. We work with togetherness, simplicity, finding new ways and taking and delegating responsibility, as some of our values. How does this reflect on our security culture and enable that we work with Security by Design? How do we bring the best in our people and enable complex digital projects to embrace the activities that needs to be done to ensure that our digital products are secure and compliant? Heidi will give some insights in how they work with the topic and what has been the success factors in their information security and data privacy journey to support the business during a digital transformation, and what are the focus areas and challenges right now. Basically it boils down to taking responsible ownership over the risks, and it covers all co-workers: “If not me – who?” | |
Jul 14, 2022 2:00pm - 3:00pm (London) | 14.00 – 15.00 – LIVE Keynote Session: Jenny Radcliffe, People Hacker and Social Engineer Colonel John Doody is the Author of new book “From Stripes to Stars” & Director of Interlocutor Services, a company established to promote Information Assurance & Cyber Security issues nationally & internationally Prior to this John served at CESG/GCHQ for 10 years in the role of Head of Information Assurance Customer Services. Jenny Radcliffe is a world-renowned Social Engineer, hired to bypass security systems through a mixture of psychology, con-artistry, cunning guile. A “burglar” for hire & entertaining educator, she has spent a lifetime talking her way into secure locations, protecting clients from scammers, & leading simulated criminal attacks on organisations of all sizes in order to help secure money, data & information from malicious attacks. Jenny was recognised as one of the top 25 Women in Cyber in 2020 by IT Security Guru, & as a Top 50 Women of Influence in Cyber in 2019. She was nominated for the prestigious “Godmother of Security” award in 2020 & won the “Most Educational Security Blog 2020.” Most recently Woman of Influence & a Top 30 Cybersecurity Leader. Jenny is a sought-after keynote speaker at major conferences & corporate events & is a multiple TEDx contributor. A go-to guest expert on the human element of security, scams, cons & hacks, she has appeared on numerous television & radio shows, as well as online media & traditional press outlets. The encounter between the two should be memorable. | |
Jul 14, 2022 3:15pm - 3:45pm (London) | Keynote Session: Enhancing cybersecurity around Europe - Richard Parlour, Financial Markets Law International Digital Europe is a keystone of the future EU economy. This brings with it certain cybersecurity challenges. How can those challenges be met? What is the European approach and what can be learned from it? |