Date and Time | Title | |
---|---|---|
Jun 9, 2020 9:00am - 9:30am (London) | KACE Resources to Help Your Remote Workforce Thrive - Presentation from Quest Like most systems and IT admins, you’ve been supporting mobile and remote workers for a while now, but nothing could have prepared you for the challenge of transitioning your entire organization to remote overnight. In this webcast, you’ll learn work-from-home tips and tricks to help you address the challenges of managing and securing endpoints now that they reside outside your network. | |
Jun 9, 2020 9:30am - 10:00am (London) | 1984 Tech advances or police state Since George Orwell’s dark depiction of the future society has advanced far beyond what was imagined. Televisions that monitor voice and are a set of eyes in your home. Alexa assisting your every move while nefarious individuals use this tech against you government and law enforcement have easy access into your once private life. Where does convenience stop and privacy begin? | |
Jun 9, 2020 10:00am - 10:30am (London) | COVID-19: Implications for cybersecurity - Examining the crisis within the crisis Orange Cyberdefense has published a comprehensive paper sharing our take in respect to cybersecurity during COVID-19 global crisis. In the paper we examine how cyber-threat actors are trying to capitalize on the global health crisis by creating malware or launching attacks with a COVID-19 theme. However, this kind of exploitative behavior by the cybercrime ecosystem is only one part of a bigger cybersecurity picture. In this mood of fear, uncertainty and doubt, there is an appropriately elevated level of threat awareness, but also an exaggerated level of anxiety. | |
Jun 9, 2020 10:30am - 11:00am (London) | Networking in the Exhibition Hall | |
Jun 9, 2020 11:00am - 11:30am (London) | Are your Teams Combat Ready? - Engaging End Users in Phishing Defence As the world locked down to mitigate the risks of COVID-19, many employees are still adjusting to working from home, and companies like yours are working hard to support it. However, organizations cannot completely lock down their networks. For example, phishing emails continue to evade Secure Email Gateways, with threat actors adapting their tactics to exploit the ongoing crisis. Businesses are threatened by a surge of phish related to COVID-19 and remote work. Listen in as Cofense security experts James Hickey and David Ball provide an in-depth review of the current phishing threat landscape, as seen through the inboxes and eyes of those on the front line – your end users, the new face of your front-line phishing defence. Highlights will include: | |
Jun 9, 2020 11:30am - 12:00pm (London) | Protecting Your Data from the Insider Threat RisK As the workforce rapidly shifts to remote work, the complexity of protecting IP and sensitive data has grown exponentially. Old models of locking down the perimeter no longer apply. Instead, a modern, people-centric approach to Insider Threat Management can complement existing information protection programs, while providing greater visibility and context into both user behaviour and data movement. In this talk, we’ll explore the unique risks of insider threats and how to combat them, including: | |
Jun 9, 2020 12:00pm - 12:50pm (London) | Networking time in the Exhibition Hall | |
Jun 9, 2020 12:50pm - 1:30pm (London) | Anonymous will be providing a compelling talk on latest attacks and cyber leaks These are the top 10 qyestions from our subscirbers: Anonymous Central questions
| |
Jun 9, 2020 1:30pm - 2:00pm (London) | Anticipate the new industrial Cybersecurity challenges : 3 easy steps to secure the access to your OT environment Industry 4.0 is a massive digital transformation of manufacturing, supply chains and their relationships to product engineering processes and customers. While the economic benefits of this Industrial Digital Revolution are massive, so are the potential Cybersecurity threats. The first main vulnerability drivers will be access security to the industrial equipment and the interaction between OT & IT and Industrial applications. The presentation will cover a new way to approach industrial cybersecurity with 3 easy steps to reduce these vulnerabilities. Key takeaways: | |
Jun 9, 2020 2:00pm - 2:30pm (London) | Trends driving the future of privilege management From One Identity The most valuable IT assets in your organization are identities and the most vulnerable identities have privileged access. | |
Jun 9, 2020 2:30pm - 3:00pm (London) | Networking time in the Exhibition Hall | |
Jun 9, 2020 3:00pm - 3:30pm (London) | Securing The 2020 Cyber Threat Landscape – The Top cyber threats & How to Mitigate them The cyber threat landscape changes every year. Attackers constantly add new techniques to their arsenal, increasing evasiveness and effectiveness. In this webinar we will discuss the top cyber security threats organisations are facing in 2020 and how to defend against them. We face risks in cybersecurity every day, however one of the challenges of enabling a remote workforce is that the chances of being the subject of cyber attacks can increase significantly. Users need to be able to securely access the data and application that they need to do their jobs every day, without exposure to data loss. Join the webinar to find out more about the 2020 threat landscape and the best practice options for protecting your business.
| |
Jun 9, 2020 3:30pm - 4:00pm (London) | Empower Your Employees to Work Securely and Efficiently from Home Over the past couple of decades we have seen the number of employees that work from home increase dramatically. Today, due to COVID-19 quarantine policies around the globe, many companies are faced with a new paradigm—employees must work from home for an undefined period of time. In this session, we’ll discuss how to: | |
Jun 9, 2020 4:00pm - 4:30pm (London) | Extend, migrate or re-architect? Security considerations for public cloud regardless of your strategy The majority of companies now have some sort of Cloud presence, whether it’s a couple of virtual machines, or an all-singing and dancing auto-scaling micro-services architecture. But, very few consider adding security into that deployment. We’ll be talking how you can add security to your Cloud architecture, whether it’s a simple deployment or something more exotic. | |
Jun 9, 2020 4:30pm - 4:45pm (London) | Changing Cyber Landscapes: The Battle of Algorithms Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes. In this session, learn about:
| |
Jun 9, 2020 4:45pm - 5:15pm (London) | Presentation From Brittany Kaiser, “#OwnYourData: Harnessing the Potential of our Digital Future” An overview of the issues in data protection, privacy and tech regulation, as a guide to how we secure a prosperous and protected virtual life. | |
Jun 9, 2020 5:30pm - 6:30pm (London) | DJ Set & After party with Stu Hirst in the Networking Lounge |