Agenda

Date and TimeTitle
Jun 9, 2020
9:00am - 9:30am (London)
KACE Resources to Help Your Remote Workforce Thrive - Presentation from Quest

Like most systems and IT admins, you’ve been supporting mobile and remote workers for a while now, but nothing could have prepared you for the challenge of transitioning your entire organization to remote overnight. In this webcast, you’ll learn work-from-home tips and tricks to help you address the challenges of managing and securing endpoints now that they reside outside your network.
We’ll show you how to:
– Create a managed installation
– Better manage software installations
– Download and install collaboration/remote tools
– Harden and secure your KACE Systems Management Appliance (SMA)

Jun 9, 2020
9:30am - 10:00am (London)
1984 Tech advances or police state

Since George Orwell’s dark depiction of the future society has advanced far beyond what was imagined. Televisions that monitor voice and are a set of eyes in your home. Alexa assisting your every move while nefarious individuals use this tech against you government and law enforcement have easy access into your once private life. Where does convenience stop and privacy begin?

Jun 9, 2020
10:00am - 10:30am (London)
COVID-19: Implications for cybersecurity - Examining the crisis within the crisis

Orange Cyberdefense has published a comprehensive paper sharing our take in respect to cybersecurity during COVID-19 global crisis.

In the paper we examine how cyber-threat actors are trying to capitalize on the global health crisis by creating malware or launching attacks with a COVID-19 theme.

However, this kind of exploitative behavior by the cybercrime ecosystem is only one part of a bigger cybersecurity picture.

In this mood of fear, uncertainty and doubt, there is an appropriately elevated level of threat awareness, but also an exaggerated level of anxiety.

Jun 9, 2020
10:30am - 11:00am (London)
Networking in the Exhibition Hall
Jun 9, 2020
11:00am - 11:30am (London)
Are your Teams Combat Ready? - Engaging End Users in Phishing Defence

As the world locked down to mitigate the risks of COVID-19, many employees are still adjusting to working from home, and companies like yours are working hard to support it. However, organizations cannot completely lock down their networks. For example, phishing emails continue to evade Secure Email Gateways, with threat actors adapting their tactics to exploit the ongoing crisis. Businesses are threatened by a surge of phish related to COVID-19 and remote work. Listen in as Cofense security experts James Hickey and David Ball provide an in-depth review of the current phishing threat landscape, as seen through the inboxes and eyes of those on the front line – your end users, the new face of your front-line phishing defence. Highlights will include:
– Insights of various phishing campaigns that evaded SEGs and reached enterprise end users, delivering credential phish and malware.
– How threat actors are using trusted services, such as online business surveys and document sharing platforms, to evade SEGs.
– Expert predictions of what we will continue to see through the end of Q2 and the remainder of 2020. 

Jun 9, 2020
11:30am - 12:00pm (London)
Protecting Your Data from the Insider Threat RisK

As the workforce rapidly shifts to remote work, the complexity of protecting IP and sensitive data has grown exponentially. Old models of locking down the perimeter no longer apply. Instead, a modern, people-centric approach to Insider Threat Management can complement existing information protection programs, while providing greater visibility and context into both user behaviour and data movement. In this talk, we’ll explore the unique risks of insider threats and how to combat them, including:

• The types of insider threat profiles and how to address them. For example, organizations may not know how that more than 60% of insiders are negligent.
• Why insider threats are unique, and require context into both user and data activity.
• How to reduce response time by accelerating investigations. The longer the response times, the costlier an incident can get.
• And more!

Jun 9, 2020
12:00pm - 12:50pm (London)
Networking time in the Exhibition Hall
Jun 9, 2020
12:50pm - 1:30pm (London)
Anonymous will be providing a compelling talk on latest attacks and cyber leaks

These are the top 10 qyestions from our subscirbers:

Anonymous Central questions

 

  1. The US government said this year that hacktivism is a threat to national security as significant as ISIS, Al-Qaeda and Hezbollah. How do you feel about this? Why is this wrong?
  2. How do you feel about Wikileaks (Assange) and Edward Snowden? Would you put them under the same umbrella as Anonymous?
  3. Can you explain how hacktivism has changed over the years: With so many groups calling themselves Anonymous, how do you make sure people “see” you and that you have clear messages and aims?
  4. At the current time, do you still feel hacktivism is effective? What do you achieve from it that results in a greater good?
  5. As security defence tools and techniques improve, are you finding it harder to achieve your aims than before?
  6. Which country do you think is the biggest threat to the rest of the world and why? How do you think changes should be made?
  7. What are your plans at the moment and what are you aiming to do? How do you plan to stay relevant? Any specific projects you are working on and what’s the thinking behind them?
  8. What’s the state of cybersecurity today? What are companies, governments and other organizations doing wrong?
  9. How do you feel about today’s world of data privacy with vast amount of people’s information being collected by apps such as Facebook and Google? Who are the worst offenders?
  10. How do think COVID-19 is impacting cybersecurity?
Jun 9, 2020
1:30pm - 2:00pm (London)
Anticipate the new industrial Cybersecurity challenges : 3 easy steps to secure the access to your OT environment

Industry 4.0 is a massive digital transformation of manufacturing, supply chains and their relationships to product engineering processes and customers. While the economic benefits of this Industrial Digital Revolution are massive, so are the potential Cybersecurity threats. The first main vulnerability drivers will be access security to the industrial equipment and the interaction between OT & IT and Industrial applications. The presentation will cover a new way to approach industrial cybersecurity with 3 easy steps to reduce these vulnerabilities.

Key takeaways:
– Learn about the cybersecurity challenges of Industrial IoT
– Learn why and how to apply to principle of ZERO TRUST with technologies such as EPM and PAM to secure industrial environments
– Benefit from real use cases and industrial cybersecurity best practices

Jun 9, 2020
2:00pm - 2:30pm (London)
Trends driving the future of privilege management From One Identity

The most valuable IT assets in your organization are identities and the most vulnerable identities have privileged access.
Traditional approaches to privileged access management (PAM) focus on the account, vaulting the password, changing the password and recording who does what with the account. Often these controls to mitigate risk will introduce friction to agile automation and devops exercises, while creating a burden on operational costs.
In this webinar One Identity will talk about some of the trends that are driving the future of privileged access management and things to consider in your PAM strategy for increasing value from existing digital investment, mitigating risk from privileges in motion and removing friction from introducing next generation privilege management controls.

Jun 9, 2020
2:30pm - 3:00pm (London)
Networking time in the Exhibition Hall
Jun 9, 2020
3:00pm - 3:30pm (London)
Securing The 2020 Cyber Threat Landscape – The Top cyber threats & How to Mitigate them

The cyber threat landscape changes every year. Attackers constantly add new techniques to their arsenal, increasing evasiveness and effectiveness. In this webinar we will discuss the top cyber security threats organisations are facing in 2020 and how to defend against them.

We face risks in cybersecurity every day, however one of the challenges of enabling a remote workforce is that the chances of being the subject of cyber attacks can increase significantly. Users need to be able to securely access the data and application that they need to do their jobs every day, without exposure to data loss.

Join the webinar to find out more about the 2020 threat landscape and the best practice options for protecting your business.

  • Understand the new and evolving cyber threats in 2020
  • Key findings from the Q4 2019 Internet Security Report
  • Learn the tools and techniques to defend against these threats
Jun 9, 2020
3:30pm - 4:00pm (London)
Empower Your Employees to Work Securely and Efficiently from Home

Over the past couple of decades we have seen the number of employees that work from home increase dramatically. Today, due to COVID-19 quarantine policies around the globe, many companies are faced with a new paradigm—employees must work from home for an undefined period of time. In this session, we’ll discuss how to:
• Adjust to a sudden 100% remote workforce
• Provide easy, secure access to business systems
• Give employees multiple ways to communicate effectively and efficiently
• Ensure Device Trust and Safety Flexible Authentication Policies

Jun 9, 2020
4:00pm - 4:30pm (London)
Extend, migrate or re-architect? Security considerations for public cloud regardless of your strategy

The majority of companies now have some sort of Cloud presence, whether it’s a couple of virtual machines, or an all-singing and dancing auto-scaling micro-services architecture. But, very few consider adding security into that deployment. We’ll be talking how you can add security to your Cloud architecture, whether it’s a simple deployment or something more exotic.

Jun 9, 2020
4:30pm - 4:45pm (London)
Changing Cyber Landscapes: The Battle of Algorithms

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about:

  • Paradigm shifts in the cyber landscape
  • Advancements in offensive AI attack techniques
  • The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
  • Real-world examples of emerging threats that were stopped with Cyber Al
Jun 9, 2020
4:45pm - 5:15pm (London)
Presentation From Brittany Kaiser, “#OwnYourData: Harnessing the Potential of our Digital Future”

An overview of the issues in data protection, privacy and tech regulation, as a guide to how we secure a prosperous and protected virtual life.

Jun 9, 2020
5:30pm - 6:30pm (London)
DJ Set & After party with Stu Hirst in the Networking Lounge