Agenda
Day1 | |
08:00 - 08:50 |
Registration and Networking Break |
08:50 - 09:00 |
Chair's Welcome |
09:00 - 09:20 |
► The worst has happened - now what? How to have a “good” cyber incident Sophia N, Head of Incident Response, NCSC
|
09:20 - 09:40 |
► Adapting to the Cybersecurity Revolution: Unleashing AI for Effective Defence Brett Taylor, SE Director, SentinelOne
|
09:40 - 10:00 |
► Not if, but when - protecting your business against the catastrophic consequences of a cybersecurity breach Brett Ayres, VP of Product, Teneo
|
10:00 - 10:20 |
► Fireside chat: cyber risk management: a practitioner’s perspective Mal Smyth, Global Head of Cyber Governance, Risk and Control at Vodafone
|
10:20 - 11:00 |
► Education Seminar Session 1 Delegates will be able to choose from the following education seminars:
|
11:00 - 11:30 |
Networking Break |
11:30 - 11:50 |
► Weak Links – Individual and Inventory Group Captain Robert Wright, DACOS J6 Operations & Cyber, PJHQ
|
11:50 - 12:10 |
► Team Centric Defence: Measuring and Maximising Your Cyber Talent Chris Pace, CMO & Solution Advocate, RangeForce
|
12:10 - 12:30 |
► How to Defend your Workforce with Phishing-Resistant MFA Adam Matthews, Senior Solutions Engineer, Okta
|
12:30 - 12:50 |
► Protecting Against the Threat of Generative AI Richard Orange, Regional Vice President, EMEA, Abnormal Security
|
12:50 - 13:30 |
► Education Seminar Session 2 Delegates will be able to choose from the following education seminars:
|
13:30 - 14:30 |
Lunch and Networking Break |
14:30 - 15:00 |
► Third party security: there must be a better way! Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
15:00 - 15:20 |
► Navigating Human-Centric Risk: Unveiling the Four Elements Alistair Mills, Director, Sales Engineering, Northern Europe, Proofpoint
|
15:20 - 15:40 |
► Protecting Against the Latest Email Threats with AI-Integrated Defences Dr Kiri Addison, Senior Manager Product Management, Mimecast Gain insights into the threats of today and how artificial intelligence is being used to protect against them. Attend this session to discover:
|
15:40 - 16:20 |
► Education Seminar 3 Delegates will be able to choose from the following education seminars:
|
16:20 - 16:40 |
Networking Break |
16:40 - 17:10 |
► Prioritising Crisis: How to track cyber threats in a world of competing crises Richard Plumb, Senior Manager Cyber Threat Intelligence, Element Materials Technology (Moderator) When the world is on fire, where do you install the smoke detectors? Tracking cyber threat is difficult at the best of times but when everything is a crisis, how do you prioritise?
|
0 |
► LIVE DEMONSTRATION: Weaponising AI for Cyber Attacks & Offensive Operations Manit Sahib, Ethical Hacker, The Global Fund
|
17:30 |
Conference Close |
17:30 - 18:30 |
Drinks Reception and Networking |
Day2 | |
08:00 - 08:50 |
Registration and Networking Break |
08:50 - 09:00 |
Chair's Welcome |
0 |
► Annual Check-up – Taking the Pulse of Cyber in the NHS Mike Fell OBE, Director of National Cyber Operations, NHS England
|
9:20 - 9:40 |
► The critical foundation for a successful Identity Security strategy Lee Elliott, Director, Solutions Engineering, Beyond Trust
|
9:40 - 10:00 |
► Threat Intelligence and Exposure Management; two arms of the same goal – prevention Bernard Montel, EMEA Technical Director and Security Strategist, Tenable
|
10:00 - 10:20 |
► Weaponing your Estate – creating an intelligence capability and driving security assurance Steve Kinghan, Head of Cyber Operations, Hiscox
|
10:20 - 11:00 |
► Education Seminar Session 4 Delegates will be able to choose from the following education seminars:
|
11:00 - 11:30 |
Networking Break |
11:30 - 11:50 |
► Fireside Chat: Mitigating personal liability: the changing climate for security professionals Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
11:50 - 12:10 |
► Analysis of the Top 3 2023 network attacks, and how an NDR could have avoided them François Normand, Cyber Threat Intelligence Manager, Gatewatcher
|
12:10 - 12:30 |
► From Reactive to Proactive: Stopping Ransomware Attacks Earlier in the Cyber Kill Chain Jim Simpson, Director of Threat Intelligence, Searchlight Cyber
|
12:30 - 12:50 |
► Winning at Cyber Security – A Strategic Approach Glyn Worrall, RVP, Technical Account Management, Tanium
|
12:50 - 13:30 |
► Education Seminar Session 5 Delegates will be able to choose from the following education seminars:
|
13:30 - 14:30 |
Lunch and Networking Break |
14:30 - 14:50 |
► Lost in Translation David Ferguson, Deputy CISO, Bank of England Boards are now pushing back for improved understanding of what they have achieved after years of heavy cyber investment. As Cyber Leaders we’re responsible for demonstrating our value to a broad range of stakeholders and to deliver the best ROI with the resources available. So, how do we find the best investments for our organisation and solve the “Lost in Translation” problem? |
14:50 - 15:10 |
► Red Button: DDoS Attacks: Trends and Protection Strategies Ziv Gadot, CEO, Red Button
|
15:10 - 15:30 |
► Frontline Insights: Ransomware Breaches, AI and Resilience Rich Ford, CTO, Integrity 360
|
15:30 - 16:00 |
Networking Break |
16:00 - 16:20 |
► Delivering the UK Government Resilience Framework Hayley Trezel, Head of CNI Policy, Cyber & Supply Chains, Critical National Infrastructure & Systems Resilience Directorate, Cabinet Office
|
16:20 - 16:50 |
► Panel Discussion: The business of being a CISO Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
16:50 - 17:00 |
Conference Close |
Education seminars
Is Your Org Ready for Microsoft Copilot?
Dave Philpotts, Sales Engineer, Varonis
Microsoft Copilot is now available for enterprise customers, transforming productivity in the Microsoft 365 ecosystem. However, security and privacy concerns have companies hesitant to deploy Copilot. There are operational, regulatory, and reputational risks that every organisation needs to overcome before they can leverage Copilot. If you're going to give people new tools to access and leverage data, you need to make sure that data is secure. The challenge, of course, is that with collaborative, unstructured data platforms like M365, managing permissions is a nightmare that everyone struggles with.
What attendees will learn:
• How permissions and policies impact Microsoft Copilot security
• Important data security posture metrics to measure risk
• How to mitigate data security risks before and after deployment
• How Varonis and automation can help
How to Eliminate Ransomware Attacks for Good.
Dean Ferrando, Sales Engineer, UKI, SentinelOne
Live ransomware can take you from “business as usual” to a headline breach in a matter of minutes. Join Elliott to engage in an informative session where he will delve into how to eliminate ransomware attacks for good.
What attendees will learn:
- Insights into how SentinelOne’s use of AI - with an emphasis on speed - detects ransomware in milliseconds and prevents similar attacks from becoming breaches.
- SentinelOne’s patented Rollback feature - where we can take your estate from Ransomware breach to pre-breach in a matter of seconds.
- The latest addition to SentinelOne’s platform, a new generative AI interface, PurpleAI, and how it enables analysts to investigate, interpret, and respond to these advanced attacks without any prior experience.
Cyber Resilience for the Hybrid World
Ian Wood, Senior Director Sales Engineering, Commvault
Organisations are facing an increasing number of threats and rising costs due to the hybrid cloud reality year over year.
What attendees will learn:
- How to simplify modern data protection
- How to proactively secure any workload from any location
- How to cut costs with authentic cyber resilience
Fortifying Kubernetes: The importance of Zero Trust in Kubernetes environments.
Jain Joseph, Solutions Architect, SUSE
Cloud computing and the shift to container infrastructures accelerate business, yet introduce new security concerns. It is important to ensure you have a security strategy in place and the right tools to help protect against known and unknown attacks.
What attendees will learn:
- How SUSE helps secure your containerised environment from development to production
- Why Zero Trust controls are important in the kubernetes world
Uncover sophisticated e-crime attacks with DNS Threat Intelligence
Trish Almgren, Senior Product Marketing Manager & Field Evangelist, Infoblox
In a world where “Malware-as-a-Service” exists and threats are prolific, pervasive, and persistent, taking a pre-emptive approach to proactively blocking malicious domains can provide a solution. DNS Threat Intelligence is a powerful way to pinpoint and pre-empt malicious cyber activity, uncovering attacks long before they are declared malicious in the public domain.
Attendees will learn How DNS Threat Intelligence can:
- Protect your brand by monitoring for lookalike domains
- Aggregate threat alerts to deliver actionable insights
- Improve the ROI of your existing security stack
What do a tsunami and a cyber attack have in common?
Rob Pocock, Technology Director, Red Helix
Oli Venn, SE Manager, Northern Europe, WatchGuard Technologies
How to revolutionise your security through integrated threat detection and rapid response. The need for a unified, comprehensive, and flexible security approach has never been more critical. Just like a tsunami warning system, isolated data points tell you nothing about the coming threat. This presentation explores the paradigm shift from traditional, expensive, and siloed security solutions to comprehensive visibility and threat detection.
What attendees will learn:
- How embracing Security as a Service can revolutionise cyber security for your business, providing a clear path forward to radically transform your security posture
- Why traditional security solutions have failed to provide the security assurance your business and board need
- Building an integrated mesh architecture through innovative use of established technologies for comprehensive infrastructure monitoring
- The benefits of greater visibility across on-premises and cloud environments
- How our Threat Monitoring Service can deliver these benefits to you rapidly and reliably through a subscription based SECaaS
Your Path to Cyber Resilience
Jorge Montiel, Head of Sales Engineering - EMEA, Red Sift
Now is the time to delve into strategies for enterprise organisations to uncover, oversee, and safeguard vulnerabilities across their email, domain, and web attack surfaces. The Red Sift Pulse platform has capabilities that can be leveraged.
What attendees will learn:
- Detect both visible and concealed attacks on their domains proactively
- Protect against phishing and BEC attacks
- Streamline routine investigations and automate remedial actions
- Transition from project-based approaches to continuous processes to effectively combat evolving threats.
So, you’ve been hit by ransomware! What now?
Brett Ayres, VP of Product, Teneo
Ian Ashworth, EMEA Channel Director, Akamai
Facing a ransomware attack can be a defining moment for any organisation. This Education Seminar is designed to inform cybersecurity leaders on how to approach a crisis and how to tackle crucial decisions.
What attendees will learn:
- Should you pay the Ransom?
- Does the DPA 1998 and Article 32 of the GDPR apply?
- Should you tell your customers?
- 38% of companies hit with Ransomware are hit again within 18 months, how can you be better prepared for next time?
Generative Ai and the impact on Third Party Risk
Haydn Brooks, CEO, Risk Ledger
As organisations start to integrate LLMs into business workflows there are added risk to watch out for.
What attendees will learn:
- What are these added risks?
- What are some the impacts of generative AI specifically on supply chain security?
- What risk mitigation strategies are recommended?
E-pocalypse: Navigating the Future of Email Authentication
Alistair Mills, Director, Sales Engineering, Northern Europe, Proofpoint
In the ever-evolving digital landscape, email authentication has emerged as the unsung hero in safeguarding communication channels. Picture this: What if your customers and business partners suddenly stopped receiving your company's vital emails? Brace yourself for the E-pocalypse, as three major mailbox hosting providers are rolling out stringent email acceptance rules. Join us as we unravel the critical importance of email authentication in today's dynamic cyber environment. The recent announcements from industry giants have set the stage for a paradigm shift in how emails are validated and accepted. We'll delve into the intricacies of these changes and decipher why it matters now more than ever.
What attendees will learn:
- The Unseen Threats: Explore the lurking dangers that email authentication aims to thwart, from phishing attacks to unauthorized access.
- Decoding the New Rules: Understand the latest email acceptance requirements imposed by leading mailbox providers and how they impact your organization's communication strategy.
- Strategies for Compliance: Equip yourself with practical insights and strategies to ensure your emails pass the stringent authentication checks, maintaining seamless communication with your audience.
- Future-proofing Your Email Strategy: Gain a foresight into the evolving landscape of email authentication and how your organization can stay ahead of the curve.
- Don't be caught off guard! Join us for an insightful journey into the realm of email authentication, and ensure your business is prepared for the challenges and opportunities that lie ahead. The E-pocalypse is near – are you ready?
How to Identify Threats To Your Organization on the Dark Web
Robert Fitzsimons, Senior Threat Intelligence Engineer, Searchlight Cyber
Learn how to identify threats on the dark web, based on real-life case studies of organizations that have averted cyberattacks by monitoring threat actor activity on hidden sites.
What attendees will learn:
- How to prioritize vulnerability management with dark web intelligence.
- How to identify Initial Access Broker posts that relate to their network infrastructure.
- How to monitor ransomware group activity on the dark web.
Why are you still experiencing Cyber Security attacks in 2024 ?
Ravi Pather, Vice President Sales EME, Ericom Security by Cradlepoint (Ericsson)
Despite increased spend on security tools, security attacks are still happening.
What attendees will learn:
- How effective are your security tools in preventing unknown and zero-day attacks?
- How do hackers actually breach your security tools?
- Should your users be the front line of security defence or is it time to address this differently?
- What’s THE only way to effectively address unknown and zero-day exploits?
How do you win at Cyber Security? A strategic approach.
Glyn Worrall, RVP, Technical Account Management, Tanium
Reviewing the technological trends of the last few decades is an essential part of any strategy. As is setting priorities for 2024.
What attendees will learn:
- Taking a deeper dive into Visibility and Control - you cannot protect it if you cannot see it
- Maintaining a good IT hygiene posture through Continuous Safeguarding
- Do you have the right tools around Detection and Countermeasures?
Unlocking the Key to Identity Security Success: The Vital Role of PAM
Lee Elliott, Director, Solutions Engineering, Beyond Trust
The world of cyber security is changing, with more dynamic highly connected systems than ever. Cloud proliferation has caused an explosion of apps, accounts, and access which makes it now impossible to distinguish between how a legitimate user is leveraging an identity, and how an unauthorised user may be misusing an identity. This has in turn forced the cyber battleground to shift from traditional perimeter and endpoint security into the world of identity security. Following on from his main agenda session, join Lee as he discusses what is driving this paradigm shift and how attackers are successfully exploiting the gaps in visibility between Identity Access Management (IAM) and security tools, leading to a new discipline of Identity Threat Detection and Response (ITDR).
What attendees will learn:
- Why Identity Security is so challenging
- How ITDR can provide a centralized view of Identities and their entitlements across multi-Cloud and application environments
- How ITDR can detect Indicators of Identity Compromise.
- An example of a real-world Identity Breach and how it was controlled with ITDR
The growing role of DFIR in resilient incident response strategies
Tim Thorne, Product Evangelist, Binalyze
How DFIR is disrupting the traditional digital forensics landscape and delivering forensic capability to the centre of the security stack.
What attendees will learn:
- Cybersecurity and the growing revolution powered by DFIR
- The benefits of speed and automation with DFIR
- Leveraging DFIR to reduce caseloads, dwell time, and alert fatigue
- Empowerment, resilience, and enhanced security posture thanks to DFIR
State of Zero Trust Security
Adam Matthews, Senior Solutions Engineer, Okta
Okta conducted a global survey to see the progress of the Zero Trust journey for organisations across different industries. This session shares the findings from the study along with ways organisations are keeping their people, assets, and infrastructure safe.
What attendees will learn:
- Adoption trends and driving factors across different industries and regions
- How Zero Trust budgets are shifting due to macroeconomic factors
- Challenges organisations are facing in adopting Zero Trust
My Traffic is Encrypted and NDR will See Nothing, Wanna Bet?
Ian Dutton, Senior Sales Engineer UK, Gatewatcher
Recent times have seen increased encryption of corporate data flows.
What attendees will learn:
- What are the reasons for this trend?
- What can we see on a network today, and what impact does this have on cyber detection capabilities?
- How a Network Detection and Response (NDR) solution can reveal the hidden threats.
- Demo, case studies and anonymous customer’s feedback
Beyond Bad Actors: Building Risk-Oriented Workflows for Threat Intelligence Teams
Lukas Vaivuckas, Intelligence Solutions Consultant, Silobreaker
CTI teams can take a holistic approach to risk across cyber, geopolitical, reputational, competitor and regulatory threats.
What attendees will learn:
- Tips on how to action this approach
- Integrate threat intelligence into the risk assessment process by identifying relevant PIRs and developing effective responses
- Outline the CTI capabilities required to meet the objectives of multiple and varied stakeholders, showcase value, and protect the business from threats
Going Beyond Compliance: Embracing a Risk-Based Approach for Enhanced Resilience
Arunava Banerjee, Cyber Risk Consulting Lead, Zurich Resilience Solutions.
Andrew Insley, Cyber Risk Consultant, Zurich Resilience Solutions
There are advantages in adopting a risk over compliance-based approach when building cyber resilience.
What attendees will learn:
- How to adopt this resilience and how it brings benefits for you and your organisation
- The key principles and strategies for effectively managing cyber risk as well as enhancing overall resilience
- The limitations of a compliance-based approach and its potential gaps in addressing evolving cyber threats
- The risk-based approach model and its role in building a robust cyber resilience framework
- How risk-based decision-making and risk quantification aligns cybersecurity strategies with business objectives to fully optimise budget and resource allocation
- Real life examples where organisations adopting a risk-based approach identified and closed gaps improving their cyber resilience
Improving Threat Detection Accuracy: Leveraging Probability to Reduce False Positives
Christian Have, CTO, Logpoint
This track tackles the challenges of false positives in early-stage attack detection within organizations. Traditional SIEM alerting often leads to a high rate of false positives, posing significant challenges for analysts.
What attendees will learn:
- Explore how context-driven threat detection, powered by probability scoring, can enhance detection accuracy by consolidating relevant observations into actionable incidents.
- Context-driven threat detection using algorithms increases detection efficacy by fusing relevant observations to produce high-value incidents
- Discuss methods to fuse observations and create high-fidelity alerts, instead of using SIEM to write atomic alerts to detect threats.
- By alerting on incidents in combination, analysts can detect attacks early in the kill chain while eliminating false positives.
Implementing Zero Trust Controls on the Endpoint
Anthon Johnson, Solution's Engineer, Threatlocker
Allowlisting is a central tenet of Zero Trust based security, but rumor has it, it’s hard to implement. Join the Threatlocker Team for a demonstration of the controls needed to harden security at the endpoint and simplify operations, from allowlisting and beyond.
What attendees will learn:
- How to easily implement and manage Application Allowlisting
- View the control and visibility organisation's gain once implementing Threatlocker
- Overview on why organisation's implement Zero-Trust at the Endpoint to deny ransomware by default.
Simplify Security
Bradley Rossi, Senior Technical Solutions Architect, Cisco
Our attack surface expands rapidly every day in the cloud, datacentre, and our office spaces. But also in areas we don’t control thanks to the roaming user. As we try to offer more flexible and agile services to our business and users, we also introduce new threats, vulnerabilities and we have new tools and services to manage. Whilst this is going on our user experience suffers.
What attendees will learn:
- The common pain points that we discuss with our customers every day. How do we simplify and solve the user experience problem? As well as how to keep pace with the ever-changing threat landscape fuelled by modern dynamic environments.
- Trends and pain points of the industry
- User and administrator visibility and experience
- Modern solutions that do the heavy lifting
Cloud Security and Exposure Management: Priorities, Barriers and Risks
Peter Hall, Cloud Security Specialist, Tenable
Using research and analyses from multiple sources, this session will discuss how to formulate a strategy to reduce visibility gaps and communicate business risk tied to your exposure.
What attendees will learn:
- Least Privilege Access Control (Everywhere)
- Attack Surface Management
- Cyber Exposure Score
Work Protected: Picking the Right Battles to Avoid Over-Consolidation
Andrew Dillon, Sales Engineer, Mimecast
Email and collaboration tools are vital to business operations, but they’ve become arguably the single biggest source of risk to the corporate network. As cloud platforms like Microsoft 365 have grown to dominate business productivity, they’ve created irresistible targets; and adversaries are using them to deliver everything from phishing to ransomware.
What attendees will learn:
- How consolidated communications infrastructure offers a rich target for the bad guys
- How the technology choices you make can make Microsoft safer and smarter
- How you can help your people stay safe and secure by picking the most effective partners for M365
Out of the classroom and onto the range: Cybersecurity is a team sport
Chris Pace, CMO & Solution Advocate, RangeForce
Scott Flower, Sr. Solutions Engineering, EMEA, Rangeforce
What attendees will learn:
- Getting real about recruitment and confidence in talent
- The dream of defenders at the top of their game
- How to build a culture of continuous improvement
- What does realistic and threat relevant team exercising actually look like
- A range isn't out of reach, making it work for smaller enterprises
3 New Ways Cybercriminals are Targeting Your Email
Richard Orange, Regional Vice President, EMEA, Abnormal Security
New types of impersonation. Better AI. Shifts to collaboration applications. Cybercrime is a business, and criminals are always looking for new ways to steal money. In this session we will be discussing the latest threat actors and the sift away from the CEO fraud traditionally seen.
What attendees will learn:
- Why tools like ChatGPT could be dangerous
- How you can better protect your organisation from all the latest developments in advanced threats.
The expanding role of generative AI in accelerating elite SOC performance
Parthi Sankar, Technical Director N.Europe, Anomali
Security Operation Centers (SOCs) and those who support them are under relentless pressure to stay ahead of well-funded, unconstrained adversaries that innovate continuously. This dynamic is now being accelerated by the ubiquitous adoption of AI/Generative technologies, which is rapidly taking the global security landscape to an inflection point.
What attendees will learn:
- This presentation will reassess the CISO mission for the modern digital enterprise against this context.
- We will discuss the novel application of Natural Language Processing (NLP) and Artificial Intelligence (AI) to Cyber Threat Intelligence (CTI) and SOC operations as it applies to understanding, detecting, operationalising and reporting on external threats against internal telemetry and its role in taking the SOC to elite performance.
Case Study: Handling a Ransom-Driven DDoS Attack on a Bank
Ziv Gadot, CEO, Red Button
What happened when a North American bank received an extortion mail from a hacker group demanding Bitcoin payment and threatening to carry out a DDoS attack? This session will take an insider look at the ways to respond, prepare and mitigate such an attack, based on the experience of Red Button’s incident response team.
What attendees will learn:
- The dynamics of handling and responding to a ransom threat mail
- Best practices for incident response procedures
- Preparing for a DDoS ransom attack
- The role of DDoS simulation tests between attacks
Securing The Modern Enterprise: any user, any device, anywhere
Ahmed Aburahal, Technical Product Manager, Integrity360
We will delve into the core principles of Security Service Edge (SSE) and explore its transformative impact on modern enterprises. From the integration of networking and security functionalities to its scalability and flexibility, and why more enterprises are adopting Secure Access Service Edge (SASE) architecture.
- Introduction to Security Service Edge (SSE) as a transformative approach in cybersecurity.
- Exploring how SASE integrates networking and SSE.
- The benefits and economies of SSE
- Real-world examples and practical insights for modern enterprises.
- Strategic considerations for successful SASE adoption and implementation.