The cybersecurity reboot: time to start over?

17th annual e-Crime & Cybersecurity Congress
5th & 6th March 2019, London, UK

Time to tear up the cybersecurity playbook?

 

There are two narratives in cyber: the first is the public, jargon-filled, tech-heavy story that emphasizes the uniqueness of the challenge, its complexity and the need for secrecy and lack of scrutiny. That narrative is in trouble.

The second is the private reality: that digital transformation has now outpaced traditional corporate and government structures and processes to such an extent that the entire edifice is threatened by cyber attacks.

When pizza companies take all their orders over mobile apps, and an hour’s downtime can cost a million pounds, digitalisation has turned a food business into a tech business and made cybersecurity its most significant operational risk.

When a hotel or airline gets most of its business through a third-party comparison app, it’s lost control of its customer interface, relationship, AND its security.

But neither business nor government are anywhere close to responding appropriately – and regulator, stakeholders, customers and the press have noticed.

To survive, businesses need to be digitally fit. To be digitally fit, they need to be cybersecure. And to be cybersecure they need to change a lot more than just technology. Cybersecurity has to be properly resourced, staffed with the right people and integrated into a true operational risk management model.

So this year’s annual e-Crime & Cybersecurity Congress will look at the true drivers and necessities of cybersecurity and the new thinking, technologies and people needed to stay digitally fit.

  • From bolt-on to built-in: industry and government need to stop thinking about cybersecurity and start thinking about cyber risk management: what is the difference and why does it matter so much?
  • From techie to business partner: how can today’s CISOs jump the gap from IT specialist to business risk manager? How do you implement holistic cybersecurity?
  • It's all about the money: the financial impact of a breach on the bottom line has, up until now, been small enough that companies are prepared to chance it. But now investors and fund managers are taking an interest. Even without a breach, they’re evaluating your cybersecurity. And if they don’t like it, they can hit your company where it hurts: your share prices.
  • The changing nature of the crown jewels: is today’s obsession with data and breaches the right way to think about businesses’ cyber dependencies? What are the real weak links and how to protect them?
  • Building a best practice cybersecurity team: how, how much and who?
  • How must CISOs adapt to a new environment of scrutiny? As cyber becomes part of corporate governance and social responsibility, what does this mean for the role?
  • The UK’s first cybersecurity class-action suits are coming, and more will follow as the use of NDAs to hide breaches becomes unacceptable. What happens when the true scale of cyber failure becomes clear to customers, citizens and employees?
  • Cybersecurity as a competitive advantage: the myth that businesses are in this together will be exposed. Over time, companies with secure apps will beat those with insecure apps. Companies with better reputation for security will beat those with a worse reputation. Management knows this and will respond. What does this mean for the CISO?


So is it time to tear up the cybersecurity rulebook? This edition of the e-Crime and Cybersecurity Congress will look at the unspoken truths of cybersecurity, the things we all know and say in private, but which must be confronted if the industry is to meet the challenges of this new era. And of course we will also be looking at the latest technologies and third-party solutions on the market to help you improve your security posture.

Join us on March 5th and 6th 2019.

 

  • Cybersecurity: a core risk management discipline

    • Prove your cybersecurity wish-list is appropriate to the business
    • Making cyber part of existing operational risk processes
    • Getting buy-in from the CFO 
  • Improving lives through smart communities and cities

    • Building secure technology and communications infrastructure
    • The public sector: the core connector and protector of the IoT
    • Developing strategy and oversight of hyperconnectivity
  • Innovation and security: allies or enemies?

    • What can emerging technologies such as artificial intelligence do to help security initiatives - and what new challenges do they introduce?
    • Getting past the hype around new solutions - asking the right questions to get the information you need
    • What is the government's role in driving innovation, in regards to solutions such as AI, automation and blockchain?
  • Third-party security: the weakest link?

    • A breach via a compromised third-party will still be thought of as your failing. Can you vet them all?
    • Third-party security as a governance issue. How do you secure your supply chain?
    • Security questionnaires are not a sustainable long-term solution to the problem. What is?
  • Prepare for transparency now

    • Stakeholders are demanding information today
    • Cybersecurity attitude is untenable from a business perspective
    • Cybersecurity is governance and governance is public
  • Running before you can walk

    • The basics are still letting many organisations down, in the public and private sectors. How do you fix your fundamentals? Do you need to start from scratch?
    • Many cybersecurity teams are still understaffed, and awareness among non-IT employees is seriously low. What's the answer? Can the government help?
    • Is outsourcing the answer? What are the potential benefits, and the risks you need to be aware of?

Who attends

Job titles

Chief Information Security Officer
Chief Information Security Officer
Chief Information Security Officer
Chief Information Security Officer
Chief Information Security Officer
Chief Information Security Officer
CISO
CISO
CISO
CISO
CISO, Head of Digital Security & Risk
CISO, Head of Information Security
Director , Technical Investigations
Global IS Manager
Chief of Cybercrime Section
Head of Technical Support
Director Enterprise Technology
Head of Group I.T.
Chief Risk Officer
Head of Cybercrime Unit
Global Head of IT Security
CIO
Head of Cybercrime Investigations
Head of Information Security
Head of Information Security
Director Global Investigations
Group I.T. Security Officer
Head of Risk & Resilience
Head of I.T. Security Operations
Director
Group I.T. Audit Manager
Head of Information Security
Group CISO
Global Head of Fraud Investigations
Head of Information Security
Group Infrastructure Manager
Head of I.T.
Global Head of Cyber Intelligence
Head of Payment & Financial Crime
Head of Internal Audit
Head of Fraud Oversight
Group Finance & Compliance Director
Head of Business Risk
Head of Operational Risk Management
Group Data Security Manager
Global Security Manager
Head of I.T. Security
Head of Customer Security
Chief Information Officer
Director of Security
Head of Payments
Head of I.T. Security
Head of Cyber & Investigations
Head of Information Security
Head of Penetration Testing
Global Manager, Service Continuity
Global Head I.T. Governance
Director, Information Security
Chief, Cyber Crimes
Head of Investigations
Chief Executive
Group I.S. Manager
Head of Information Security Risk
Head of Global I.T. Security
Head of Digital Risk
CIO Risk Manager
Head of IT Risk & Control
Director of Risk & Compliance
Head of Emergency Response
Head of Business Controls
Director Of Information Security
Director of Security
Chief Security Officer
Director, Global Security
Global IS Risk Manager
Head of Data Protection
Head of ISAG
Group Fraud Manager
Director
Head of Information Security
Global Security Supervisor
Director Group Risk Management
Global Fraud Risk Controller
Head of I.T. Security
Head of I.T. Security Risk Management
Group Information Security Manager
Head of Informantion Security Risk
Head of Payments & Fraud
Head Cybersecurity Operations
Director Cybercrimes
Global I.T. Security & Compliance
Chief Technology Risk Officer
Head of Specialist Crime
Group IT Security Analyst
Head of Policy & Performance
Head of Internal Audit
Head of Operational Security
Head of Operations & Infrastructure
Head of Cyber Threat Intelligence

Companies

Trafigura
GE Capital
Babcock International Group
Scotia Gas Networks
Telefónica O2
Bank of America Merrill Lynch
ING
Catella Bank
Channel 4
H&M
BP
John Lewis Partnership
Royal Canadian Mounted Police
Experian
Jordan Cyber Crime Project
Zamir Telecom
John Wiley & Sons
Halma
Zurich Financial Services
Security Service of Ukraine
HSBC
British Medical Association
Romanian Directorate
TUI Travel
Markit
Western Union
Pennant International Group
TSL Education
Liverpool Victoria
The Finance Practice
Camelot Group
Capital One
Noble Group
HSBC
Dixons Carphone
Halma
Ghana International Bank
British American Tobacco
First Rate Exchange Services
Unum Provident
Santander
Rexam
Matalan
John Lewis Partnership
Home Retail Group
Allen & Overy LLP
ITV
Virgin Money
Spamhaus
Rank Group
EveryMatrix
Shop Direct
Sky
QVC
Lloyds Banking Group
General Motors Corporation
Tullett Prebon
Atcore Technology
Department of Homeland Security
Aviva
CIFAS
Premier Oil
HSBC
Rothschild
HSBC
Liverpool Victoria
Permanent TSB
Auto Trader
Public Health England
Selfridges
NBC Universal
Office of Civil Nuclear Security
UBM
Citigroup
SABMiller
Legal & General
Post Office
JD Sports
CERT-UK
Eurostar
Mayer Brown LLP
Swiss Re
UBS
Open University
The Bank of Tokyo - Mitsubishi UFJ
Dixons Carphone
Post Office
JustGiving
Bank of America Merrill Lynch
FIA Pakistan
Norgren
GE Capital
City of London Police
Unipart Group
Heathrow
Inmarsat
Modern Times Group
Ocado
Capital One

Industries

Banking
Industrial Engineering
Industrial Engineering
Oil/Gas
Telecommunications
Banking
Banking
Banking
Media
Retail
Oil/Gas
Retail
National Law Enforcement
Banking
National Law Enforcement
Telecommunications
Retail
Electronic/Electrical Equipment
Insurance
Central Government
Banking
Healthcare
National Law Enforcement
Travel/Leisure/Hospitality
Media
Banking
Aerospace/Defence
Media
Insurance
Banking
Casinos/Gaming
Banking
Mining/Metals
Banking
Retail
Electronic/Electrical Equipment
Banking
Food/Beverage/Tobacco
Banking
Insurance
Banking
Household/Personal Products
Retail
Retail
Retail
Legal
Media
Banking
Charity
Casinos/Gaming
Software
Retail
Media
Retail
Banking
Automobiles/Parts
Banking
Banking
Central Government
Insurance
Central Government
Oil/Gas
Banking
Banking
Banking
Insurance
Banking
Media
Central Government
Retail
Media
Central Government
Healthcare Services
Banking
Food/Beverage/Tobacco
Insurance
Transportation/Shipping
Retail
National CERT
Transportation/Shipping
Legal
Insurance
Banking
Education
Banking
Retail
Transportation/Shipping
Charity
Banking
National Law Enforcement
Industrial Engineering
Industrial Engineering
Regional Law Enforcement
Transportation/Shipping
Transportation/Shipping
Telecommunications
Media
Transportation/Shipping
Banking


Venue

Park Plaza Victoria, London

vpp

Location:
Park Plaza Victoria
239 Vauxhall Bridge Road, London, UK, SW1V 1EQ
Telephone: 0844 415 6752
 

Directions:
Please click here