08.00 - 08.50

Breakfast networking and registration 

08.50 - 09.00

Chairman's welcome 

09.00 - 09.20

► The dark underbelly of AML and Fraud

Sally Webmark-Taylor, Head of Financial Crime Risk Name Screening, Aviva and Ryan Adams, Head of Financial Crime Intelligence, Aviva 

  • Insurance Fraud – beyond Crash for Cash
  • Using Insurance companies for Financial Crime and Money Laundering
  • What are Aviva doing to combat Financial Crime?
09.20 - 09.40

►The new wave of AI/ML cyber attacks

Ashraf Aboukass, Global Head of Information Security Architecture, Schroders

  • What can emerging technologies such as artificial intelligence do to help security initiatives - and what new challenges do they introduce?
  • Developing strategy and oversight of hyperconnectivity
  • How are the cyber-criminals using ML and AI techniques. What do information security leaders need to know to stay ahead of the game?
09.40 - 10.00

► A Privacy Playbook for "Reasonable and Appropriate" Security Measures and Safeguards

Dave Horton, Solutions Engineering Manager EMEA, OneTrust

  • Understand the requirements and importance of implementing "reasonable and appropriate" security measures and safeguards for privacy professionals
  • Outline several areas of common ground that should help every organization align their security and privacy operations
  • Take away a playbook for building a harmonized and risk-based security framework
10.00 - 10.20

►Transforming your defences

Tim Freestone, Principal Solutions Architect, Deep Secure

  • Appreciate the types of detection based defences
  • Understand the limitations of detection and why a new approach is needed
  • Discover transformation and how it can be used to move beyond detection
10.20 - 11.00

► Education Seminar Session 1

Delegates will be able to choose from a range of topics:

  • Innovation at Santander: Using Hackers to Beat Hackers, Justin Shaw-Gray, Account Director, Synack Inc. & Dave Sheridan, Global Chief Information Security Officer, Santander
  • Multi-phased attacks: the 1-2 punch that can knock your business cold, Thomas Briend, Pre-Sales Engineer, Vade Secure
  • Threat Intelligence Applied, Danny Pickens, Director of Threat Research, Fidelis Cybersecurity
  • Presentation by Illumio 
  • Presentation by Crowdstrike 
  • Presentation by ThreatMetrix
  • Presentation by Blue Cube Security 
11.00 - 11.30

Networking and refreshments 

11.30 - 11.50

► Cyber-economics: information security metrics and incentives 

Martin Sivorn, Head of Cyber Security, Government Digital Service

  • Why information security needs metrics
  • The use of data to inform decisions and measure progress 
  • Case study: security risk scores. A way of simplifying security risk into a numerical index that helped people understand the impact of new issues or mitigations
  • The financialisation of cyber: incentives for security standards 
11.50 - 12.10

► Security ≠ Friction

Sean Bennett, Strategic Account Director, EMEA & Jamie Lockhart, Sr. Solutions Engineer, Shape Security

Understand and defeat automated bot attacks whilst improving real user experience

  • How have automated attacks evolved to defeat traditional security measures?
  • Critical Business Impacts - what does this mean for you?
  • Neutralising the Threat: learn how to detect and mitigate even the most advanced automated attacks.
12.10 - 12.30

► Not becoming the next Cybersecurity headline is difficult, very difficult!

Charl van der Walt, Chief Security Strategy Officer, SecureData

  • The only certainty in Cybersecurity is that high profile compromises will continue to dominate the headlines. This leaves boards with the question: How do we prevent ourselves becoming the next headline?
  • Most companies know that they need to implement a threat detection program to get in front of the cyber challenge. Getting it right is hard, very hard
  • This talk looks at the overall threat landscape and provides a recipe for designing a threat detection program whether you decide to outsource or do it yourself
  • Key takeaways from this talk include understanding the building blocks and processes required to make sure you stand a chance of not becoming the next headline
12.30 - 12.50

► Device centric security strategies for the modern work place

Suzan Sakarya, Sales Director, UK&I, Wandera

  • Mobile devices generate more corporate traffic than a traditional laptop or PC and traditional security investments such as SWG and EPP are no longer enough.
  • Many enterprise are looking to unify their mobile and traditional devices under one Unified Endpoint Management (UEM strategy).
  • This is the perfect opportunity for companies to rethink their workspace security strategy and benefit from device-centric technologies such as MTD, CASB and Mobile SWG that are better suited to mobile deployment models. 
  • In this session, Wandera will share best practices to help you design a device-centric security strategy for the modern workplace.
12.50 - 13.30

► Education Seminar 2:

Delegates will be able to choose from a range of topics:

  • Avoid the cyber risk blind spots in your supply chain, Nuno Silva, Consulting Engineer, BitSight
  • Understanding the Criminal Mind: How Western European BEC Syndicates Leverage Business Intelligence, James Linton, Lead Researcher, Agari
  • Harnessing UEBA and Machine Learning Technologies to Protect Enterprises from Insider Threats, Neill Cooper, Sales Director, Fortinet
  • The Digital Risk Dilemma: How to Protect What You Don’t Control, Michael Owen, Head of Systems Engineering UK&I, IntSights
  • Presentation by Netacea
  • Presentation by Checkpoint
13.30 - 14.30

Lunch and networking 

14.30 - 14.50

► Executive panel discussion 

Cloud: not such a fluffy concept. Key threats and costs of business efficient Cloud security 

  • Neil King, Business Information Security and Risk specialist, Canon
  • Peter Purwin, Director of Global Security Operations, Virgin Media 
  • Chris Procter, Group Data Protection Officer, Whitbread
14.50 - 15.10

► Determining the Important Incidents

Ollie Sheridan, CISSP, Principal Engineer, Security (EMEA), Gigamon

  • The industry is overwhelmed with security incidents and, with ever more alerts and limited expertise and budget, where do you start?
  • Ollie will take you through his customer experiences and how to resolve this
  • Discuss how, by stop doing perimeter security, you can start doing pervasive security
  • How you can stop buying security tools and start managing security tool lifecycles
15.10 - 15.30

► Changing old thinking about operational technology to manage new risks

David Gray, Senior Manager & Practice Lead, NTT Security

  • How are organisations establishing and assessing the internet of risk within their operational technology landscape?
  • What impact can the right threat intelligence make to detect and disrupt OT attacks?
  • Why forensic analysis really matters for long term OT resilience
15.30 - 16.10

► Education Seminar 3:

Delegates will be able to choose from a range of topics:

  • One of cybersecurity’s best kept secrets for eliminating network threats, Simon Edwards, Solutions Architect, Nominet
  • Unleash the Hunters, Harry McLaren, Managing Consultant, ECS Security
  • Move your online investigations forward with Paliscope, Klas Waldenfors, Co-Founder and Marketing Manager and Lovisa Högberg, Head of Business Development, Paliscope
  • Presentation by Demisto
  • Presentation by Kenna Security 
16.10 - 16.30

Networking and refreshments

16.30 - 16.50

► Beyond the basics: emerging cyber risks in the age of digital transformation

Ken Ducatel, Director, DG DIGIT, European Commission

While the vast majority of attacks can, and must, still be countered by tradition techniques (rapid patching, searching for indicators of compromise and blocking known malicious vectors), organisations are facing a rapid evolution of cyber risks associated to both an enlargement of the attack surface and a fast changing threat landscape. Digital transformation brings with it new risks due to the greater porosity of the organisation’s digital footprint: cloud, mobile, social media, big data and AI are all providing new ways for avenues for attack. At the same time attackers are become harder to detect. Increasingly, attacks are encrypted (and so hard to stop at the perimeter) or exploit embedded features of information systems such as macros or PowerShell commands. In addition, there are increased concerns that very sophisticated attackers are able to weaponise patches and or supply chain weaknesses. This session will talk meeting about the challenges of digital transformation with specific reference to protecting an environment that is moving into cloud and which is increasing its use of big data and artificial intelligence.

16.50 - 17.10

► Executive panel discussion

The peaks and pitfalls of impending AI and automation

  • Mark Jones, CISO, Allen & Overy (Chairman)
  • Tarun Samtani, Group Data Protection Officer, Boden Group
  • Khadir Fayaz, VP, Security Architecture and Engineering, Pearson
17.10 - 17.30

►The changing nature of your crown jewels: what are your real vulnerabilities and how do you protect them?

Mohsin Choudhury, UK Head of Information Security, Bank of Ireland

  • The changing nature of the crown jewels: is today’s obsession with data and breaches the right way to think about businesses’ cyber dependencies? What are the real weak links and how to protect them?
  • The relationship between fraud teams and cyber security teams
  • Recent Breaches
  • Recommendations
17.30 - 18.30

Networking and drinks reception

08.00 - 08.50

Breakfast networking and registration 

08.50 - 09.00

Chairman's welcome 

09.00 - 09.20

► Prevent activity in cybercrime: a different approach

Tony Adams, Head of Forensics, Digital Investigations and Prevent, NCA

  • Cybercrime as a service: lowering the barrier to entry 
  • Cybercrime criminal pathways 
  • Positive diversions: Industry opportunities
09.20 - 09.40

Presentation by Crowdstrike

09.40 - 10.00

► Understanding the Methods of Intelligence

Danny Pickens, Director of Threat Research, Fidelis Cybersecurity

  • Define Threat Intelligence
  • Make it consumable through Requirements
  • Acting on received intelligence
10.00 - 10.20

► Cyber gameplay: Strategic vs. Tactical thinking

Ian Thornton-Trump, Head of Cyber Security at AMTrust International 

  • Securing hyper-connectivity. If you are just joining the hyper-connectivity race you are doomed to failure
  • 5 key areas to focus on when it comes to Cloud security
  • The CFO as the most important stakeholder. Cyber as a business enabler
  • The politics of cybersecurity
10.20 - 11.00

►Education Seminar 4:

Delegates will be able to choose from a range of topics:

  • Cloud Security – It’s Not Black and White, Nigel Hawthorn, EMEA Marketing Director, McAfee
  • Presentation by Active Reach 
  • Presentation by Digital Shadows
  • Presentation by Intel471
  • Presentation by Garrison
11.00 - 11.30

Networking and refreshments 

11.30 - 11.50

 Executive panel discussion 

The good governance of cyber: investors' truths on how they're rating the cybersecurity of your organisation

  • Robert Walker, Managing Director & Head of EMEA Asset Stewardship Global Advisors
  • Lloyd McAllistair, Responsible Investment Analyst, Newton Investment Management 
  • Vineet Chhibeer, Executive Director, ESG, JP Morgan Asset Management 


11.50 - 12.10

► Transforming Cybersecurity Risk Management, Monitoring & Reporting 

Ewen O’Brien, VP EMEA Sales, BitSight 

  • Prioritization, justification and validation of IT security investments to underpin business digital transformation 
  • Managing third and fourth party risk in today’s hyper-connected environment 
  • Supporting audit and compliance tracking including GDPR.
12.10 - 12.30

Presentation by Netacea

12.30 - 12.50

Presentation by Ilumio

12.50 - 13.30

► Education Seminar 5:

Delegates will be able to choose from a range of topics:

  • Device centric security strategies for the modern work place, Suzan Sakarya, Sales Director, UK&I, Wandera
  • Detection is dead, Aaron Mulgrew, Pre-Sales Consultant, Deep Secure
  • How to streamline your Security Operations & Incident Response and gain visibility into encrypted traffic, Ollie Sheridan, CISSP, Principal Engineer, Security (EMEA), Gigamon
  • Navigating the Automated Threat Landscape: Be sure you’re protected from bot attacks, Sean Bennett, Strategic Account Director, EMEA & Jamie Lockhart, Sr. Solutions Engineer, Shape Security
  • Presentation by One Trust 
13.30 - 14.30

Lunch and Networking 

14.30 - 14.50

► Bridging the business gap: uncovering cybersecurity as a corporate risk 

Pete Shorney, Global Head of Information Security, Rentokil

  • Cyber security is no longer just a technology issue its is a business one too
  • CISO’s must communicate  cyber-risk as corporate risk in order to get buy in from the board
  • How does a CISO bridge the gap and partner with the business to build an effective risk management programme?
14.50 - 15.10

Presentation by Cybel Angel

15.10 - 15.30

Presentation by Bluecube 

15.30 - 15.50

Networking and refreshments 

15.50 - 16.10

► Executive panel discussion 

What's happening to your business? Cloud security, new business metrics and future risks and priorities for 2019 and beyond 

  • Dave Whitelegg, Group Cyber Intelligence and Risk Officer, Capita
  • Eddy Donald, former Global Chief Digital Risk Officer, VMLY&R
  • Tony Gaskin, Head of Information Security and Audit, Paragon Customer Communications 
16.10 - 16.30

► Real-world stuff. International truths on cyber CNI

Patrick Boismenu, Head of Cyber-programme, UN Office of Drugs and Crime

  • Real world examples. Not strategies and methodologies
  • The real issues with legislation, retaining data and digital forensics
  • What are the criminals using?
  • Cryptocurrency and real world criminality
16.30 - 16.50

►Moving past cybersecurity training and awareness as a tickbox exercise

Reena Shah, Head of Information Security of Culture and Awareness, M&G Prudential 

  • Moving past cybersecurity training and awareness as a tickbox exercise. Can senior management use training as a way of ticking a box rather than actually investing in the much more expensive and difficult process of truly managing cyber security? How do you evolve security culture past this so it is a critical part of business infrastructure?
  • How to engage board members and get investment. Get the metrics and prove the ROI of security awareness and training
  • Case study from one of the largest teams and budgets dedicated to information security training
16.50 - 17.00

Closing remarks 

Education seminars

Agari - Understanding the Criminal Mind: How Western European BEC Syndicates Leverage Business Intelligence

James Linton, Lead Researcher, Agari

Please join James Linton, Lead Research Intelligence at Agari as he exposes the inner workings of a sophisticated, UK-based cybercriminal organisation. Learn the tactics of this group, how they leveraged business intelligence to iprofile their targets on which they launched their Business Emails Compromise attacks.

This session will shed light on:

  • The inner-working of BEC criminal groups
  • What responsible active defence techniques can we use to identify and disrupt cybercriminal organisations
  • How can we combat a cybercriminal that operates like a modern corporation?

BitSight - Avoid the cyber risk blind spots in your supply chain

Nuno Silva, Consulting Engineer, BitSight

Participants will see a live view into the BitSight Portal. We will demonstrate how continuous cyber risk monitoring works for your company and the affiliates, your suppliers and peers.

What will attendees learn:

  • Insight into the riskiest issues impacting your vendors
  • Confidence to make faster, more strategic decisions on cyber risk management
  • Launching and scaling up your TPRM with the resources you have today

Deep Secure - Detection is dead

Aaron Mulgrew, Pre-Sales Consultant, Deep Secure

  • Attackers have evolved to using continually changing automated attacks against financial services and critical national infrastructure.
  • Current defences, including detection-based technologies’ mantra of ‘detect and respond’ isn’t enough to cope with the sophisticated tools that the modern hacker has access to.
  • How to evade detection. Demonstrating how to evade detection in practice with real-world malware samples.
  • How to cope with the document based threat. What you can do about the document based threat to your organisation.

ECS Security - Unleash the Hunters

Harry McLaren, Managing Consultant, ECS Security

Reduce the burden on your valuable security analysts and maximise the use of their time by re-evaluating the objectives, priorities and processes of your security operations centre.

Ensure your analysts have the tools and resources they need to hunt effectively and enable them to protect your organisation by looking for and identifying real and present threats to deliver more effective risk management.

Traditional approaches to threat detection have proven to be ineffective; often producing low-value incidents and analyst fatigue through high ratios of false positives. Modern threat hunting and risk reduction should be well planned, structured and orchestrated to make best use of the technologies and people that exist within your organisation.

This session will give you an insight into how we approach threat hunting with a focus on effective planning, use of technology and analyst empowerment.

Unleash the hunters!

You will learn:

  • Threat hunting best practice recommendations.  
  • How to empower your SOC to find unknown threats. 
  • How to support hunters via agile platforms. 
  • How to mitigate the risk of rapid change to your SIEM.

Gigamon - How to streamline your Security Operations & Incident Response and gain visibility into encrypted traffic

Ollie Sheridan, CISSP, Principal Engineer, Security (EMEA), Gigamon

Learn how you can streamline your Security Operations Centre team and provide swifter responses to Security Incidents by having actionable data for each event available to your Security Teams as events unfold. In this session we also discuss how to gain visibility into encrypted traffic coming into and leaving your environment, thereby mitigating data exfiltration and APT threats from and to your organisation.

You will learn: 

  • How to provide visibility into encrypted traffic
  • How to leverage the knowledge and expertise of seasoned Security Professionals to immediately improve your Security Posture
  • How to increase the reach of your tools and increase the life and effectiveness of your Security Countermeasures
  • How to spot the tell-tale signs of stolen credentials being used for nefarious purposes

Fidelis Cybersecurity - Threat Intelligence Applied

Danny Pickens, Director of Threat Research, Fidelis Cybersecurity

The use of intelligence continues to mature within Cyber Security. Adopting a proven model will assist in making intelligence applicable at every organization. This seminar will cover how intelligence can be adopted and consumed beyond typical indicators of compromise feed ingestion to mature an organizations capability and lead to applying intelligence through a decision making process.

What attendees will learn:

  • A basic understanding of the Threat Intelligence Lifecycle
  • How to Apply Threat Intelligence to different real-world examples
  • Integrating Threat Intelligence in a Threat Model framework
  • Open Source resources that can be used to study and mature an understanding of applied Threat Intelligence

IntSights - The Digital Risk Dilemma: How to Protect What You Don’t Control

Michael Owen, Head of Systems Engineering UK&I, IntSights

More of your attack surface resides on web infrastructure you don’t own or control. To protect your digital assets and prevent malicious lookalikes on everything from social networks to criminal marketplaces, you must shift security priorities from prevention to detection and remediation. This session will outline tools, tactics and best practices to safeguard your entire digital footprint.

  • Monitor the clear, deep and dark web for your organizations digital assets 
  • Gain visibility and take action when malicious brand lookalikes pop-up
  • Discover and mitigate phishing attacks targeting your executives and customers

Nominet - DNS: One of cybersecurity’s best kept secrets for eliminating network threats

Simon Edwards, Solutions Architect, Nominet

The growth of cyber threats and growth of data are fast creating significant problems for businesses. There’s too much information and not enough action, as stretched resources try to keep networks secure, while coping with the demands of digital transformation and regulatory compliance.

It’s not just the known threats you need to worry about; some of the biggest headaches come from trying to stay ahead of criminal developers. Whilst there are many solutions available as part of the security stack, the value of DNS as a critical source of information to check for threats and monitor the health of a network is often overlooked. Learn why understanding your DNS traffic is vital to your security visibility and how advanced techniques can be applied to predict, detect & block threats before they harm your network.

What attendees will learn:

  • The overload facing IS/IT professionals.
  • How and why DNS is such vital part of networks and the internet and an often-exploited mechanism.
  • Applying advanced analytic techniques to DNS traffic can turn it into an advantage - predicting, detecting and blocking threats - known and unknown.
  • How this analysis is highly complementary to existing tools and can be used to enrich SIEM information, cutting the window of compromise and contributing to reducing the compliance workload.
  • How proactive monitoring can help contextualise a network so that anomalous behaviour acts as an early indicator of threats.

OneTrust - Risky Business: A Privacy & Security Team’s Guide to Risk Scoring

Thomas Hallett, Privacy Solutions Engineer, OneTrust

Risk scoring across vendor management, breach notifications, DPIAs and other activities is imperative for compliance with many global privacy laws and security frameworks. Organizations routinely tailor their data protection and security activities based on the results of detailed risk assessments, but this leads to a myriad of questions. How do you calculate risk? What constitutes low, medium or high risk? How do you define a risk criteria? What’s the difference between inherent, current and residual risk? In this session, we’ll detail the importance of conducting risk assessments under global privacy laws like the GDPR and security frameworks such as ISO 27001, provide scenario-based approaches to risk assessment and give examples on how to tailor your approaches based on risk level.   

  • Understand various approaches to conducting risk assessments
  • Learn how to define a risk criteria and how to calculate risk level
  • Learn how to tailor your privacy and security programs using a risk-based approach

Paliscope - Move your online investigations forward with Paliscope

Klas Waldenfors, Co-Founder and Marketing Manager and Lovisa Högberg, Head of Business Development, Paliscope

Today, people share more information online than ever before. This is something that we can make use of when conducting an online investigation. With Paliscope, investigators can quickly and easily collect open source data for review and analysis, sort and prioritize among the collected data, connect correlating intelligence to find more clues, and create professional reports to share the results with other parties.

Used by law enforcement agencies, insurance companies and the finance sector, Paliscope helps investigators to tackle all sorts of cases online. No matter if it is a case of investigating an insurance fraud, doing background checks in a recruitment process or monitoring cyber threats – you can always be helped by searching the internet for information about a subjects online presence and digital footprints.

What attendees will learn:

  • How to start an investigation from scratch; developing a small piece of information into a full case of intelligence.
  • How to gather online information in a structured and secure way, verifying how and where the data was collected to be able to prove its validity.
  • How Paliscope together with integrated online services can be used to search for more clues online.
  • How to generate professional reports and can keep third parties informed along the investigation process.

Shape Security - Navigating the Automated Threat Landscape: Be sure you’re protected from bot attacks

Sean Bennett, Strategic Account Director, EMEA & Jamie Lockhart, Sr. Solutions Engineer, Shape Security

Security is no longer just about inadvertent vulnerabilities. Attackers are abusing application functionality to conduct automated and manual fraud. These fraudsters will continue to evolve for as long as they are able to extract value from your application.

  • Recognise the evolution of automated threats.
  • Understand how automated attacks affect different verticals, including gaming, finance and retail.
  • Discuss critical business impacts.
  • Neutralising the Threat: Evaluate advanced detection and mitigation methods.

Synack - Innovation at Santander: Using Hackers to Beat Hackers

Justin Shaw-Gray, Account Director, Synack Inc. & Dave Sheridan, Global Chief Information Security Officer, Santander

There are big dilemmas in today’s complex cybersecurity world. Year on year increases in cyber-attacks, an increase in the sophistication of these attacks, a widening cybersecurity talent gap - not to mention IT security budgets that haven’t kept up with growing demands. And these are just some of difficulties companies face today. In this session, Synack's Justin Shaw-Gray will host an open conversation with Dave Sheridan, Global Chief Information Security Officer for Santander Corporate & Investment Banking. Justin and Dave will discuss an innovative crowdsourced security model deployed at Santander and how Santander has ultimately made the bank a safer place for their customers. 

Attendees will learn how Santander: 

  • Utilised an army of ethical hackers to harden corporate assets.
  • Transformed and simplified security operations.
  • Reduced the costs of legacy testing programs.
  • And quickly deployed safer applications.

Vade Secure - Multi-phased attacks: the 1-2 punch that can knock your business cold

Thomas Briend, Pre-Sales Engineer, Vade Secure

Heading into 2019, the volume—and sophistication—of email threats is growing. Phishing is virtually indistinguishable from legitimate brand communications, spear phishing is hyper-personalized using publicly available data, and insider attacks are surging due to the popularity of cloud email services. But the biggest danger of all is when cybercriminals combine these vectors in multi-phased attacks.

Gain insight into how multi-phased attacks are designed and how your business can prevent being knocked cold by one. We’ll use data and real-world examples to highlight the massive growth in Office 365 phishing, and show you how cybercriminals use compromised accounts to launch spear phishing, malware, and insider attacks. The goal is never the credentials themselves but rather a financial payout in the form of wire transfers, ransoms, or access to proprietary information.

Gain insight into:

  • How cybercriminals execute coordinated, multi-phased attacks
  • Why Office 365 is the most targeted entry point
  • How data breaches are jet fuel for targeted email attacks

Wandera - The anatomy of a multi-layered mobile attack

Suzan Sakarya, Sales Director, UK&I, Wandera

Gartner predicts that 1/3 of all malware will be on mobile by 2019.  Yet traditional security methods aren’t up to the task of protecting your mobile fleet and hackers are often three steps ahead.  As mobile threats look to target the user themselves with SMS phishing attacks or hotspot spoofing, it is imperative that IT teams understand what the attackers are trying to accomplish so the appropriate defense can be mounted.

In this talk, we will deconstruct a mobile attack to demonstrate how cybercriminals are gaining a foothold on modern mobile devices.

  • Explore the top mobile threats that compromise your company data
  • Discover why zero-day protection is the only way to target this new breed of cyber threats
  • Delve into the motivations behind attackers and the techniques being used to trick your employees
  • Experience a live hack and how this can be tailored to verticals for maximum impact

ZoneFox - Harnessing UEBA and Machine Learning Technologies to Protect Enterprises from Insider Threats

Neill Cooper, Sales Director, Fortinet

Cybersecurity trends come and go, but machine learning looks to be here to stay. According to McAfee, 43% of of data breaches in recent years were caused by employees, contractors or suppliers, either negligently or maliciously. How can we harness UEBA and machine learning technologies to protect against the insider threat?

What attendees will learn:

  • What the insider threat looks like in 2019
  • Where UEBA and machine learning fit into the cybersecurity landscape
  • Getting started with UEBA technology – the challenges and considerations
  • What it means for the security team