|08:00 - 08:55||
Login and networking
|08:55 - 09:00||
|09:00 - 09:20||
► Alienated from the mothership: reorienting a business and human focussed security policy in an alien landscape.
Nick Truman, CSO, JATO Dynamics
|09:20 - 09:40||
► Reducing time to containment: THE security priority
Jan Tietze, Director Security Strategy EMEA, SentinelOne
With limited resources, an ever-growing skills gap and an escalating volume of security alerts, organisations are left vulnerable to what is perceived to be unavoidable risk.
This environment is demanding more of already resource-constrained CISOs. In this keynote we will be discussing how automation can help to:
|09:40 - 10:00||
► UPM: Empowering a remote workforce and improving your security posture with Universal Privilege Management
Karl Lankford, Director Solutions Engineering, BeyondTrust
|10:00 - 10:20||
►Resilience, Risk and Innovation in the Financial Services
It is no secret that when it comes to the maturity of security frameworks, the financial services lead the way. Heavy regulation, plentiful resources and technological maturity drive large financial institutions towards investment in tooling and staff to prevent incidents and ward off the cybercriminals who are attracted by the large amount of cash at stake. However, like all other organisations there have been paradigm shifts for security practitioners in the financial services as a result of C19 and the subsequent overdrive towards digitisation. Cyber security has been proven to be central to operational resilience, but does this mean that all digitised functions in the financial services are safe?
|10:20 - 10:50||
► Education Seminars Session 1
Delegates will be able to choose from the following education seminars:
|10:50 - 11:20||
|11:20 - 11:50||
► Updating Security Culture and Governance in the Era of Remote Work
The human element of cyber-risk has always been a major bugbear for CISOs. With workforces spread out and dispersed, how can controls be put in place to raise security awareness in a moment characterised by uncertainty and a high volume of cybercrime. Furthermore, how can the corporate governance model by dynamically adapted to the domestic workspace, and how can issues such as hardware, communication and strategy be effectively addressed.
|11:50 - 12:10||
► Hacking Exposed: Tales from the front line
Ronald Pool, Senior Solutions Engineer, CrowdStrike
|12:10 - 12:30||
► Navigating a New Normal: People are your most attacked asset and your most likely source of data loss - learn how to measure and reduce your people-based risk?
Richard Davis, International Cyber Security Strategist, Proofpoint
|12:30 - 12:50||
► Zero Trust Principles with Internet Isolation
Tom McVey, Solutions Architect, Menlo Security
|12:50 - 13:20||
► Education Seminars Session 2
Delegates will be able to choose from the following education seminars:
|13:20 - 14:10||
Lunch and Networking Break
|14:10 - 14:40||
► Prevention, not prosecution: beating organised crime at its own game
Fireside Chat with Gary Miles, Detective Superintendent, Head of Economic Crime, Metropolitan Police Force
|14:40 - 15:00||
►Faking It: Combatting Email Impersonation with AI
Mariana Pereira, Director of Email Security Products, Darktrace
|15:00 - 15:20||
► Welcome to the Future of Cybersecurity Training!
Rupert Collier, Director of Sales – EMEA and APAC , RangeForce
|15:20 - 15:50||
► Education Seminars Session 3
Delegates will be able to choose from the following education seminars:
|15:50 - 16:20||
|16:20 - 16:40||
►Threat Prevention, Detection and Response in the Transformed Enterprise
The world has changed for business leaders and security practitioners. CISOs have had to deal with a large volume of attacks across a year characterised by uncertainty, and address issues from afar. But to what extent have the nature of threats changed? Sophisticated ransomware strains break headlines while spear phishing campaigns have increased in volume. Vulnerabilities must be addressed, and it is important for security leaders to pool together insights concerning the common threat landscape.
|16:40 - 17:00||
►Cybersecurity in the Age of Disorder
Simon Brady, Managing Editor, AKJ Associates Ltd
Pandemic, digitalisation, climate change, the collapse of Chimerica, Brexit – the list goes on. In all this chaos, cybersecurity, like everything else, has to change. But how? In this session, AKJ’s Managing Editor, Simon Brady, gives his take on where CISOs should be looking in 2021.
|17:00 - 17:30||
Next Generation Defence: Using Hackers to Beat Hackers
Justin Shaw-Gray, Account Director, Synack Inc. & Mark Walmsley, CISO, Freshfields Bruckhaus Deringer
There are many dilemmas in today’s complex cybersecurity world. Year on year increases in cyber-attacks, an increase in the sophistication of these attacks, a widening cybersecurity talent gap - not to mention IT security budgets that haven’t kept up with growing demands. In this session, Synack's Justin Shaw-Gray will host an open conversation with Mark Walmsley, CISO, Freshfields Bruckhaus Deringer LLP. Justin and Mark will discuss Synack’s innovative crowdsourced security model and how Freshfields has ultimately made their platform a more secure place.
Attendees will learn how Freshfields Bruckhaus Deringer LLP:
- Is using an army of ethical hackers to harden corporate assets.
- Has transformed and simplified security operations.
- Reduced the costs of legacy testing programs.
- And is now quickly deploying safer applications.
Calculating ROI for Security: Why This Is So Difficult? Do You Need It?
Ilia Sotnikov Vice President of Product Management, Netwrix Corporation
The ongoing stream of data leaks and other breaches of consumer trust is a top concern for executives at organisations around the world. To make sound decisions about cybersecurity strategy, especially during challenging times like these, when budgets are tight, they need accurate assessments of the effectiveness of proposed security investments. However, providing those estimates of ROI can be extremely difficult for CISOs, who often struggle to quantify the expected impact of security measures.
Join us for this educational session and learn:
- What are the 4 key benefits of a security investment
- How to effectively communicate the value of cybersecurity investment to senior decision makers
- How to convince executives to make data security investments right now
You get what you pay for – Cybercriminal operations in the UK underground economy
Abdelkader Cornelius, Threat Intelligence Analyst, Recorded Future
In our digital age, companies that transact business online find their data targeted by various forms of cyber fraud. These cyber-fraud products and access broker services can be bought and rented freely on the Dark Web with ease. This is fuelling sophisticated payment systems on the underground economy in the UK.
During this session, we will cover:
- Exclusive access to live threat intelligence feeds from the region
- A detailed review of some of the methods being used in the underground economy
- How to use Security Intelligence to defend your organisation
How to adopt your cybersecurity strategy in the fast-changing age of Digital Transformation
Raif Mehmet, AVP EMEA, Bitglass
Given the global pandemic and the sudden shift in how the workforce operates, the CISO community has faced an unprecedented set of challenges and questions. Several months into the transition, new struggles continue to arise, while many of the original ones remain unanswered.
Join Raif Mehmet as he shares best practices from our CISO community and provide recommendations for how to address challenges associated with new age of Digital Transformation
What attendees will learn:
- Addressing and assessing current risks: How to identify which assets are more vulnerable now than they were at the beginning of 2020?
- Optimising Costs: How to justify the spend that is necessary to secure the remote workforce today while preparing for tomorrow’s “new normal”?
- Quantifying ROI. How to balance spending at a time when the business may be contracting?
- Business agility: With resource and budget constraints, how to balance the growing demands on IT from remote work while protecting sensitive data.
Zero Trust in Practice: Why Identity Drives Next-Gen Access
Kevin Butler, CISSP Regional Principal Solutions Engineer, Okta
As organisations move the mobile and cloud-basedWi services, there is a move away from traditional perimeter-focused approaches to security. Instead resources are focused on enabling access for all users (employees, contractors, partners, etc.) regardless of their location, device or network and Zero Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce. As a model with many moving parts, the immediate question is where to start? This discussion will focus on: The full Zero Trust reference architecture and steps to get there, Why Identity is the foundational layer to build contextual access controls from.
- The traditional four walls that protected an organization’s data no longer exist: the rise of mobile and cloud adoption has led to more people, accessing more resources, and from more locations, than ever before.
- In order to enable these mobile and cloud experiences without compromising on security, organizations are moving away from the network perimeter-centric view of security and instead focusing on access – and identity – as the new security control point.
- This means that instead of viewing user security as two separate groups – trusted individuals, able to access everything inside an organization, and untrusted individuals, kept on the outside – organizations now are taking a “Zero Trust” approach that assumes no one is inherently trusted, requiring verification for access.
- This shift requires organizations to focus resources on securely enabling access for all of the various users (employees, partners, contractors, etc.) regardless of their location, device, or network.
How secure are your shared workstations & mobile restricted environments?
Neil Webster, Solutions Engineer, Yubico
Best practices for a secure and efficient user experience
The shared workstation or mobile restricted environment scenario is one that can be found across a variety of industries—from manufacturing to critical infrastructure to financial services to healthcare to retail. In these scenarios, multiple employees may be sharing more than their workstations. They may also be sharing passwords and access to sensitive information or protected data. These environments may also restrict mobile use which nullifies common MFA methods such as SMS, mobile authenticator apps, or mobile push.
Attend this session to learn about:
- The challenges faced in shared device environments
- Common shared device scenarios including shared kiosk, mobile restricted, grab and go, and POS
- Customer case studies to address user experience and enable stronger security
- Modern authentication for modern devices
How security awareness training can protect your hybrid workforce against increasing cyber threats
Theo Zafirakos, CISO Coach and Professional Services, Security Awareness Speaker Terranova Security
Cyber security risks increase when companies adopt work from home practices or a hybrid work model with little time to prepare and inform their users of the associated risks. While some employees may still work from home, others may be back in the office. For many users, this is a completely new work situation. Cybercriminals know that many people are adapting to a new normal, which makes it easy to fool them with email, phone and text messages. Cyber attackers are leveraging new techniques to trick unwary users. In this session, learn why it’s so important to maintain cyber security awareness training and how to mitigate these hybrid workforce-related cyber risks and more specifically:
- What are the cybersecurity risks associated with the human factor when employees work remotely?
- How can users defend themselves and their organization against the increase in cyberattacks?
- Adopting a people-centric approach: how can cybersecurity awareness create a first line of defense?
- How can security awareness leaders create a culture of security with a hybrid work model?
Rethinking & Solving the Patching Problem: A New Approach
Stephen Roostan, VP EMEA Kenna Security & Dan Burns, Head of Cyber Security Operations, Next plc
In the last six months there has been more pressure than ever on IT Security functions to squeeze out as much value as possible from their budgets. In this session Stephen and Dan look at why the area of vulnerability management offers an untapped opportunity to measurably decrease risk and deliver operational cost savings.
- Strategic and tactical benefits of designing a new framework
- Changing the patching mind set across all stakeholders
- Leveraging existing investments with future-proof, flexible tools
- Defining - and achieving - the right success metrics for your business
Identity-Centric Privilege Management for Cloud
Chris Owen, Director of Product Management, Centrify
According to recent research by the Identity-Defined Security Alliance (IDSA), 59% of organizations say that cloud applications are driving a 5X increase in the number of identities over the past 10 years. And, over the past two years, 79% have had an identity-related breach.Digital transformation has massively expanded the threatscape, as modern technologies like cloud, DevOps, containers, microservices and more are creating an explosion in the number of machine identities in the IT estate. Now more than ever, it’s vital to take an identity-centric approach to securing privileged access to resources in on-premises, hybrid, and multi-cloud environments.Join us in this session where we will cover the following:
- How organizations have evolved their use of cloud
- How PAM solutions have transformed to support new methodologies and tooling
- The difference between a vault-centric and identity-centric approach to Privileged Access Management (PAM)
- 6 key challenges organizations face for DevSecOps when it comes to cloud, and how to solve them
A recipe for SOC productivity: tools and process to improve analyst efficacy
Alex Kirk, Global Principal, Suricata, Corelight
Despite spending years building SOCs filled with millions worth of security tooling and SIEMs stuffed with all the data analysts could supposedly ever need, alert fatigue continues to be a serious problem for the majority of enterprise organizations. Time to resolve incidents remains considerably higher than the speed at which new events are pouring in. This talk will investigate why SOCs remain so inefficient in their investigations, and will propose a different method for collecting and operationalizing security data that will both simplify process and dramatically speed investigations.
- Weaknesses of the current SIEM data collection model - operational and structural
- A clear alternative to the existing process that speaks to the specific problems outlined
- Walkthrough of freely available playbooks that make use of this new data paradigm in a SOAR for maximum analyst efficiency
Transform your security strategy with data-driven detection
Benjamin Bell, Senior Security Specialist, Google Cloud Security
Ever feel like your security team is overly reliant on vendor-created threat detection? There are nuances to your environment that often require a more customized approach to identifying potential TTPs. Furthermore, advanced threat actors may use methods, techniques and malware that are custom-made for your organization. The art of detection is evolving as more investments are made into SOC analysts, threat responders, and hunters - and as part of this movement, data driven detection is emerging as the most accurate way to craft enterprise-specific detections.
Attend this session to learn how you can intelligently transform your security strategy by authoring detections, treating them as code, and putting best practices in place to use, store, share and maintain your custom detections.
- Learn how to get started with a custom detection security strategy
- Experience how the custom detection lifecycle provides insight into attacker behaviour
- Understand the core components of authoring detections
- See how you can incorporate security frameworks into your detections
- Learn how a data driven approach to detection writing detections captures lessons learned and sustains institutional knowledge