Agenda
08:00 - 08:50 |
Registration and Breakfast Networking |
08:50 - 09:00 |
Chairman's Welcome |
09:00 - 09:20 |
►Building an adaptive Cybersecurity function Mario Beccia, Deputy CIO for cybersecurity, NATO
|
09:20 - 09:40 |
►Future-Proofing Europe: The Next Era of Cybersecurity? Thomas Zaatman, Director of Strategic Accounts, Tanium
|
09:40 - 10:00 |
►The Complexity Conundrum: Three Steps to Simplifying Security Complexity Elliott Went, Senior Solutions Engineer, UKI, SentinelOne
|
10:00 - 10:20 |
►Fireside chat: Integrating Cybersecurity into Mergers, IPOs, and ESG Strategies Ian Dalby, Global Head of GRC, A&O Shearman
|
10.20 - 11:00 |
► Education Seminar 1 Delegates will be able to choose from the following education seminars:
|
11:00 - 11:30 |
Networking Break |
11:30 - 11:50 |
►Resourcing priorities in Third-Party Risk Management and Supply Chain Security Sarah Lawson, CISO & Deputy CIO, University College London
|
11:50 - 12:10 |
►How To Create Successful Malware and Defend with Zero Trust Seamus Lennon, Vice President of Operations for EMEA, ThreatLocker
|
12:10 - 12:30 |
►Addressing Today’s Biggest Cybersecurity Gap: The Human Risk Factor Glenn Smith, Principal Sales Engineer, Mimecast
|
12:30 - 12:50 |
►Response and Responsibility – this time it’s a thriller, not a romantic comedy.
|
12:50 - 13:30 |
► Education Seminar 2 Delegates will be able to choose from the following education seminars:
|
13:30 - 14:30 |
Lunch Networking Break |
10:00 - 10:20 |
►Can The AI (R)evolution help security leaders to manage complexity?
|
14:50 - 15:10 |
►Security Culture Eats Human Risk for Breakfast Noora Ahmed-Moshe, VP of Strategy and Operations, Hoxhunt
|
15:10 - 15:30 |
►The Correlation Between Dark Web Exposure and Cybersecurity Risk Dave Osler, Head of Product, Searchlight Cyber
|
15:30 - 16:00 |
Networking Break |
16:00 - 16:30 |
►Maximising the value of threat intelligence Parul Khedwal, Security Operations Lead, Trainline
|
16:30 - 16:55 |
►LIVE DEMONSTRATION: Weaponising AI: Voice Phishing with AI (Social Engineering 2.0) Manit Sahib, Ethical Hacker, The Global Fund
|
16:55 - 17:00 |
Chairman's Closing Remarks |
17:00 - 18:00 |
Drinks Reception |
Education seminars
Strengthening Security through Simplification: Micro-Segmentation with a Multi-Layered Defence
Richard Meeus, EMEA Director of Security Technology and Strategy, Akamai
Brett Ayres, VP of Product, Teneo
Attendees will learn:
- Introduction to Micro-Segmentation: Understanding how Akamai Guardicore's micro-segmentation technology reduces complexity by isolating and protecting critical assets within the network, minimising attack surfaces.
- Integration with Multi-Layered Defence: Exploring the role of Guardicore Micro-Segmentation in a comprehensive, simplified cyber defence model, complementing other security layers for enhanced protection.
- Simplifying Policy Management: Demonstrating how Guardicore's centralised policy management streamlines security operations, reducing administrative burden and minimising the risk of misconfigurations.
- Real-World Applications: Case studies showcasing the effectiveness of Guardicore Micro-Segmentation in preventing lateral movement and mitigating the impact of breaches in diverse environments.
- Future-Proofing Cybersecurity: Discussing the scalability and adaptability of the multi-layered defence model with pro-active micro-segmentation in addressing emerging threats, ensuring long-term security with reduced complexity.
Go on the Offensive by Merging AI and Human Expertise for Email Security
Paul Clark, Head of Sales, EMEA, Ironscales
AI-driven technologies like GenAI and deepfakes are creating challenges that IT Security and MSP leaders can’t afford to ignore. The surge in AI-powered attacks means traditional defenses used by most organizations are no longer enough. Attackers are stepping up their game, crafting hyper-realistic, personalized attacks that are nearly indistinguishable from the real thing—and it’s only going to get more intense as these tools evolve.
So, how do we fight back? In this session, we’ll explore how to rethink your approach, using AI to combat AI and keep pace with these threats. We’ll also touch on how a "red team/blue team" strategy can help you stay one step ahead, leveraging AI to anticipate future attacks, arm your defences, and proactively mitigate them.
Attendees will learn:
- How email security has evolved in the last decade
- How AI is transforming traditional email security approaches
- Integrating human insight with AI algorithms
- Leveraging AI to create highly accurate and dynamic phishing simulations
- The benefits of a holistic approach to secure law firms
Hackers don’t Hack in – They Log In. How to Combat the Threat of Identity Compromise
Lee Elliott, Director, Solutions Engineering, BeyondTrust
The world of cyber security is changing, with more dynamic highly connected systems than ever. With an explosion of apps, accounts and access, the battleground has shifted from traditional perimeter and endpoint security into the world of identity security, effectively meaning the hacker has been replaced by the credentials thief. With Identity compromise common to almost every cyber-attack, distinguishing between how a legitimate user is leveraging an identity and the misuse of that identity by an unauthorized user is difficult. This leaves the door open for threat actors to use impersonated identities to access resources, compromise systems, move laterally and achieve their illicit objectives. Today this is effectively making identity the new security perimeter. Join the discussion with Lee as he shares what is driving this paradigm shift, and how attackers are successfully exploiting the gaps in visibility between IAM and security tools.
Attendees will learn:
- How the threat landscape is evolving
- Real world examples of identity breaches
- How attackers are exploiting hidden paths to privilege
- How controlling identities and privileges can be your greatest defence
How Non-Human Identities Create Operational and Cyber Risk for Organisations
Peter Batchelor, UK&I Regional Director, Silverfort
Al Scott, Senior Sales Engineer EMEA, Silverfort
Non-Human Identities (NHIs) pose one of the most significant cyber threats to an organisation as they can pose severe operational risks. In many cases, NHIs have elevated privileges, lack proper oversight, are not documented, and are often not linked to specific individuals. This makes them attractive targets for attackers, who may exploit them to gain unauthorised access, move laterally within systems, and carry out malicious activities without being detected. In our session, Silverfort will examine how organisations can reduce operational risk by understanding and implementing security controls around their Non-Human Identities.
Attendees will learn:
- Understand why Non-Human Identities should be a top priority for your board
- Learn about how to measure and detect the level of risk Non-Human Identities pose for your organisation
- Grow your knowledge of how to mitigate the risk of Non-Human Identities, before, during and after a cyber breach
ITDR that works for you - challenges and how to manage them
Anthony Moillic, Field CISO, Netwrix Corporation
84% of organisations have suffered identity breaches in the past year.
In these attacks, threat actors assume the identity of a legitimate user to compromise systems, move laterally in networks and gain higher levels of access. But these threats are difficult to detect because traditional tools lack the ability to distinguish between a legitimate user and a malicious actor.
Therefore, to protect their sensitive data and mission-critical systems, organisations need a comprehensive Identity Threat Detection and Response (ITDR) approach.
Attendees will learn:
- About the challenges of trying to counter modern attacks and the solutions to help you do so, including Netwrix recent acquisition, PingCastle
Securing Microsoft Copilot: Preventing Prompt-Hacking and Data Exposure
William Priestley, Sales Engineer Manager, Varonis
Microsoft Copilot has been called one of the most powerful productivity tools on the planet, taking drudgery out of daily work. But Copilot is a different beast than ChatGPT and other AI tools because it has access to everything you’ve ever worked on in Microsoft 365, and therein lies the hidden risks for information security teams.
Attendees will learn:
- We’ll show you just how easily your company’s sensitive data can be exposed using Microsoft Copilot with simple prompts.
- Our team will then share practical steps and strategies to ensure a secure Microsoft Copilot rollout and prevent prompt-hacking data exposure.
Is Data Security Sexy Again – What Does the Future Hold
Tim Ayling, VP EMEA Cyber Security Specialists, Thales
- What is powering the drive for better data security?
- Where does this leave current data security?
- How do we address these challenges?
- How does the future look?
Skill Up Your Security: How Defenders Can Harness AI
Billy McDiarmid, Sr Director of Sales Engineering, Red Sift
- Learn how to enhance LLMs for threat detection and faster security issue resolution.
- Discover how Red Sift Radar integrates intelligence and automation into workflows.
- Gain insights on closing security gaps with real-time, actionable data.
- Explore practical ways to automate security processes with LLMs.
- See how Radar empowers teams to tackle security issues 10x faster.
How to become proactive and stay ahead of the AI threat curve
Prash Somaiya, CTO, Hadrian
Organizations’ attack surfaces, IT complexity, and reliance on third parties have increased exponentially, making effective security governance and operations a significant challenge. Meanwhile, the frequency and damage of attacks are increasing, making reactive security strategies are no longer economically viable.
Attendees will learn:
- AI is being used to accelerate the development of exploits leading to faster development.
- An analysis of vulnerabilities and exploits that challenge the scale and speed of traditional security operations.
- Security strategies need to transform and focus on proactive and pre-emptive measures.
- Recommendations for modernizing your vulnerability management program with offensive security.
AI-Powered Cybersecurity: Combating Emerging Threats in the Era of Generative AI
Richard Orange, Regional Vice President of EMEA, Abnormal Security
Richard Orange, Regional Vice President of EMEA at Abnormal Security, will explore how the rise of generative AI is transforming both the business and threat landscapes. As AI continues to drive innovation, cybercriminals are using these advancements to launch more sophisticated, high-volume attacks. This session will uncover the real-world threats organizations face today and demonstrate how AI can be leveraged to effectively counter these evolving cyber risks.
Attendees will learn:
- The role of generative AI in advancing both innovation and cybersecurity threats.
- Real-world examples of AI-driven attacks and their impact on organizations.
- How AI can be harnessed to detect and neutralize sophisticated cyber threats.
- Best practices for securing your organization in a rapidly changing threat landscape.
Thinking Like a Cybercriminal
Etay Maor, Chief Security Strategist, Founding Member of Cato CTRL, Cato Networks
We hear them in many cyber security presentations. They are so integrated into marketing campaigns, websites, interviews and product pitches that they have effectively become a universally agreed upon "truth". Cyber security myths. Not only are they incorrect but they can be downright dangerous.
In this session we will take several of these extremely popular "truths", explain their origin and how they got to where they are today and then, more importantly, bust these myths using examples from security incidents and recent security research. “Attackers need to be right just once and the defenders need to be right all the time”? “More security products mean better security”? “Sophisticated threat actors use sophisticated tools”? I don’t think so…
See how threat actors evade security controls, processes, and tools
Attendees will learn:
- How threat actors evade security controls
- The state of adversarial AI - using, targeting and abusing AI systems
- Learn how to implement a multi-chokepoint approach to the attack killchain
- Understand how to gain visibility into suspicious network activity
- Busting cybersecurity myths
Browser security – the proven prevention layer for enterprise cybersecurity
Brett Raybould, Director, Solutions Engineering , Menlo Security
According to Google, 98% of attacks originate from internet usage and 80% of those target end user browsers – sadly all too successfully. Combine this stark reality, with users’ relentless demand for new SaaS and private applications, often collaborating with external stakeholders, and security pros are always running to stand still.
Attendees will learn:
- Security – The proven value of robust browser security across managed and unmanaged devices – automating browser configuration and establishing enhanced browser forensics.
- Connectivity – Your users and third parties need access to SaaS applications, private web apps and data, including the use of GenAI. We share how organisations are enhancing user protection and productivity while reducing the cost and complexity of solutions such as VDI.
- Compliance – How browser security supports organisations striving to comply with key NIS 2 requirements for incident management and prevention
- We will provide real world examples and case studies of how to increase cyber prevention through improved browser security.