Agenda
Presentations already confirmed include:
►Quantum Leap - Preparing for a quantum-safe future
Steve Davies, Head of Cyber Security, DLA Piper
- What is quantum computing and what does it mean for the enterprise?
- What are the risks and how serious is the threat from quantum computing?
- How can you prepare for the post-quantum future, today?
- What does post-quantum readiness look like across technology service providers?
►Panel Discussion: Operationalising Threat Intelligence in High-Risk Environments
Rob Flanders, Head of Threat and Incident Response, BAE Systems
- How can traditional cyber intelligence be integrated into threats to legal practice?
- Can existing intelligence marking schemes (e.g. TLP) be easily fit with restrictions surrounding legal privilege?
- How can intelligence support the mitigation of attacks against VIPs, case leads, and privileged data?
- Which is of greatest concern to the legal sector – ransomware or targeted attacks?
►Briefs and Breaches: Why Foreign States Target Law Firms
Chris Worthy, Former Deputy Director, UK Home Office & Independent Consultant
- State sponsored espionage and where cyber fits in
- Why would foreign States carry out espionage (including Cyber) against law firms?
- How they use the information gathered
- The range of techniques used (including Cyber and non-cyber methods)
►Panel Discussion: Managing Elevated Threats: Protecting Clients, Staff, and Data
Chris Worthy, Former Deputy Director, UK Home Office & Independent Consultant
Steve Davies, Head of Cyber Security, DLA Piper
- How is the firm addressing the risk of being targeted due to representing politically sensitive or high-profile clients?
- What measures are in place to protect partners and employees during travel to regions with heightened security concerns, like the UAE or USA?
- How are we preparing for potential threats from activists, hacktivist groups, or state-sponsored actors targeting the firm or its clients? Is this a concern and something that has become more of an issue for you in recent months?
- What protocols exist to detect and manage insider risks?
►Bridging the cybersecurity skills gap. Are you part of the problem or part of the solution?
Ash Spencer, Head of IT and Security, Minster Law
- What is the cybersecurity skills gap?
- What problems or challenges do those gaps cause?
- Some potential solutions to address the skills gap within your organisation