Agenda
08:00 - 08:50 |
Breakfast & Networking |
08:50 - 09:00 |
Chairs welcome |
09:00 - 09:20 |
►Foundations for security: crafting a new security strategy and culture Tim Collinson, Head of Information Security, Walkers
|
0 |
►Cyber insurance: the last line of defence Mike Tewfik, Cyber & Tech Underwriter, Beazley
|
09:40 - 10:00 |
►An overview of cyber threats facing the legal sector, and using Threat Intelligence to mitigate risk James Allman-Talbot, Head of Incident Response and Threat Intelligence, Quorum Cyber Jon Cranton, Legal Sector Lead, Quorum Cyber
|
10:00 - 10:20 |
►Cyber Resilience is not a breach challenge but a human challenge Sarb Sembhi, Founder and Chair, Mental Health in Cyber Security Foundation This session will delve into the challenges faced by cybersecurity professionals and discuss potential strategies to address these issues and enhance cyber resilience effectively. |
10:20 - 11:00 |
►Education Seminars Session 1 Delegates will be able to choose from the following education seminars:
|
11:00 - 11:30 |
Networking Break |
11:30 - 12:00 |
►Panel Discussion: Managing supply chain security - Understanding the risks suppliers may pose to you and your wider supply chain and the sensitivity of information your suppliers may hold Jas Bassi, Head of Solution Delivery, Gateley (Moderator)
|
12:00 - 12:30 |
►Panel Discussion: Managing the response to a cybersecurity threat in an organized way Francisco Sanches, Director of Cyber Consulting, Mishcon de Reya (Moderator) An effective response requires a well-executed incident response and remediation strategy for before and after an incident to limit major disruption to business operations and financial harm.
|
12:30 - 13:10 |
►Education Seminars Session 2 Delegates will be able to choose from the following education seminars:
|
13:10 - 14:00 |
Lunch & Networking |
14:00 - 14:20 |
►Who's on your shoulder — our devices and our privacy Jonathan Freedman, Head of Technology & Security, Howard Kennedy
|
14:20 - 14:40 |
►Cybersecurity in Crisis: Aligning Compliance Strategies to Combat the Triple Threat of Ransomware, Data Breaches, and Extortion Attacks in the Legal Sector Richard Cassidy, Field CISO, Rubrik
|
14:40 - 15:20 |
►Education Seminars Session 3 Delegates will be able to choose from the following education seminars:
|
15:20 - 15:40 |
Networking Break |
15:40 - 16:00 |
►AttackGen: Leveraging AI for Dynamic Incident Response Testing Matt Adams, Head of Security Enablement, Citi
|
16:00 - 16:30 |
►Panel discussion: Managing personal legal and emotional challenges for CISOs Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
16:30 - 17:30 |
Drinks Reception & Networking |
Education seminars
Go on the Offensive by Merging AI and Human Expertise for Email Security
Jamie Little, Chief Technology Officer, EveryCloud
Justin Pemberton, Senior Director of Sales
Attendees will learn:
- How email security has evolved in the last decade
- How AI is transforming traditional email security approaches
- Integrating human insight with AI algorithms
- Leveraging AI to create highly accurate and dynamic phishing simulations
- The benefits of a holistic approach to secure law firms
The Recovery Position
Phil Cambers, Commercial Director, Trustack
The cybersecurity landscape is rapidly changing, driven by advancements in technology which are being exploited by bad actors coupled with evolving work models. As cyber threats become more sophisticated, it is crucial for organisations to stay ahead by updating their security infrastructures and adopting next-generation technologies. For the legal sector, robust security practices are essential to protect sensitive client data and comply with regulatory requirements.
Attendees will learn:
- Listen to real world accounts of breaches our customers have encountered and the impact it had on their business.
- Identification: How the breach occurred and the subsequent impact.
- Containment: How was the threat closed down?
- Recovery: How long did it take to recover the customer?
- Lessons Learned: What could have been done to prevent the attack?
How to design for any behaviour in security
Maxime Cartier, Head of Human Risk, Hoxhunt
Are there any risky behaviours you wish people in your organisation would just stop doing? Or secure actions you hope they would take more often? With the human element accounting for around 75% of breaches in 2023, we must evolve from traditional security awareness to real behavior change.
What attendees will learn:
- A new model to design for any behaviour (referenced by 1,000+ academic publications).
- How to apply the model to cybersecurity , with walkthrough of real-life examples such as reporting security incidents or using approved cloud platforms.
- Effective strategies for implementing learned skills into tackling human risk in your law firm, summarised in a physical handout given to participants.
Managing Security Incidents: Prevention Strategies and Worst-Case Planning
Natalija Buldakova, Solution Architect, Quest Software
With 74% of breaches involving the human element and ransomware attacks skyrocketing, safeguarding business identities has never been more crucial. Join us in this session as we explore the pivotal role of protecting your business from these threats. You'll gain actionable insights into potential consequences and effective mitigation strategies, alongside comprehensive worst-case scenario planning. Empower yourself to fortify your organisation's defences against evolving cyber threats with practical knowledge and proactive measures.
Attendees will learn:
- Today’s Cybersecurity Challenges
- Implementing Dynamic Preventative Measures
- Developing Robust Strategy for Worst-Case Scenarios
Browser security – the proven prevention layer for enterprise cybersecurity
Tom McVey, Sr. Solution Architect, Menlo Security
According to Google, 98% of attacks originate from internet usage and 80% of those target end user browsers – sadly all too successfully. Combine this stark reality, with users’ relentless demand for new SaaS and private applications, often collaborating with external stakeholders, and security pros are always running to stand still.
Attendees will learn:
- Security – The proven value of robust browser security across managed and unmanaged devices – automating browser configuration and establishing enhanced browser forensics.
- Connectivity – Your users and third parties need access to SaaS applications, private web apps and data, including the use of GenAI. We share how organisations are enhancing user protection and productivity while reducing the cost and complexity of solutions such as VDI.
- Compliance – How browser security supports organisations striving to comply with key NIS 2 requirements for incident management and prevention
- We will provide real world examples and case studies of how to increase cyber prevention through improved browser security.
Cyber Remediation - Planning for Failure
Derek Charles, Senior Cloud Consultant, Exponential-e
It takes an average of 3 months for law firms to recover from cyber-attacks, resulting in harm to their established brand reputation, loss of client trust, and a significant financial impact ranging from £10m to £50m. However, by implementing strategies to avoid ransom demands and quickly restoring critical data, law firms can resume operations in a matter of days rather than months.
Attendees will learn:
• The components of a robust prevention and remediation strategy to ensure minimised downtime and impact whilst restoring data effectively and securely.