Agenda
08:00 - 08:50 |
Registration & Networking |
08:50 - 09:00 |
Chairman's Welcome |
09:00 - 09:20 |
► What has Risk got to do with technology? Karen Jacks, CTO, Bird & Bird
|
09:20 - 09:40 |
► Why attack surfaces heat up with remote work Amir Ben-Efraim, CEO, Menlo Security
|
09:40 - 10:00 |
► Staying ahead of cybersecurity threats in today’s undeniably digital world Etienne Greeff, CEO, Flow
|
10:00 - 10:20 |
► Why do they do that? Harnessing Psychology to inform Information Security in organizations Marco Cinnirella, Professor of Applied Social Psychology, Royal Holloway
|
10:20 - 11:00 |
► Education Seminar Session 1 Delegates will be able to choose from the following education seminars:
|
11:00 - 11:30 |
Networking Break |
11:30 - 12:00 |
► Panel: The Big Risks Mark Jones, CISO, Allen & Overy (Moderator); Dom Lucas, Global Information Security Risk and Compliance Manager, Allen & Overy; Valerie Jenkins, CISO, Clyde & Co; Steve Davies, Head of Cyber Security, DLA Piper
|
12:00 - 12:20 |
► Why legacy MFA is not good enough for modern authentication requirements Chris Meidinger, Beyond Identity
|
12:20 - 12:40 |
► Navigating the dark corners of social engineering attacks James Alliband, Senior Product Strategy Manager, Tessian
|
12:40 - 13:20 |
► Education Seminar Session 2 Delegates will be able to choose from the following education seminars:
|
13:20 - 14:30 |
Lunch Break |
14:30 - 15:00 |
► Senior Leadership Priorities Panel Steve Davies, Head of Cyber DLA Piper (Moderator); Karen Jacks, CTO, Bird & Bird; Karl Knowles, Head of Cyber, HFW; Jonathan Freedman, Head of Technology & Security, Howard Kennedy; Annette Brown, Head of IT, Milbank
|
15:00 - 15:20 |
► What should you have in your post-breach legal toolbox? Hans Allnutt, Partner & Cyber & Data Risk Practice Leader, DAC Beachcroft This session will look at the current legal landscape for affirmative action following cyber incidents and data breaches including:
|
15:20 - 16:00 |
► Education Seminar Session 3 Delegates will be able to choose from the following education seminars:
|
16:00 - 16:30 |
Networking Break |
16:30 - 16:50 |
► Vulnerability management in the real world Steve Davies, Head of Cyber, DLA Piper
|
16:50 - 17:10 |
► Creative Operational Security Dashboard Noha Amin, Head of Information and Cybersecurity, TLT LLP
|
17:10 - 17:30 |
► The Cyber Insurance Market – Managing Risk Will Slater, Technology and Cyber Practice Director, Gallagher
|
17:30 - 18:30 |
Drinks Reception |
18:30 |
Conference Close |
Education seminars
Cyber Risk Management in Focus
Ryan Rubin, Senior Managing Director - Cybersecurity, Digital Forensics and Incident Response, Tanya Gross, Senior Managing Director – Cybersecurity, Data Analytics & eDiscovery, Steve Sandford, Senior Director - Cybersecurity, Digital Forensics and Incident Response & Ahsan Qureshi, Senior Director - Cyber Security Risk Advisory, Ankura
Securing the law firm in 2022 remains a challenge. In 2021, we saw examples of how cyber exposures have adversely impacted companies in the legal sector. Our threat analysis on a sample of the industry in 2022 generates further food for thought. The key question is what else can law firms be doing to reduce their cyber risk exposure. Join Ankura experts in this presentation as we discuss several challenges facing law firms today and some practical strategies to get ahead of the risks and reduce the likelihood of common breach scenarios impacting the industry.
- Key Threats facing law firms today
- Understanding Law firm Structural Inherent Risks
- Key Risk Reduction Strategies
- Tactics, Techniques and Procedures to drive down impact from breaches
- Recent Case Studies and Key Lessons Learnt
Security by Chance or Security by Choice? The conundrum of Security Operations faced by law firms
Nick Dyer, Senior Systems Engineer, Arctic Wolf
- How can legal firms mitigate the growing alert & process fatigue whilst managing the increasing cyber risk across an exploding multi-cloud attack surface.
- Why Cyber Insurance premiums are on the rise, and proactive measures to ensure your business is covered.
- We’ll share our perspective running one of the world’s largest security operations services, handling over 2 trillion security events per week
- How Arctic Wolf’s Security Operations Cloud, and the Concierge Security Team, detected & remediated against ransomware for a customer.
The Verdict is Out! How to empower digital transformation without sacrificing security
David Guest, Solution Architect and Technology Evangelist, Kocho
Over the last 2 years, the way many law firms work has radically changed, with increases in virtual working, remote access, and cloud adoption. All of this is driving an explosion in apps, devices and users across an increasingly complex infrastructure.
As the barriers blur between who is in your network and out of it, organisations struggle to manage identities and secure access for not only their employees but external partners, suppliers, and even clients.
Learn how Microsoft technologies can help you provide secure, seamless, and compliant access to your business apps and data whilst striking the perfect balance between productivity and security.
Join this seminar as we examine:
- Exhibit A: How to enable seamless and secure end-user authentication
- Exhibit B: How to protect critical resources with Conditional Access
- Exhibit C: Why you should put identities at the heart of your security framework
- Exhibit D: How to establish passwordless authentication in Azure AD
Obsidian Security: Extending Zero Trust to SaaS
Chris Fuller, Principal Product and Solutions Architect, Obsidian Security
In a world where the natural evolution towards SaaS was accelerated by remote working during the pandemic, do the principles of zero trust still apply? SaaS currently makes up 75% of the cloud, yet SaaS security visibility is notoriously difficult for security teams to manage, given the expertise, visibility and control required to manage each disparate SaaS application.
Meanwhile, integrations between SaaS applications create a highly interconnected environment. With more sensitive business data entrusted to SaaS than ever before, it’s time to consider how best we secure those applications.
In this session, we’ll explore how the zero trust principles of continuous verification, breach impact limitation and facilitation of rapid incident response can be applied to SaaS applications.
- Review the guiding principles of Zero Trust
- Learn the inherent risks of SaaS usage and why securing SaaS applications goes beyond the identity provider
- Understand how the principles of Zero Trust can be applied to SaaS
The changing email threat landscape
Jack Chapman, Vice President of Threat Intelligence, Egress
Cybercriminals continue to launch increasingly sophisticated social engineering attacks. This is driven by crime as a service ecosystem, change in human behaviour and hardening of traditional routes into organisations. Because of these factors and more, it’s no surprise that 85% of today’s security breaches involve a human element.
Join this presentation to learn more about:
- Today’s email security landscape and how the threats are evolving
- The behaviours behind email data breaches
- Why legacy approaches are no longer fit for purpose
- How to use behavioural science and zero trust to take back control over data loss
- How real-time teachable moments are more effective at changing human behaviour than traditional security awareness training
Key Considerations for Choosing the Right Email Security Platform
David Lomax, Systems Engineer, Abnormal Security
Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.
Unfortunately, email threats are only growing in number. Business email compromise accounts for 44% of all losses to cybercrime, and the 2021 Verizon DBIR holds that phishing remains the top entry point for breaches—a position it has held for years.
Does that mean email is doomed, and we should give up? Quite the opposite—instead, we should look to newer technologies and an integrated security strategy that provides a modernized approach to email defense. In this webinar, we do just that.
Attend the Abnormal Security session for answers to your most pressing questions, including:
- What are modern email threats, and how are they different from legacy attacks?
- Which email threats are most concerning, and how can we defend against them?
- Which technical capabilities are required from modern email security providers?
- How do modern email security companies use AI, machine learning and data science to detect the most dangerous and costly attacks?