08:00 - 09:00

Registration and breakfast networking 

09:00 - 09:10

Chairman's welcome 

09:10 - 09:30

► How to successfully integrate security with business

Dale Hodgkinson,  Strategy and Architecture Manager, Slaughter & May

  • Real world decisions must be practical. Sometimes it might feel that security solutions are compromised by business needs but an 'Us and Them' mentality should not be allowed to develop. 
  • Security cannot be restrictive to the business, but business cannot marginalise security to a last minute safety procedure. A truly holistic, realistic and effective security strategy must be completely integrated.
  • The most effective security is unknown security, that which is fully integrated. 
09:30 - 09:50

► Reflecting on Risk

Andrew Fleming, Global AML Risk Framework Manager, HSBC

  • Before beginning to address security the fundamental questions must be asked with serious intent: what assets are you protecting?; what risks are you exposed to?; what are your threat vectors and how you rate the risk?
  • Your resilience to an attack can be judged beyond your capacity to identify, respond and recover. You must ask whether you controls are effective, and if so, how can you prove it?
  • Once you have asked this questions, then you must address the consequences to your business, your customers, your shareholders and your reputation if you have got it wrong. 
09:50 - 10:20

Networking and refreshments 

10:20 - 10:40

► The Dos and Don'ts of Cyber Security

Greg van der Gaast, Head of Information Security, The University of Salford 

  • Why so many Cyber Security efforts fail to provide real assurance.
  •  How to prevent the typical cost and complexity of the security status quo. 
  • Making cyber security actually work for you. 
10:40 - 11:00

► Mobile Security in 2020

Thomas Plumer, Customer Success Manager, Wandera

  • Why Mobile Security is so important to the modern enterprise
  • Why Mobile Threat Defense (MTD) is an essential complement to EMMs/UEMs
  • An overview of the evolving mobile threat landscape
  • A demonstration of a mobile phishing attack 
11:00 - 11:20

► Overcoming Today’s Most Pressing Third-Party Risk Management Challenges

Gerard McGowan, Third Party Risk Specialist, OneTrust

  • Review the drivers and challenges organizations face when managing third-party vendor risk 
  • Identify priorities before, during and after vendor procurement
  • Takeaway a six-step approach for automating the third-party vendor risk lifecycle 
  • Hear real case studies from privacy experts on how to practically tackle the third-party vendor risk
11:20 - 11:50

Networking and refreshments 

11:50 - 12:20

► Executive Panel Discussion

The money game: how to handle your spending in information security.

  • Jonathan Freedman, Chief Technology and Information Security Officer, Howard Kennedy LLP
  • Sue Diver, Head of Information Security and Data Protection, Clarke Willmott LLP
  • Allan Campbell, Global Information Security Manager, Withers LLP
12:20 - 12:40

► It's Time to Turn the Tide on Email Data Breaches

Sudeep Venkatesh, Chief Product Officer, Egress Software Technologies

  • Solving the problems caused by unauthorised access to data and failing to to adequately protect personal information 
  • The pyschology behind these incidents
  • How advances in machine learning and advanced DLP technology can solve this problem
12:40 - 13:00

► How to break into any legal practice: tales from a professional hacker

Rob Shapland, Head of Awareness, Falanx Cyber 

  • Find out how criminals use social media to plan attacks
  • How the speaker uses disguises and social engineering to gain physical access
  • How as an ethical hacker he executes full-scale criminal attack simulation
  • Find out how to help protect your firm from a data breach
13:00 - 14:10

Lunch and networking 

14:10 - 14:30

► Paradigm Shift: the Future of Security is Service Based. 

Mark Davidson, Director of IT, Birkett Long LLP 

  • Within law firms there has been a shift away from seeing IT as something bespoke and vertically integrated. More and more it is being seen from a service-based perspective. What are the implications that this change has on security?
  • A service based mentality provides integration and consolidation while also providing the solutions to problems small firms don't have the means to address.
  • There are security risks involved but are the new risks just old risks re-heated?
  • The new question of security; the integrity of the supplier. 
14:30 - 14:50

► Innovation, First-to-Market, Exponential Growth and Security: the Challenges of a Fintech Scale-Up

Matthew Bryant, CISO, Monese

  • Addressing the demands of a digital native experience.
  • Efficient and optimised risk management
  • Automation
  • High speed compliance
  • How to keep in harmony with scalability.
14:50 - 15:10

► The Realities and Perceptions of a Law Firm's Security

Shane Scott, IS Director, Shoosmiths LLP 

  • Cybersecurity professionals working in law firms claim they face exceptional problems. How truthful is this claim?
  • Hacking, malware, supply chain compromises, phishing and network breaches are threat vectors faced across all industries. Why do law firms claim they struggle to cope?
  • How the structural inefficiences of the law firm and client pressure endanger security disciplines, and what can be done to prevent it
15:10 - 15:20

► Tracking trends in cybersecurity

Will Kaye, Conference Chair, AKJ Associates

  • Where is legal cybersecurity now? An overview provided from AKJ Associates' original research.
  • Cybersecurity trends to expect in a new decade
  • Operational risk or existential threat? Why do we struggle to characterise cybersecurity and what effect does this struggle have on our efficiency?
15:20 - 15:50

Networking and refreshments 

15:50 - 16:10

► Challenges in Training, Compliance and Risk 

Funmilayo Kolaru, Compliance Manager and DPO, Stewarts Law LLP 

  • A pervasive security strategy must begin with its weakest link. While it is an age old cliche, the human factor remains the most problematic piece to the privacy puzzle.
  • How to create a level of effective engagement with substantive outcomes.
  • Using process and training to create practical vigilance through a holistic view of security. 
16:10 - 16:30

► From the Outside In

Neil Palmer, European Business and Information Security Specialist, Canon Europe

  • In an increasingly digital world, it's easy to lose sight of the physical.
  • Getting the basics right is never as simple as it seems.
  • Ultimately, is your office safe for data? Let's take a look. 

Conference close