scCongresslondon 2018 Feb. 15, 2018 to Feb. 15, 2018, london,uk

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Neil Sinclair N/A
Regulatory best practice, from GDPR and Safe Harbour to post-Brexit UK Law, how do you comply with conflicting regulation? Jeremy King , Tony Morbin , Peter Brown , Ailidh Callander , Marco Cunha , Tim Hickman N/A
What's really going on on your network - who and what does suspicious look like? Sarb Sembhi , Tony Collings , Ed Tucker , Neil Sinclair , Philip James Prevent, detect, and remediate - minimise the impact of intruders and malicious insiders.
4 Tips to Fight Insider Threats Matt Lock Practical advice from industry experts on steps you can take to reduce your exposure to ...
Why email security is no-longer enough David Staunton The reality today is that email remains the #1 attack vector, threats are rapidly evolving, ...
How to Tackle the GDPR: A Typical Privacy & Security Roadmap Kevin Kiley As a new era of privacy regulations approaches, security and compliance professionals need to make ...
How to Combat Email Attacks & Identity Fraud Lars Postma Email is the primary infiltration mechanism for the majority of cyber-attacks. To effectively combat these ...
Are You Ready for a Breach? Jeroen Herlaar Breaches are inevitable, and their impact can be significant, as we are seeing on almost ...
Managed Detection and Response. You know what it is… Or do you? - Joe Nelson MDR - what it is and what it isn't • How MDR can assist with ...
Recovering from Ransomware Raj Samani Your ransomware defences failed - what now? Expert advice on remediation strategies to implement if ...
Keynote two: Hacking demonstration - Is anything connected still safe? Tony Gee The IoT is much more than many of us imagine, and as it continues to ...
Keynote three: The case for the defence - A pre-enactment of a courtroom drama coming soon after GDPR Gilly Crichton , Jeff Little How would you fare in the dock, defending your action in a data breach? A ...
Putting infrastructure on a war-footing Ian Glover , Kevin Jones , Khaled Fattal , Pat Larkin , Mike Loginov Our critical infrastructure is already under attack. From energy and transport to voting and hospitals, ...
Zero Trust Security – Never Trust, Always Verify! Barry Scott As traditional network perimeters dissolve, we must discard the “trust but verify” model, which relied ...
Proactive data defence for digital transformation Ian Greenwood Digital transformation is business enhancing and fraught with danger. With services moving online and into ...
How a military concept can help build your Incident Response programme Andrew Yeates In the current cyber threat landscape, organisations are looking at ways to respond as effectively ...
Masterclass - Best practice incident response plans under GDPR Dai Davis What should you consider and include when putting your breach response plan together? This interactive ...
Cyber-Security 2020 - a diverse workforce for a diverse threat Adrian Davis , Jane Frankland , Tom Reeve , Amanda Finch , Colin Lobley How do we tap into the talent pools that we are missing? From women who ...