Title |
Speakers |
Summary |
Topic Types |
PLENARY KEYNOTE: Safeguarding the nation – the NCSC vision for a more secure Britain |
Ciaran Martin
|
N/A |
|
PLENARY KEYNOTE: Understanding & Managing Risk across your digital infrastructure |
Ali Neil
|
N/A |
|
PLENARY KEYNOTE: Behavioural psychology in the Fortune 500 – changing habits to protect your organisation from cyber criminality |
Adam Anderson
|
The number one cyber security threat facing the world!What role behavioural science plays in Cyber ... |
|
PLENARY PANEL SESSION: Collaboration, Simplicity, Certainty: How organisations can work together to defend everyone from cyber criminality |
James Hatch
,
Ian Burgess
,
Titta Tajwer
,
David Nordell
,
Tim Sadler
|
Moving to institutionalised, active collaboration and organisational learning that spans organisations, industries and countriesCreating a ... |
|
BEST-PRACTICE BRIEFING: Security innovation awareness through vendor relationships – One CISO’s bold experiment |
Allan Alford
|
How do you learn about disruptive tech?VARs, Vendor Aggregators and conferences like this one!Direct Vendor ... |
|
PANEL SESSION: Measuring progress in cultural change – which metrics are quantifiable, repeatable and comparable |
John Scott
,
Paul Holland
,
Lucy Payne
,
Louise Cockburn
,
Carlos Valderrama
|
The importance of establishing benchmarks before engaging in any change exercise, both qualitative and quantitativeRecognising ... |
|
CASE STUDY: Am I the security risk in your supply chain? Why your compliance checklists don’t offer the information security you need |
Bridget Kenyon
|
What do compliance checklists really protect?Which compliance questions reveal the biggest security risks with 3rd ... |
|
PANEL SESSION: GDPR and global data protection variations: What have we learned and what are we still working on? |
Deborah Haworth
,
Rocio Cruz
,
Shash Patel
,
Matt Middleton-leal
|
Update on the latest global data protection variations – is GDPR becoming the global data ... |
|
CASE STUDY: A Playbook for “Reasonable and Appropriate” Security Measures and Safeguards |
Jacob Eborn
|
Understand the requirements and importance of implementing “reasonable and appropriate” security measures and safeguards for ... |
|
BEST-PRACTICE BRIEFING: A New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks |
Dave Palmer
|
Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threatsHow new immune system ... |
|
PANEL SESSION: External Threats: Emerging recent trends in cyber criminality and the current risk landscape |
Martin Smith
,
Craig Rice
,
Niall Macleod
,
Tony Adams
|
Meeting the challenge of destructive and disruptive attacks from defence in depth intended to deter ... |
|
BEST-PRACTICE BRIEFING: Common failings of IoT – avoid providing attackers with toehold to exploit on your corporate network |
Ken Munro
|
Discuss the emergence of the IoT and it’s enabling technologiesExplain why the security of IoT ... |
|
BEST PRACTICE BRIEFING: Fixing the disconnect – using the right language and translating from SOC to C Suite and back again |
Dr. Sandra Bell
|
Translating C Suite priorities to your security teamCommunicating threats and risks upwards to your C ... |
|
CASE STUDY: Getting the CEO on board: How high-level buy-in turned our people into our strongest line of defence |
Mark Nicholls
|
Can colleagues, customers and partners be the strongest line of defence in the fight for ... |
|
CASE STUDY: Alternative approaches to recruitment: Attracting and retaining talent from non-traditional routes |
Martin Ingle
|
Are some skills sets more transferable than others for cyber security careers?Overcoming ingrained prejudices in ... |
|
BEST-PRACTICE BRIEFING: The future of authentication: Secure passwordless login for employees and customers |
Claire Galbois-alcaix
|
The death of the password?Can SFA securely replace 2FA and MFA?When something you have replaces ... |
|
PANEL SESSION: Blockchain beyond the marketing: Where is it currently in use, and what are the lessons for Information Security professionals? |
Dr Vigliotti
,
Roxanne Morison
,
Tim Holmes-mitra
|
How can information security specialists engage with this technology?Insight in the adoption opportunities and challenges ... |
|
BEST-PRACTICE BRIEFING: Security innovations from Google: Preventing phishing and Zero Trust security |
Tom Salmon
|
How Google prevents its employees being phished, having no reported or confirmed account takeovers since ... |
|
CASE STUDY: Real cases of Social Engineering: Hackers, competitors and insiders |
Lisa Forte
|
How attackers, in a real case over 13 months, used social engineering to turn a ... |
|
RESEARCH BRIEFING: The threat from AI – latest research into the cyber security of AI |
Dr Jose Such
|
Is AI going to stop cybercrime?The threat from smart malware and botnetsWhere is the intersection ... |
|
CASE STUDY: The Decalogue of Contractual Security Sins |
Sebastian Avarvarei
|
Why do we keep running into security issues with our IT contracts?What are the most ... |
|
CASE STUDY: Challenging and changing your data protection culture: Building awareness and engaging individuals inside and outside the office |
Matthew Kay
|
Exploring the challenges of harnessing a data protection culture within your business.How you can potentially ... |
|
CASE STUDY: Remaining agile and fast-moving: Identifying priorities and risks, and resourcing a team to match |
Kevin Fielder
|
N/A |
|
CASE STUDY: Effective threat intelligence communication strategies: Upwards, downwards and outwards |
Nick Nagle
|
Communicating threats to different audiences, and how they decipher what they have just been toldEffective ... |
|
LEGAL BRIEFING: Automatic profiling and GDPR: Is your use of AI to profile users and make automated decisions compliant? |
Dan Whitehead
|
GDPR – Profiling Overview including; Data; Subject; Fundamental RightsArticle 22 – Interpretational challenges for sole ... |
|
CASE STUDY: Understanding and securing your data crown jewels: Building and implementing a new model to assess the sensitivity of data, and applying protective controls |
Andy Wall
|
Understanding the extent of your data holding – your crown jewelsCreating new methods to assess ... |
|
CASE STUDY: Integrating privacy engineering into your information security practices |
Jon Townsend
|
Where can privacy processes beat hackers, and where can security awareness beat them?Why a reliance ... |
|
CASE STUDY: The growing power of actionable Threat Intelligence in Organisation Security Stack |
Kirill Kasavchenko
|
How do organizations cope with a lot of Threat Intelligence feeds? Is more always better?Can ... |
|
BEST-PRACTICE BRIEFING: The problem of trust and how it can destroy your organisation |
Jeremy Swinfen Green
|
What is trust in an organisational context?Why is it a problem for security professionals?Why do ... |
|
BEST-PRACTICE BRIEFING: The security risk from legacy IoT devices on your network: Where vulnerabilities may lie and how to mitigate the risk for the future and new devices joining the network |
Phil Beecher
|
What are the three most important issues should you consider when implementing IoT?What are the ... |
|
PLENARY PANEL SESSION: Unacceptable personal pressure: How senior Cyber Security Executives safeguard their own mental health, and those of their teams |
Thom Langford
,
Allan Alford
,
Deborah Haworth
,
Kevin Fielder
,
Paul Watts
,
Mark Walmsley
|
This panel of leading information security professional discuss different strategies for maintaining a healthy work/life ... |
|