Title |
Speakers |
Summary |
Topic Types |
Opening Keynote: Host Nation |
Dr. Stefano Zanero
|
N/A |
|
Opening Keynote: Risk-taking and decision-making |
Caspar Berry
|
Caspar Berry uses the metaphor of poker as a vehicle to communicateuniversally resonant messages around ... |
|
EU Highlights What are the top two current security challenges for organisations globally? |
Joel Stradling
|
Discover what the top two security challenges for organizations are globally based onnew key findings ... |
|
Unique Keynote: What can exercises in future-thinking tell us about the cybersecurity and international diplomacy challenges that we need to prepare for? |
Dr. Victoria Baines
|
By now we should all be zooming around in flying cars, teleporting to meetings,and holidaying ... |
|
Keynote and Practical Use Case Stories Using AI to counter the next generation of cyber-threats |
Marina Pereira
|
With so much hype, it’s hard to work out what’s truly AI, what’s not, and ... |
|
4 BIG QUESTIONS What is technology’s current emerging role in international diplomacy? Predictions and trade-offs |
Gadi Evron
,
Dr. Victoria Baines
,
Prof. Cilli
,
Paul Brucciani
,
Tim Varkalis
|
Engaging the audience with some of the big questions challenging leaders today.1. What responsibility does ... |
|
Unique Keynote: Cyber Resilience for the Aviation Sector to Enhance Overall Cyber Preparedness |
Dvir Rubinshtein
|
N/A |
|
Keynote Understanding the criminal mind: how Western European BEC syndicates leverage business intelligence |
James Linton
|
James (also known as the Email Prankster!) will expose the inner workings of asophisticated, UK-based ... |
|
Panel: Cyber Crime - How are AI/ML and disruptive technologies supporting sustainable, ethical and forward-thinking operations? |
Mariana serras Pereira
,
Friedelien Brockerhoff
,
Tom Gamali
,
Abdul Latif Jameel
,
Ben Bulpett
,
Ben Jeffreys
|
Practical applications, ethics and governance of advanced technologies incybersecurity today - a ‘live’ snapshot. • ... |
|
Keynote: 10 Proven ways in 10 minutes to develop a GDPR-Ready Incident and Breach 72-Hour Action Plan! |
Vipul Asher
|
N/A |
|
Innovation Insights Quantum-a double-edged sword? How do we future Quantum-proof our current and future infrastructures? |
Dr. Pfeiffer
|
Quantum Computing is a double-edged sword, its usage for stronger encryptionversus its usage to break ... |
|
Keynote Back from the Future: What do the films Terminator, iRobot and Minority Report have to do with Identity Governance? |
Ben Bulpett
|
N/A |
|
Keynote Balancing Investment and Security Risk Reduction |
Richard Turner
|
N/A |
|
Case Study: 100 days as a CISO: lessons learned from Scriptkiddie to CISO |
Mark Snel
|
N/A |
|
Keynote: Back to Data Security Basics: What’s Getting Lost in All the Buzz |
Matt Middleton-leal
|
• We are spending more than ever on data security: Why is the number of ... |
|
Unique Keynote: What is the True Cost of Security? |
Thomas Langford
,
Comic Relief
|
Thom shares his personal story of workplace stress and mental health trials in theinformation security ... |
|
Keynote: DNS: Cyber Security’s Best Kept Secret |
Ben Jeffreys
|
N/A |
|
Unique Keynote: Threat from Business Espionage |
Robert Shaw
|
N/A |
|
Case study: Cloud journey |
Marc Lueck
|
N/A |
|
Panel: How do we build a successful culture of security, privacy and trust? Navigating complex regulatory oversight to ensure ethics and compliance |
Mark Felegyhazi
,
Matt Middleton-leal
,
Colette Hanley
,
James Gosnold
,
Martyn Booth
,
Rob Robinson
,
Lee Cartmell
|
Privacy is becoming an ever-increasing concern in the world. Social Networks,GDPR and on the opposite ... |
|
Opening Keynote: Cybersecurity, Intellectual Property and Investment |
Jim Hinton
|
Market update on where IP in cybersecurity is headed on emerging threats andpredictions on how ... |
|
Keynote: Protecting your Organisations’ “Very Attacked” People |
Richard Davis
|
Building a people-centric security model based around an understanding of whoyour organisations’ “Very Attacked People” ... |
|
Unique Keynote: Away with Cassandra |
Gadi Evron
|
N/A |
|
KEYNOTE A: Security Threat that is often Overlooked |
Richard Mat
|
While companies spend large amounts of money on cybersecurity,fraud, dataleakage and virus protection for good ... |
|
Case study Integrated Security for IT/IoT/OT Protection |
Edward Ayman Ganom
|
Address the growing trend of convergence between the IT, IoT, and OT networks. A case ... |
|
Case Studies Supply chain cyber risk monitoring: Adapting to the |
Paulo Glórias
|
Learn how leading organizations are transforming their 3rd & 4th party cyberrisk management programs to ... |
|
Keynote: Telemetry Data - the Rise of JavaScript Injection for Browser Based Attacks |
Fabian Libeau
|
Revealing insights into the rise in browser-based attacks and the risk theypose to any organisation ... |
|
Keynote: How a Red Team can get quick wins! |
Andrew Mabbitt
|
Hear some of Andrew’s war stories from leading red team engagementsfor leading UK and U.S. ... |
|
Group Exercise Maximising Security in Complex Technological Enterprises – how can we advance the CISO’s role in fast transforming business enterprises? |
Dr Sally Leivesley
|
CISO’s in Italy and other EU countries are supporting high technology innovationthat is driving business ... |
|
Unique Keynote and Live Demos: How supply chain flaws become endemic |
Ken Munro
|
Ken will break new research and show threat profiles not talked about before, aswell as ... |
|
Keynote How to Transform your SOC (Security Operations Centre) for Maximum Efficacy |
Edvinas Pranculis
|
N/A |
|
Case study Rules of the Anti-CISO: building CISO Offices for the modern world |
Simon Lloyd
|
N/A |
|
Keynote: Future Foresight in Higher Education |
Irene Corpuz
|
N/A |
|
Panel: ‘Them and Us’! Building resilience and governance across supply chains |
Riccardo Bianchi
,
Aulo Glórias
,
Graeme Cantu-park
,
Adam Drabik
,
Amy Lemberger
|
•Building governance and due diligence within the supply chain•Emerging approaches to outsourcing cyber risk •Assessing ... |
|
Panel: How do we build truly diverse, authentic and inclusive risk and security teams? |
Irene Corpuz
,
Dr. Victoria Baines
,
Mark Snel
,
Lee Cartmell
,
Mark Ampleford
|
We need to diversify the composition of our teams and therefore theway that we identify ... |
|
The ultimate sound-boarding and benchmarking for today’s CISOs and cybersecurity leaders... |
Marcus Alldrick
,
Michael Colao
,
Irene Corpuz
,
Dvir Rubinshtein
,
Paul Hopkins
|
N/A |
|