TEISS 2020 Feb. 12, 2020 to Feb. 13, 2020, London, UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Password administration for system owners: The NCSC strategies that can help your organisation remain secure N/a Understanding the decisions to be made when determining password policyGuidance on implementing password policies which ...
Keynote: Technology ethics: How can we create and use technologies so that they deliver maximum benefit and pose minimum harm? Dr Stephanie Hare How can ethical frameworks be deployed across a diverse range of stakeholders?The four areas which ...
Panel discussion: Security and Privacy by design: How can information security leaders ensure their organisations avoid a “bolt-on” approach and minimise risk Deborah Haworth , Dr Stephanie Hare , Barry J Coatesworth , Barry Mcmahon Where and why does DevSecOps work, and how can Information Security professionals ensure security is ...
Keynote: The Information Commissioner’s Office GDPR investigations and decisions, and expectations in 2020 and beyond Stephen Eckersley GDPR investigations and justification behind the decisions on the prominent fines of British Airways and ...
Roundtable discussion: Why prevention has failed Insider Threat Paul Martin Are you able to successfully avoid data loss surprises as a result of employee departures?90% ...
Roundtable discussion: Enhancing red and blue teaming with Breach and Attack Simulation Tim Ager N/A
Roundtable discussion: Defending your cyber space with a Threat Intelligence programme Ian Thorton-trump What is the consensus view of common definitions, understanding and business value of Cyber Threat ...
Roundtable discussion: How do you ensure simple and secure Access Management? Charles James What are the challenges that you are facing in the post-perimeter world?How can you be ...
Roundtable discussion: Why would I outsource my SOC? Martin Cook How would I identify a threat against or on my network? Am I compromised now?What ...
Roundtable discussion: State of Security and the State of SOAR Toby Grift Where do you start security automation? Where does security automation end?Where does DevOps fit into ...
Roundtable discussion: ISO27001 and the GDPR: Identifying overlap and streamlining efforts Adam Macgillivray Map the most common security operations standard, ISO 27001 to the world’s most influential piece ...
Roundtable discussion: Risk Exchanges: The key to vendor risk management efficiency Ryan Manyika Your vendors often handle your most sensitive data.This presents new challenges as third-party risk, security, ...
Roundtable discussion: Securing the Human – 90% of critical data breaches are the result of human error. How are you securing against what you don’t know? Thom Langford Securing the human is one of the toughest challenges facing us today; how can we ...
Roundtable discussion: How are you taking the MITRE ATT&CK Framework from plan to action? Lee Langley Why should you use it?How are you adapting the framework to your company’s environment and ...
Roundtable discussion: How do you detect and manage your internal threats? Jeremy Swinfen Green What is an internal threat?Why do internal threats happen?How do you detect them?How do you ...
Roundtable discussion: How to secure your data in the cloud? John Michael The importance of securing your data in the cloud and the challenges that organisations face ...
Case study presentation: Securing innovation at the speed and scale of DevOps David Okeyode Why a classic approach to security is no longer scalable, sustainable or rapid enough in ...
Case study presentation: Strategies to quantify your organisation’s cyber risk, and making your messages effective at board level Dr Keyun Ruan Translating C Suite priorities to your security teamCommunicating threats and risks upwards to your C ...
Case study presentation: A CISO’s Guide to Continuous Security Testing Tim Ager Using pen testing, vulnerability assessments, and other traditional testing methods, the security team can evaluate ...
Case study presentation: Overcoming CISO Communication issues and the issue of cybersecurity excuses Allan Alford N/A
Case study presentation: Aligning home-life security and company security: Making your people the CISO of their own homes Sarb Sembhi Instilling the concept that security belongs to everyone in the organisationFocusing on awareness – in ...
Case study presentation: Short-cut Thinking: Working with human nature in security awareness and training Bridget Kenyon What is behavioural economics, and how can it derail successful security training?Building a security culture ...
Panel discussion: The ways that your security awareness programme is failing, and what you should do about it Lucy Payne , Reena Shah , Daniela Somerscales , Dora Ross , Oz Alashe Should awareness focus on implementing good security related behaviours?The failing of the hacker mentality and ...
Case study presentation: Secure authentication: balancing security and usability John Perkins How to create a seamless authentication experience for customers and employeesLearn about the strongest level ...
Case study presentation: Harnessing Artificial Intelligence – Making AI an enabler for cyber professionals rather than an imminent threat Naina Bhattacharya False positives or ‘innocent anomalies’ are a huge distraction for over-stretched security teamsHow can a ...
Panel discussion: Threats in the supply chain: Balancing your internal and the external requirements and competing risk agendas Quentyn Taylor , Holly Grace Williams , Naina Bhattacharya , Mike Seeney Which compliance questions reveal the biggest security risks with 3rd parties?Alternative approaches to identifying risk ...
How to create and sustain a high-performance security culture Dr Dave Chatterjee Is a lack of organisational commitment to proactively prepare and execute effectively the difference between ...
Keynote presentation: Empower your people, strengthen your culture and reduce your cyber risk Dr Jessica Barker N/A
Panel discussion: Tailoring your security awareness programmes to overcome colleagues’ inbuilt biases Dr Jessica Barker , Dr Dave Chatterjee , Dr Villiers The importance of establishing benchmarks before engaging in any change exercise, both qualitative and quantitativeRecognising ...
Case study presentation: High-end, regulatory-driven, red-teaming: What are the techniques and how quickly are they evolving? Ken Munro How the depth of your security assurance isn’t good enoughDeveloping a programme of red-teaming based ...
Case study presentation: Tackling the insider threat – understanding what the risk is through real world examples and how to create an insider threat programme that mitigates that risk Dave Boda Ensuring evidence-based visibility into user activity to reduce investigation timeMaking uncovering the intent of the ...
Threat trends in 2020 and beyond; Deep fakes, misinformation and reputational attacks Eamonn Keane , Joseph Carson , Dr Janet Bastiman , Nitin Devanand Meeting the challenge of destructive and disruptive attacks from defence in depth intended to deter ...
Case study presentation: ‘How secure are we?’: Bringing together cyber, physical and personnel security to address risk, deliver compliance and benefit from common processes Peter Gibbons Increasing overlap between security issues/threats that no longer fit within the silos of physical or ...
Case study presentation: The CISO Balancing Act: Getting the right balance between risk management and resilience Mark Chaplin N/A
Evaluating and minimising information security risks across multi-Cloud estate Thom Langford , Nick Taylor , Marco Rottigni , Francesco Cipollone Best practice in identifying, mitigating and managing cloud risksDeveloping a consistent organisation view of cloud ...
Case study presentation: Developing and retaining your cyber security professionals using career road-mapping and skills competency frameworks Bharat Thakrar Defining your organisation’s expectations for Foundational, Industry-related and Occupation-related competenciesWhich are the most critical security ...
Building a people-centric security strategy Matt Cooke More than 99% of all targeted attacks rely on your people to activate themHow do ...
Panel discussion: Recruitment, retention and diversity in information security – energising the talent market Ian Thornton-trump , Joseph Carson , Nicole Keeley , Holly Foxcroft Are some skills sets more transferable than others for cyber security careers?Moving away from a ...
Case study presentation: Cyber AI response in an era of Machine-Speed attacks Andrew Tsonchev The digital battleground has shifted from nation-states to corporations. With attacks causing damage in seconds, ...
Case study presentation: Threat Intelligence: Are you using it to prepare for a future breach? Justin Wells N/A
Panel discussion: Using blockchain for information security in identity management and compliance Dr Martinho How can information security specialists engage with this technology?Insight in the adoption opportunities and challenges ...
Plenary panel discussion: Protecting your human resources: Strategies to identify and avoid Information Security professional burn-out during the day-to-day and during a crisis Ian Thornton-trump , Allan Alford , Deborah Haworth , Paul Watts , Marilise De Villiers How to recognise burn out in your team and yourself, and ways in which we ...
Plenary panel discussion: The InfoSec Leaders’ Legal Briefing: GDPR, Brexit and Data protection changes in global, regional and national jurisdictions Dan Whitehead , Joel Harrison , Marta Dunphy Moriel GDPR – Profiling Overview including; Data; Subject; Fundamental RightsArticle 22 – Interpretational challenges for sole ...