Title |
Speakers |
Summary |
Topic Types |
Keynote: Password administration for system owners: The NCSC strategies that can help your organisation remain secure |
N/a
|
Understanding the decisions to be made when determining password policyGuidance on implementing password policies which ... |
|
Keynote: Technology ethics: How can we create and use technologies so that they deliver maximum benefit and pose minimum harm? |
Dr Stephanie Hare
|
How can ethical frameworks be deployed across a diverse range of stakeholders?The four areas which ... |
|
Panel discussion: Security and Privacy by design: How can information security leaders ensure their organisations avoid a “bolt-on” approach and minimise risk |
Deborah Haworth
,
Dr Stephanie Hare
,
Barry J Coatesworth
,
Barry Mcmahon
|
Where and why does DevSecOps work, and how can Information Security professionals ensure security is ... |
|
Keynote: The Information Commissioner’s Office GDPR investigations and decisions, and expectations in 2020 and beyond |
Stephen Eckersley
|
GDPR investigations and justification behind the decisions on the prominent fines of British Airways and ... |
|
Roundtable discussion: Why prevention has failed Insider Threat |
Paul Martin
|
Are you able to successfully avoid data loss surprises as a result of employee departures?90% ... |
|
Roundtable discussion: Enhancing red and blue teaming with Breach and Attack Simulation |
Tim Ager
|
N/A |
|
Roundtable discussion: Defending your cyber space with a Threat Intelligence programme |
Ian Thorton-trump
|
What is the consensus view of common definitions, understanding and business value of Cyber Threat ... |
|
Roundtable discussion: How do you ensure simple and secure Access Management? |
Charles James
|
What are the challenges that you are facing in the post-perimeter world?How can you be ... |
|
Roundtable discussion: Why would I outsource my SOC? |
Martin Cook
|
How would I identify a threat against or on my network? Am I compromised now?What ... |
|
Roundtable discussion: State of Security and the State of SOAR |
Toby Grift
|
Where do you start security automation? Where does security automation end?Where does DevOps fit into ... |
|
Roundtable discussion: ISO27001 and the GDPR: Identifying overlap and streamlining efforts |
Adam Macgillivray
|
Map the most common security operations standard, ISO 27001 to the world’s most influential piece ... |
|
Roundtable discussion: Risk Exchanges: The key to vendor risk management efficiency |
Ryan Manyika
|
Your vendors often handle your most sensitive data.This presents new challenges as third-party risk, security, ... |
|
Roundtable discussion: Securing the Human – 90% of critical data breaches are the result of human error. How are you securing against what you don’t know? |
Thom Langford
|
Securing the human is one of the toughest challenges facing us today; how can we ... |
|
Roundtable discussion: How are you taking the MITRE ATT&CK Framework from plan to action? |
Lee Langley
|
Why should you use it?How are you adapting the framework to your company’s environment and ... |
|
Roundtable discussion: How do you detect and manage your internal threats? |
Jeremy Swinfen Green
|
What is an internal threat?Why do internal threats happen?How do you detect them?How do you ... |
|
Roundtable discussion: How to secure your data in the cloud? |
John Michael
|
The importance of securing your data in the cloud and the challenges that organisations face ... |
|
Case study presentation: Securing innovation at the speed and scale of DevOps |
David Okeyode
|
Why a classic approach to security is no longer scalable, sustainable or rapid enough in ... |
|
Case study presentation: Strategies to quantify your organisation’s cyber risk, and making your messages effective at board level |
Dr Keyun Ruan
|
Translating C Suite priorities to your security teamCommunicating threats and risks upwards to your C ... |
|
Case study presentation: A CISO’s Guide to Continuous Security Testing |
Tim Ager
|
Using pen testing, vulnerability assessments, and other traditional testing methods, the security team can evaluate ... |
|
Case study presentation: Overcoming CISO Communication issues and the issue of cybersecurity excuses |
Allan Alford
|
N/A |
|
Case study presentation: Aligning home-life security and company security: Making your people the CISO of their own homes |
Sarb Sembhi
|
Instilling the concept that security belongs to everyone in the organisationFocusing on awareness – in ... |
|
Case study presentation: Short-cut Thinking: Working with human nature in security awareness and training |
Bridget Kenyon
|
What is behavioural economics, and how can it derail successful security training?Building a security culture ... |
|
Panel discussion: The ways that your security awareness programme is failing, and what you should do about it |
Lucy Payne
,
Reena Shah
,
Daniela Somerscales
,
Dora Ross
,
Oz Alashe
|
Should awareness focus on implementing good security related behaviours?The failing of the hacker mentality and ... |
|
Case study presentation: Secure authentication: balancing security and usability |
John Perkins
|
How to create a seamless authentication experience for customers and employeesLearn about the strongest level ... |
|
Case study presentation: Harnessing Artificial Intelligence – Making AI an enabler for cyber professionals rather than an imminent threat |
Naina Bhattacharya
|
False positives or ‘innocent anomalies’ are a huge distraction for over-stretched security teamsHow can a ... |
|
Panel discussion: Threats in the supply chain: Balancing your internal and the external requirements and competing risk agendas |
Quentyn Taylor
,
Holly Grace Williams
,
Naina Bhattacharya
,
Mike Seeney
|
Which compliance questions reveal the biggest security risks with 3rd parties?Alternative approaches to identifying risk ... |
|
How to create and sustain a high-performance security culture |
Dr Dave Chatterjee
|
Is a lack of organisational commitment to proactively prepare and execute effectively the difference between ... |
|
Keynote presentation: Empower your people, strengthen your culture and reduce your cyber risk |
Dr Jessica Barker
|
N/A |
|
Panel discussion: Tailoring your security awareness programmes to overcome colleagues’ inbuilt biases |
Dr Jessica Barker
,
Dr Dave Chatterjee
,
Dr Villiers
|
The importance of establishing benchmarks before engaging in any change exercise, both qualitative and quantitativeRecognising ... |
|
Case study presentation: High-end, regulatory-driven, red-teaming: What are the techniques and how quickly are they evolving? |
Ken Munro
|
How the depth of your security assurance isn’t good enoughDeveloping a programme of red-teaming based ... |
|
Case study presentation: Tackling the insider threat – understanding what the risk is through real world examples and how to create an insider threat programme that mitigates that risk |
Dave Boda
|
Ensuring evidence-based visibility into user activity to reduce investigation timeMaking uncovering the intent of the ... |
|
Threat trends in 2020 and beyond; Deep fakes, misinformation and reputational attacks |
Eamonn Keane
,
Joseph Carson
,
Dr Janet Bastiman
,
Nitin Devanand
|
Meeting the challenge of destructive and disruptive attacks from defence in depth intended to deter ... |
|
Case study presentation: ‘How secure are we?’: Bringing together cyber, physical and personnel security to address risk, deliver compliance and benefit from common processes |
Peter Gibbons
|
Increasing overlap between security issues/threats that no longer fit within the silos of physical or ... |
|
Case study presentation: The CISO Balancing Act: Getting the right balance between risk management and resilience |
Mark Chaplin
|
N/A |
|
Evaluating and minimising information security risks across multi-Cloud estate |
Thom Langford
,
Nick Taylor
,
Marco Rottigni
,
Francesco Cipollone
|
Best practice in identifying, mitigating and managing cloud risksDeveloping a consistent organisation view of cloud ... |
|
Case study presentation: Developing and retaining your cyber security professionals using career road-mapping and skills competency frameworks |
Bharat Thakrar
|
Defining your organisation’s expectations for Foundational, Industry-related and Occupation-related competenciesWhich are the most critical security ... |
|
Building a people-centric security strategy |
Matt Cooke
|
More than 99% of all targeted attacks rely on your people to activate themHow do ... |
|
Panel discussion: Recruitment, retention and diversity in information security – energising the talent market |
Ian Thornton-trump
,
Joseph Carson
,
Nicole Keeley
,
Holly Foxcroft
|
Are some skills sets more transferable than others for cyber security careers?Moving away from a ... |
|
Case study presentation: Cyber AI response in an era of Machine-Speed attacks |
Andrew Tsonchev
|
The digital battleground has shifted from nation-states to corporations. With attacks causing damage in seconds, ... |
|
Case study presentation: Threat Intelligence: Are you using it to prepare for a future breach? |
Justin Wells
|
N/A |
|
Panel discussion: Using blockchain for information security in identity management and compliance |
Dr Martinho
|
How can information security specialists engage with this technology?Insight in the adoption opportunities and challenges ... |
|
Plenary panel discussion: Protecting your human resources: Strategies to identify and avoid Information Security professional burn-out during the day-to-day and during a crisis |
Ian Thornton-trump
,
Allan Alford
,
Deborah Haworth
,
Paul Watts
,
Marilise De Villiers
|
How to recognise burn out in your team and yourself, and ways in which we ... |
|
Plenary panel discussion: The InfoSec Leaders’ Legal Briefing: GDPR, Brexit and Data protection changes in global, regional and national jurisdictions |
Dan Whitehead
,
Joel Harrison
,
Marta Dunphy Moriel
|
GDPR – Profiling Overview including; Data; Subject; Fundamental RightsArticle 22 – Interpretational challenges for sole ... |
|