Cloud&CybersecurityExpo 2020 March 24, 2020 to March 25, 2020, London, UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Ensuring enterprise-level security in complex cloud environments N/a Many large businesses are adopting complex cloud environments which offer great flexibility, scalability and privacy ...
Keynote: How CISOs Secure Digital Transformation to Drive Business Growth Otavio Freire Why is the average tenure of executive infosec professionals around 18 months? Because security departments ...
Keynote: HackedIn via LinkedIn Jake Moore Watch Jake unfold a targeted phishing attack on the CEO of a company and how ...
Keynote: It's all about the people Kevin Fielder Automated Security Information and Event Management promises to save IT departments countless tedious hours analysing ...
Keynote: Cyber AI Response in an Era of Machine-Speed Attacks Andrew Tsonchev The digital battleground has shifted from nation-states to corporations. With attacks causing damage in seconds, ...
PANEL: Navigating the staffing challenge within security teams Kevin Valiji There are huge shortages of skilled cyber security staff and many organisations are forced to ...
Real world cyber-attacks: How criminals are encrypting all your things and getting away with it! Daniel Card N/A
PANEL: With new tech comes new vulnerabilities Chris Tsonchev We have already seen AI used to automate tasks, speed up processes, and detect anomalies. ...
small r, BIG R: The future of breach detection & response Dan Pitman The cybersecurity industry is maturing and taking a step towards an outcome orientated approach that ...
The Evolution of Cybersecurity Protection. Why Response is Key to Defending Against Multidimensional Attackers. Alex Jinivizian In this session, Alex will discuss how digital transformation has turned the traditional view of ...
Insider Threat - your biggest risk may be on your payroll Richard Agnew Recent studies report that 90% of insider data loss, leak and theft goes undetected internally. ...
PANEL: How can we defend and protect? Paul Tunnicliffe We’re facing a constant battle of trying to get ahead of hackers. But how can ...
Tackling cybercrime - a law enforcement perspective Helen Williams How UK policing are tackling cybercrime. Pursuing those who seek to exploit how we live ...
It's Tough Love - Validate Your Network Risk Daily Steve Armstrong N/A
Future Shock: the cloud is the new network Gemma Allen Today, solutions like Microsoft Azure Virtual WAN are a great alternative to traditional MPLS based ...
Beyond Gateway defense Gemma Allen In this session we will learn how best to identify the gaps in your network, ...
Passwordless authentication: how to balance security and usability John Gilbert As companies continue their journey in digital transformation, combining the best user experience with the ...
The Fifth Dimension of Warfare - Dissecting Adversarial Tactics and Techniques Liviu Arsene Cyber is now the fifth dimension of warfare and adversaries are using tactics and techniques ...
Thinking Out Cloud - 2020 Stu Hirst N/A
Cloud Security: The 3600 Shared responsibility Model Nigel Hawthorn Cloud security is a team sport – and it requires people from security, networking, GRC, ...
Protecting the Art: People, Data and Things George Tunnicliffe N/A
Finding Clarity in the Cloud Richard Beckett Cloud security is simpler than you think. A recent winner of CRN’s Coolest Cloud Companies ...
The Understated Link Between Linux Threats and Cloud Security David Kellerman In the antivirus industry a large emphasis is placed on protecting Windows endpoints. Windows desktop ...
Open Source: Friend or Foe ? Noah Caplan Open Source - The last 10 years have seen a massive proliferation in the use ...
Moving on Up: A New Approach to Segmentation in Any Cloud Trevor Dearing Enterprises today face competing priorities. Compliance burdens require internal segmentation of increasingly hybrid environments to ...
What is DevSecOps? Lessons from the field. Wendy Ng. N/A
8 Million Findings in One Year: Fresh Look at the State of Software Security John K. Smith What can we learn from 8.3 million software security findings? Plenty, and the presenter has ...
Tales from the Neustar SOC Ben Charles Learn about the key attacks that Neustar has mitigated on behalf of its customers over ...
Applications of blockchain technology in the real world Shanti Recinos N/A
Minimize Your Data, Minimize your Risk Jeff Sizemore Everybody knows that unstructured data growth is out of control; we’ve all heard the stats. ...
Scaling privacy in agile organisations Veroniki Stamati Traditional privacy governance models with centralised controls and oversight do not align well with agile ...
Privacy, Confidentiality and Anonymity in blockchains Leon Molchanovsky N/A
Beyond data encryption. How uniscon’s Sealed Platform for confidential cloud computing helps organizations to meet regulatory compliance and mitigate risks Jörg Horn N/A
PANEL: Creating a solid governance risk framework Scott Stamati First GDPR, and now CCPA. The regulation train is fast approaching and there’s no way ...
Supplier DD / Audit Fatigue / Paralysis - Hear from a suppliers perspective how to deal with death by due diligence. Duncan Mcdonald What protection mechanisms are there around sensitive data?Our recommendations if you are a supplierOur recommendations ...
Inside-Out Data Security Tad Mielnicki Envisioning a new model for data governance that begins and ends at the source of ...
Third party outsourcing and operational resilience in the cloud Nigel Gibbons Nigel Gibbons will provide the audience with an introduction to third party resilience within the ...
Cloud Data Sovereignty and the CLOUD Act Sab Knight IONOS' Sab Knight will point out how you can maintain data sovereignty while serving your ...
Five Key Strategies to Reduce Third-Party Risk Ian Walter As organizations move to outsource more of their services, operations, and network infrastructure, the focus ...
Faster Compute through IoT Network Security Sam Rhea N/A
SOTI One Platform, Securing IoT Management Solutions and Supporting the Mobile Digital Transformation Dan Brown Using Mobility Device Management software you can transform business processes and increase the efficiency and ...
In PKI we trust: Securing a Digital World Daniel Genadiev N/A
Transforming Identity and Access Management at the BBC Ros Smith N/A
The Emergence of ICSaaS Nadeem Khan While the role of cloud in ICS is in its infancy, the expected uptake of ...
PANEL: Highlighting the gaps in security Javvad Malik , Mark Morfill People are often described as the weakest link in your organisation, however they could in ...
What is Missing from your Security, Datacentre and Cloud Infrastructure? Richard Foulkes Businesses are rapidly moving away from the traditional data centre and security solutions that they ...
Information Security Strategy: Snog, Marry, Avoid N/a A strong information security strategic plan puts an organisation in a strong place to mitigate, ...
Exert Control Over Your IT Environment: Strategies for a Hybrid and Multi-Cloud World Darren Guccione With organizations now leveraging an average of five public and private clouds, IT administrators are ...