Day 2 Agenda

-
Welcome and Introduction
Speaker
Delta Site Editor
Computing
-
How AI can think like an attacker

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

Speaker
VP, Tactical Risk & Response
Darktrace
-
Managing threats through different lines of defence: A security engineer’s perspective

Today there are many different security teams, who are hired by the organisation to protect us through three different lines of defence. Let's discuss the differences between those and identify:

  • What are the security standards we should be aligning to while making sure we are security compliant
  • How to develop policies and rulesets to identify misconfigurations
  • How to deal with threats when those occur in real-time
Speaker
Security Operations Lead
Deliveroo
-
In Conversation with Charles Ewen
Speakers
CIO
Met Office
Globlal Senior Vice President, Content
Computing
-
Case study: What actually happens when dealing with a cyber attack on your supply chain? A war story

Hear from technology vendors on the most innovative solutions driving the cybersecurity sector forward 

Speakers
Head of Information Security
L&Q
Senior Director, Cloud Strategy
11:11 Systems
-
Fireside Chat: Best practices for defending against ransomware and top security threats and taking advantage of cyber insurance and security in multi-cloud

Speakers
Group Information Security Officer
PIB-Insurance
Delta Site Editor
Computing
-
Networking break
-
Fireside Chat – Mirrored Security: Managing security across frameworks

Keeping any organisation safe from hacks, breaches, and takeovers requires strong and clear procedures and a team that can follow them precisely. For group heads of security maintaining that consistence across multiple organisations and teams can seem almost impossible. Hear from a security expert on:

  • How to demonstrate to the board a return on their investment in cyber security
  • How do you ensure that all acquired organisations brought onboard adhere to same security framework?
  • What extra measures organisations can begin to take both on and off-prem to ensure a high level of security
Speakers
Chief Information Officer, Director
Waverton Investment Management
Associate Editor
Computing
-
Panel Discussion – Bridge the Expectations Gap Between End Users & Cyber Insurers

Cyber threats evolve at a faster rate than defensive solutions. Coupled with an end user community that is often behind the curve both in terms of equipment and education, and the result is cyber insurance providers becoming increasingly risk averse, and end-users increasingly vulnerable to the financial impact of costly breaches. This panel aims to bridge the expectations gap between commercial cyber insurers and their customers, allowing for more affordable and comprehensive cyber coverage.

  • Understand which tools, both in terms of software and hardware, cyber insurers expect customers to have in place in order to allow underwriters more comfort with proliferating cyber risk
  • Develop a strategy that protects your business from cyber risk including ransomware, account takeover and DDoS (distributed denial of service)
  • Diagnose the most urgent vulnerabilities that exist within your organisation and methods your team can use to prevent them being exploited by would-be-attackers.
Speakers
Chief Information Officer, Director
Waverton Investment Management
Head of Information Technology
Saunderson House
Head of Information Technology
Thrive Homes UK
Associate Editor
Computing
-
Networking & refreshment break

-
Cybersecurity - Legal Landscape and Real-World Issues

This session will outline key UK/EU laws affecting cybersecurity (GDPR, NIS), including their main requirements, risks and real-world practical issues. It will conclude with a look ahead at UK/EU cybersecurity laws on the horizon.

Speaker
Of Counsel
Dentons
-
Fireside chat: A US Perspective: Creating a Cybersecurity Roadmap

Speakers
Director
Repligen
Research Director
Computing
-
Automating Cybersecurity: RMM is Your First Line of Defense for Remote Work

The cybersecurity scare is real but with a best-in-class RMM solution, you can beat cybercriminals at their own game. That's right, your RMM is a security solution even for remote workers!

A top notch RMM can not only improve your security posture and reduce the risk of an attack, but also save you money and precious time by automating important security processes such as patching, detecting threats, and auto-remediating incident recovery.

Tune in to learn tips and tricks for closing the door on ransomware, solving vulnerabilities, and monitoring for and remediating breaches. Secure your clients and business to free up your time for higher-value work or spending more time with your family

Speaker
Senior Director of Product Marketing
Kaseya
-
How To Stop Hacks In Their Tracks With Improved IT Visibility

How To Stop Hacks In Their Tracks With Improved IT Visibility With the number of cyberattacks rising each year, the risk of neglecting cybersecurity awareness and visibility of network weaknesses continues to grow. For every business, the prospect of a breach occurring is no longer an “if” - it is more of a “when”. As the cost of cybercrime rises to $5 trillion, IT professionals must be prepared to reduce this risk as the threats of today's cyber world accelerate. Robust defences can only be built with an "x-ray" vision into one's IT environment.

In this session you will discover how to:

  • Defend your network from being exploited by identifying and addressing IT issues and weaknesses
  • Get the 360 degree hackers view on your cyber defences
  • Stay ahead of the hackers by scheduling automated scans
  • Reduce risk by discovering hidden internal and external network vulnerabilities
  • Detect hidden internal threats caused by unauthorized network changes and unexpected user activity
Speaker
Vice President, Products
RapidFire Tools
-
Thanks and closing remarks