Programme:

08:30
Registration - coffee - networking
09:00
Chair's opening address

Colonel (Retd) John Doody

Security in 2018

  • The changing face of cyber crime: 2018’s cyber threats and new methods to protect against them
  • The risks and costs of cybercrime to businesses
  • Cyber skills: The importance of education and hiring the right people
  • GDPR: The importance of compliance and timetable for success 
09:05
Security in 2018

·       The changing face of cyber crime: 2018’s cyber threats and new methods to protect against them

·       The risks and costs of cybercrime to businesses

·       Cyber skills: The importance of education and hiring the right people

·       GDPR: The importance of compliance and timetable for success

09:20
How compliance regulation, threat intelligence and machine learning will impact cybersecurity in 2018
  • Takeaways from 2017, the stories that made the headlines (and some which should have!)
  • The role of forensic reporting in threat hunting and data protection
  • Life after GDPR
  • Why the insider threat will continue to diversify, and how to keep up
09:35
Malware Attacks: History and Future

Holly Grace Williams

An adventure through the malicious software attack timeline. Examining the history of malicious software, the advent of advanced persistent threats and recent developments in automated malicious attacks. Explaining how recent malware is performing actions considered advanced for malware, but run-of-the-mill for security testers. Covering recent data in the area nation-state attacks and crime group developments - such as changes in modern ransomware. Drawing conclusions for the future suggesting that things might soon get worse.

10:00
The National Cyber Security Centre

It is claimed the National Cyber Security Centre will make the United Kingdom the safest place to live and do business online. This session will offer a detailed insight into the National Cyber Security Centre opened by the Queen in February 2017, including:

 

·       What is the centre and why was it established?

·       What resources does it offer to businesses?

·       How will it specifically impact Manchester and the surrounding areas?

·       How will it help bridge the cyber security skills gap?

10:15
The changing face of cyber crime: who are the perpetrators and what do they want?

Cyber crime is constantly evolving. So who are the people trying to attack our systems and what do they want? This presentation will outline:

 

·       Who are the perpetrators? Including nation states, hacktivists, terrorists, and criminals attracted by financial gain

·       What do they want? Money, data, reputational damage?

·       Examples of high profile attacks including the recent Islamist NHS hack

·       What businesses can do to protect themselves

10:30
Coffee & Networking
11:00
30 minute seminar

Please Click here for seminar information.

11:30
Lunch and networking
13:00
30 minute seminar

Please Click here for seminar information

13:30
30 minute seminar
14:00
Chairs Afternoon Address

Colonel (Retd) John Doody

14:05
Big data in security

Big data – referring to the vast amounts of data produced by businesses and companies – is now a well-used term. So how can it help in security?

This session will cover:

 

·       How big data analytics can help detect and mitigate attacks

·       The ways in which systems are becoming more intelligent with the use of artificial intelligence and machine learning

·       Security systems of the future – mitigating attacks without human intervention

14:30
The presentation topic is: “GDPR compliance and your cyber security programme” and will be covering:

Tony Drewitt

  • The impact of obligations imposed by the General Data Protection Regulation (GDPR) on cyber security in public sector organisations
  • Cyber security and privacy – common challenges and solutions
  • The practical steps to initiating a GDPR compliance programme.
14:45
Is DNS a Part of Your Cyber Security Strategy?

Rob Bolton

Detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks, being part of a data loss prevention program– DNS can help with this and much more, but are you leveraging it as part of your security controls and processes? 

DNS is the perfect choke point to stop not just data exfiltration through it, but also detect and stop malware from spreading and executing.

In this session, you'll learn:

  • The value of DNS as part of your cyber security strategy
  • How DNS can provide your SIEM with actionable intelligence
  • How DNS can add value to other security controls, such as vulnerability scanners and end point protection

Join Infoblox for a discussion on this often overlooked topic

15:00
Protecting yourself & your business against the threat of Cybercrime

Jennie Williams

With cybercrime in the news on an almost daily basis it is important to understand how you can take steps to protect both yourself and your business from this crime.  Jennie Williams, Cyber Protect Officer from Titan – the North West Regional Organised Crime Unit will help you to understand what threats exist and some steps you can take to help protect yourself.

15:20
Coffee and networking
16:00
Talk and Q&A with our key note

Geoff White

Coming soon

16:55
Chairs Closing Remarks

Colonel (Retd) John Doody

Supported by: