Registration - coffee - networking
Chair's opening address

Colonel (Retd) John Doody

Security in 2018

  • The changing face of cyber crime: 2018’s cyber threats and new methods to protect against them
  • The risks and costs of cybercrime to businesses
  • Cyber skills: The importance of education and hiring the right people
  • GDPR: The importance of compliance and timetable for success 
The National Cyber Security Centre

It is claimed the National Cyber Security Centre will make the United Kingdom the safest place to live and do business online. This session will offer a detailed insight into the National Cyber Security Centre opened by the Queen in February 2017, including:

  • What is the centre and why was it established?
  • What resources does it offer to businesses?
  • How will it specifically impact Manchester and the surrounding areas?
  • How will it help bridge the cyber security skills gap?
GDPR: The timetable for success

The General Update to Data Protection Regulation (GDPR) is due to come into force in May 2018. Companies have less than a year to comply. Adding to this is the uncertainty for businesses ahead of Britain’s exit from the EU in 2019. This session will cover:

  • The countdown: What firms should be doing now and the strategy that should be in place
  • How can firms ensure they comply by May 2018?
  • Data protection officer: the options
  • Brexit: Will there be any changes after Britain exits the EU?
  • Dealing with European companies: the importance of compliance 
The changing face of cyber crime: who are the perpetrators and what do they want?

Cyber crime is constantly evolving. So who are the people trying to attack our systems and what do they want? This presentation will outline:

  • Who are the perpetrators? Including nation states, hacktivists, terrorists, and criminals attracted by financial gain
  • What do they want? Money, data, reputational damage?
  • Examples of high profile attacks including the recent Islamist NHS hack
  • What businesses can do to protect themselves
Using AI to stop Ransomware: A Real-Life Case Study on how the Enterprise Immune System Detected and Responded to Wannacry

Using AI to stop Ransomware: A Real-Life Case Study on how the Enterprise Immune System Detected and Responded to Wannacry

In this session, learn about: 
•    The implications of ransomware and why traditional security tools are not sufficient to defend against it 
•    Using machine learning and artificial intelligence to identify the Wannacry attack before it was able to spread
•    How to achieve 100% visibility of your network 
•    Defending against subtle, novel attacks in the future using an ‘immune system’ approach

Coffee & Networking
Two 45 minute seminars will be available to choose from

Please Click here for seminar information.

Lunch and networking
Two one hour seminars will be available to choose from

Please Click here for seminar information

Chair's afternoon address

Colonel (Retd) John Doody

GDPR: the business drivers

Businesses are quite rightly concerned about complying with the Update to General Data Protection Regulation. But much of the focus is negative, when organising data can in fact be a business benefit. This session will cover the business benefits that can be enjoyed by firms that get their data in order including:

  • Streamlined data and better analytics
  • Replacing legacy systems
  • Improving business processes 
GDPR: Understanding encryption

One of the key technologies involved in complying with the update to data protection regulation is encryption. However, many companies find the idea complex.

This presentation will examine:

  • Why encryption is an essential tool to GDPR compliance
  • Why some companies are failing to implement the technology across all applications
  • Real life examples showing why it is needed
  • The optimum encryption strategy for GDPR compliance 
Capital One Presentation

Stu Hirst


Fake news: How does it affect companies?

Fake news is a much used term following the election of Donald Trump. It can be created by a state actor or a rival company, and the results can be devastating.

This session will cover:

  • High profile examples of fake news
  • How the creation of fake news is often itself a cyber attack
  • The damage caused by fake news – including its impact on a company’s reputation
  • What can be done to prepare for the fake news threat
Securing your Journey to the Cloud

·        The security challenges for businesses when moving data to the cloud

·        Current data protection legislation and the impending GDPR: warnings and takeaways

·        Cloud architecture and information centric security as a critical consideration

Coffee and networking
The state of cyber security in the public sector and within local authorities

The public sector deals with huge amounts of data. It is increasingly realising this information can be used to better serve citizens, offering them more personalised and relevant services. However, these vast amounts of data also pose a security risk. This session will look at:

  • The specific threats faced by governments
  • Real life examples of government hacks
  • How data can be protected
  • Governments and GDPR
Case study: Cyber security in the financial sector

Junaid Farooqui

The financial sector is a prime target for cyber criminals. Staying secure as a bank also involves complying with vast amounts of complex regulation. Amid this complex landscape, a leading bank such as HSBC or Barclays talks about the threats faced by banks today and reveals how they are fighting these while complying with regulation. 

Chair's closing remarks
Event Close
Drinks Reception


Supported by: