Programme:

08:30
Registration - coffee - networking
09:00
Chairs Opening Address & House Keeping

Sarah Armstong-Smith

•             Ushering in a new year

•             The changing threat landscape: a look back at the key themes from 2023

•             A race against time for 2024

09:30
The Business of Security: Communicating Risk to the C Suite

Greg Notch

Economic trends have tightened purse strings globally, leaving CISOs and security leaders everywhere to demonstrate ROI and defend their budgets with gusto. But bridging the gap between security initiatives and actual business impact can be easier said than done—particularly if your message is falling flat with the C-suite and board members. This session shares practical tactics for communicating how security solutions and initiatives enable the business to achieve its strategic outcomes. We’ll discuss cutting through the jargon and quantifying ROI with the right metrics to ensure your bottom line translates to leadership—saving your budget and reducing overall risk.   

09:45
In the moment nudges – What? How? Applying nudge theory to awareness

Tim Ward

What would it be like to be “there”, just when you were needed, to offer a tap on the shoulder and steer your colleagues in the right direction when they were about to do something risky? Click a link, plug in a USB, upload a file, give away their credentials…? This takes nudge theory to its logical conclusion – timely, in the moment and even measurable. In this talk, Tim will touch on why we should be looking at nudge theory, what makes a good nudge and why, how to run a campaign to steer behaviours, and the potential impact this approach can have. He will also offer some takeaways on how to apply nudge theory, behavioural and learning science to your own awareness campaigns as you build up towards real-time nudges.

10:00
We must speak the language of our audience or we won't be listened to!

Lee Morton

Most board members don't speak Cyber and we need to learn their language. In this talk I will explain American Football in the terms of Cyber Security. Showing that as long as you can speak the language of your audience even the most complex topics can be explained.

10:20
Jen, we have a problem…

Your worst day at work, you’re the person responsible for security and you learn that your organisation has been hit by a cyber attack impacting client data. It’s all very well and good being told that you should have had policies, security controls etc but what should you do right now?
This talk will look at what you should do in the moment including..
• Preparing for a cyber incident
• The changing expectations of insurers
• Executing the plan under pressure
• Returning to normal
 

10:35
Retail Rodeo: Wrangling Data, Compliance and Security in the New Wild West of Omnichannel

Darcy Delich-Coull

Retail Rodeo: Wrangling Data, Compliance & Security in the new Wild West of Omnichannel" will provide valuable insights into the challenges, common mistakes, risks, and best practices within the ever-evolving world of omnichannel retail. By effectively managing data privacy, ensuring compliance at every turn, and prioritizing all aspects of security, we can navigate the "Wild West" and embrace the new digital customer experience that the current and future shopper expects.

10:50
From Uncertainty to Leadership: Navigating the Path to Chief Information Security Officer

Hazel McPherson

In today's dynamic cybersecurity landscape, the journey to becoming a Chief Information Security Officer (CISO) can seem impossible, especially for those with no idea what they want to do when they grow up! Through insightful personal narratives attendees will gain valuable perspectives on career successes (and failures), leadership development, and actionable steps for individuals at various stages of their career.

11:15
Coffee & Networking
11:45
Choose one of two streams

Click here to see the full schedule of streams on offer

12:15
Seminar Change Over
12:20
Choose one of two streams

Click here to see the full schedule of streams on offer

12:50
Lunch and networking
13:50
Chairs Afternoon Address

Sarah Armstong-Smith

14:00
How to train your dragon

Daniel Selman

In this session Daniel will explore the challenges of implementing a successful Data Protection Programme, how you identify what needs to be done and gain the support of leadership and the organisation to deliver the necessary changes.

14:30
Changing the Nature of Security Operations

Patrick Grillo

While Security Operations is most often associated with what has already happened, the nature of today’s networks and threat landscape requires that Security Operations make the transition from a reactive to a proactive posture. This requires the integration and automation of multiple threat detection and response technologies under the Security Operations umbrella to keep pace with the evolving threat landscape.

14:45
Wearable, Shareable... Unbearable? The IoT and AI Tech Nobody Asked For but Cybercriminals Love!

Lianne Potter

Jeff Watkins

In a world of 5G (no conspiracy theories please!) smartphones, smart TVs and smart homes, we're inviting more tech into our lives than ever. We're sleepwalking into a future nobody asked for, but maybe many fear. How always-on Microphones, Cameras and AI are creating a "digital panopticon" none of us probably want or need, unless you're Amazon. Should we become "digital preppers"? Is the privacy and security risk so high, what are the stakes? This is an anthro-technologist view on how dumb an idea the smart revolution is and how we've eroded our social contracts in favour of big tech.
 

15:10
Beyond the Buzzwords: How Security Automation Can Transform Your Program into a Force Multiplier

Imagine a security program where threats are neutralized in an instant, where analysts are freed from mundane tasks, and where your entire security posture takes a quantum leap forward. This isn't a futuristic dream, it's the reality promised by security automation.

Join us as we dissect the "what" and "why" of automation, going beyond the buzzwords and hype to reveal its transformative power. We'll map out the automation journey, charting a course from your current state to a future of lightning-fast response, proactive defense, and empowered teams.

15:25
Coffee and networking
16:00
‘Fire-side chat’ with Deborah Meaden

Deborah Meaden

BBC Dragon Den’s Deborah Meaden

Business leader, investor, TV personality & writer, well known for her appearances on the BBC’s Dragon’s Den.

Deborah launched her own glass & ceramics export company straight out of Business College & then went on to set up one of the first Stefanel fashion franchises in the UK.

Deborah later became Managing Director of the holiday park business Westar Holidays, acquired the major shareholding in a management buyout & later sold the company in a deal with Phoenix Equity Partners worth £33m whilst retaining a 23% stake

She is known for her environmental & ethical focus as well as being a ‘shrewd & reasonable Dragon.’

Sarah Armstrong-Smith

Microsoft Chief Security Advisor, Independent Board Advisor, Best-Selling Author, Keynote Speaker, & Fellow of the British Computer Society (BCS).

Sarah is Chief Security Advisor in Microsoft’s Cybersecurity Solutions Area.

She principally works with customers across Europe to help them evolve their cybersecurity strategy to support digital transformation & cloud adoption, to build stronger defences against cyberattacks.

Sarah’s latest book ‘Understand the Cyber Attacker Mindset’ explores the psychology of cyber warfare & how organisations can defend themselves from attack.

Prepare for a fascinating hour! 

17:00
Chairs Closing Remarks

Sarah Armstong-Smith

17:10
Drinks Reception