Registration - coffee - networking
Chair's opening address

Colonel (Retd) John Doody

Security in 2019

  • The changing face of cyber crime: 2019’s cyber threats and new methods to protect against them
  • The risks and costs of cybercrime to businesses
  • Cyber skills: The importance of education and hiring the right people
  • Outlooks on AI & IOT
Tackling online crime; what are policing doing in the North West

Helen Williams

If cybercrime is such a big issue, what are the police doing to protect you?  How are we working to prevent young people becoming the online criminals of the future?  How can you be prepared for a cyber incident?  How are we pursuing online criminals and bringing them to justice?  Real –life examples of how the North West Regional Organised Crime Unit are working to disrupt criminals who are exploiting the speed, facelessness and convenience of the internet to commit a range of crimes.

"How to find control & Zen through common sense A pep talk for IT professionals"

Hans-Peter Ponten

In these modern times, we’re more and more looking to become Zen. We meditate, we blend fruits and veggies, and we try to block out the noise.
This works for most of us, except for IT professionals. If they started meditating, their company network would fall apart within seconds. Because as soon as they close their eyes, malware makes its move. This is why most IT professionals run around trying to protect their company network in every way possible. It’s fighting a losing battle, though, as IT security treats take an increasing variety of forms.
Why do we make IT security so complex?
If you ask Soliton visionary Hans-Peter, it’s because we’ve stopped relying on common sense. In order to keep out the ever-savvier hacker, today’s IT managers often stack as many security tools as they can find. This is a misconception, as more tools don’t always lead to better security.
In his pep talk, Hans-Peter will explain how you can use common sense to optimally secure your company network today and in the future. Not by working overtime, but by implementing some basic principles that help you become proactive and reduce risks to a minimum. This way, you can avoid problems before they even arise, making you a very Zen IT professional. 


Addressing the issues that matter

Charl van der Walt

Infosec’s overwhelming 400+ exhibiting vendors, promising to solve your security issues with a slightly different approach, but the same convincing tone, can certainly confuse end users on which direction to take. So how to set the priorities, make the right technology choices and appropriately assign your scarce human and financial resources?
Charl’s talk analyses eight critical issues and related compromises, providing a clear roadmap to help IT and security professionals focus on the real issues that matter and kill the noise!



Bringing order to the Office of the CISO

Maxine Holt

In decades gone by, information security was the responsibility of an IT person within the IT function. Today, the demands on information security continue to expand to such a level that some organizations have huge departments with hundreds of staff, whereas other enterprises must continue to battle cybersecurity challenges with few resources. Similarly, the Office of the CISO, incorporating the responsibilities of the CISO and the information security team, varies significantly between organizations. In this session Maxine Holt will define the Office of the CISO, explain its importance, and make suggestions as to how organizations of all sizes can begin to bring some order to this crucial function.

A New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

Bea Gully

•         Leveraging machine learning and AI algorithms to defend against advanced, never seen-before, cyber-threats.
•         How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time.
•         How to achieve 100% visibility of your entire business including cloud, network and IoT environments.
•         Why automation and autonomous response is enabling security teams to neutralise in-progress attacks, prioritise resources, and tangibly lower risk.
•         Real-world examples of subtle, unknown threats that routinely bypass traditional controls.

Anonymous Scandinavia exclusive Interview

Anonymous Scandinavia

We asked our subscibers for questions you would like us to put forward to Anonymous and we were overwhelmed with the number of questions we received and the top 10 questions have been provided to Anonymous and the interview will be shown exlcusively at The Future Of Cyber Security Manchester Conference.


The future for security in IT – it doesn’t have to be bleak

Mark Warren

There’s no doubt that IT systems are growing in complexity, especially with the adoption of AI, ML, RPA, Agile, AIOps, ... Combine that complexity with demands for faster change from business leaders, and it’s no wonder that security and risk management is becoming ever more challenging. A key to resolving these demands is managing access to critical services, applications and devices while not slowing down the business. As a result, every organisation should define and implement a privileged access management (PAM) strategy. Indeed, good PAM can even be an accelerator for the business. In this session, we’ll discuss the challenges and how PAM can be a key success enabler.


Coffee & Networking
One of two streams to choose from

Click here to see the full schedule of streams on offer

Seminar Change Over
One of two streams to choose from

Click here to see the full schedule of streams on offer

Lunch and networking
One of two streams to choose from

Click here to see the full schedule of streams on offer

Chairs Afternoon Address

Colonel (Retd) John Doody

How to become APT-Proof in 24 hours

Tim Ager

Organizations like yours are investing $15 million annually in information security. They’re doing everything right. From perimeter security to DLP to encryption and segmentation—their practices are best practices. In terms of optimizing their security posture, they’re already 80% there.
Yet big budgets, according to analysts don’t translate into better security, and CISOs of large companies don’t necessarily sleep better at night. So what is the 20%-equivalent of fine-tuning in the security world? What is the missing step to knowing you are truly secure from an APT attack?
Due to their multi-vector nature, defending against APTs require seamless configuration and integration of solutions across your digital estate—ensuring protection against pre-exploitation, exploitation and post-exploitation techniques, tactics and practices (TTPs).

Weaponising data: the dark nexus of hackers, journalists, data traders and corporate raiders

Geoff White

Investigative journalist Geoff White, author of a forthcoming book on cyber crime, delves into the murky links between hacking and the media.
Over the last decade hackers have demonstrated how data leaks can be used to devastating effect on a victim organisation.
These lessons have not been lost on nation-state hacking teams and organised cybercriminals, who have mastered the news cycle and co-opted journalists to achieve their destructive ends.
Geoff explores this growing confluence of interests through examples of corporate ruination and reputational damage, and probes where the trend might go next.


Leveraging context to achieve Zero Trust

Mark Cassetta

As organisations started to embrace the need to identify and secure data, the Zero Trust framework was developed to provide a very clear architecture for a practical, yet effective, security. Among other things, Zero Trust shifted security focus away from external attacks and towards a strategy of data protection everywhere. With securing data becoming the ultimate goal, it has become clear that not one technology solves this problem - it is a culmination of an ecosystem that can come together to effectively execute on a Zero Trust strategy and secure data.  

Titus SVP Strategy, Mark Cassetta believes context is the missing ingredient that ties a security eco-system together and will explain how enterprises can leverage automation to derive context to rapidly deploy a Zero Trust framework.

Security Education Programmes - A Crucial Affair!

Joseph Okonkwo

We are three months away from 2020, three million job vacancies in cyber security and there is a technology and regulations explosion today; from 0-days, to cloud computing, Quantum computing, DevOps, Big Data, Containers, API, RPA, ML, AI, AR, VR, IOT, GDPR, etc. The speed of change is an evident reality and companies must keep up or lose out.

This requires innovative strategies and your cyber security teams need to understand the technology and business to adequately protect your organisation. As the cost of breaches increases annually, the root causes and lessons learned indicate that security education is a major determinant of resilience and the future of cyber, I present some examples and facts from the trenches.




Malicious Software Developments

Holly Grace Williams

A look into recent major malicious software attacks for the lessons learned; looking at how recent malicious software spreads and how this might develop in the future. Holly will aim to link malicious software propagation techniques to those techniques used by penetration testers to allow security teams to focus their efforts.

Coffee and networking
Q&A with Frank Abagnale "Catch me if you can"

Frank Abagnale JNR

Frank William Abagnale Jr. is an American security consultant known for his background as a former con man, check forger, and impostor between the ages of 15 and 21. He became one of the most notorious impostors, claiming to have assumed no fewer than eight identities, including an airline pilot, a physician, a U.S. Bureau of Prisons agent, and a lawyer. He escaped from police custody twice (once from a taxiing airliner and once from a U.S. federal penitentiary) before he was 22 years old. He served less than five years in prison before starting to work for the federal government. He is currently a consultant and lecturer for the FBI academy and field offices. He also runs Abagnale & Associates, a financial fraud consultancy company.

Abagnale's story inspired the Academy Award-nominated feature film Catch Me If You Can (2002), starring Leonardo DiCaprio as Abagnale and Tom Hanks as the FBI agent pursuing him, as well as a Broadway musical of that name and a TV series White Collar, which are based on the book Catch Me If You Can.

Frank will describe his fascinating life, and his take on cyber security in conversation with Geoff White, an investigative journalist, who has worked for both the BBC & Channel 4 TV.  He will then be taking questions from Geoff and from the audience.

Geoff White’s exclusives have covered everything from developments in artificial intelligence to fraud in the internet dating industry. He is currently writing a book on cybercrime for due for publication in 2020.

The encounter should be memorable.

Chairs Closing Remarks

Colonel (Retd) John Doody

Drinks Reception

Supported by: