Programme:

08:30
Registration - coffee - networking
08:55
Chair's opening address

Colonel (Retd) John Doody

Security in 2019

  • The changing face of cyber crime: 2019’s cyber threats and new methods to protect against them
  • The risks and costs of cybercrime to businesses
  • Cyber skills: The importance of education and hiring the right people
  • Outlooks on AI & IOT
09:00
Tackling online crime; what are policing doing in the North West

Helen Williams

If cybercrime is such a big issue, what are the police doing to protect you?  How are we working to prevent young people becoming the online criminals of the future?  How can you be prepared for a cyber incident?  How are we pursuing online criminals and bringing them to justice?  Real –life examples of how the North West Regional Organised Crime Unit are working to disrupt criminals who are exploiting the speed, facelessness and convenience of the internet to commit a range of crimes.

09:15
"How to find control & Zen through common sense A pep talk for IT professionals"

Hans-Peter Ponten

In these modern times, we’re more and more looking to become Zen. We meditate, we blend fruits and veggies, and we try to block out the noise.
This works for most of us, except for IT professionals. If they started meditating, their company network would fall apart within seconds. Because as soon as they close their eyes, malware makes its move. This is why most IT professionals run around trying to protect their company network in every way possible. It’s fighting a losing battle, though, as IT security treats take an increasing variety of forms.
Why do we make IT security so complex?
If you ask Soliton visionary Hans-Peter, it’s because we’ve stopped relying on common sense. In order to keep out the ever-savvier hacker, today’s IT managers often stack as many security tools as they can find. This is a misconception, as more tools don’t always lead to better security.
In his pep talk, Hans-Peter will explain how you can use common sense to optimally secure your company network today and in the future. Not by working overtime, but by implementing some basic principles that help you become proactive and reduce risks to a minimum. This way, you can avoid problems before they even arise, making you a very Zen IT professional. 

 

09:25
Addressing the issues that matter

Nick Brownrigg

Infosec’s overwhelming 400+ exhibiting vendors, promising to solve your security issues with a slightly different approach, but the same convincing tone, can certainly confuse end users on which direction to take. So how to set the priorities, make the right technology choices and appropriately assign your scarce human and financial resources?
Nick’s talk analyses eight critical issues and related compromises, providing a clear roadmap to help IT and security professionals focus on the real issues that matter and kill the noise!

 

10:00
A New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

John Dyer

•         Leveraging machine learning and AI algorithms to defend against advanced, never seen-before, cyber-threats.
•         How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time.
•         How to achieve 100% visibility of your entire business including cloud, network and IoT environments.
•         Why automation and autonomous response is enabling security teams to neutralise in-progress attacks, prioritise resources, and tangibly lower risk.
•         Real-world examples of subtle, unknown threats that routinely bypass traditional controls.

10:15
Anonymous Scandinavia Interview

Anonymous Scandinavia

Coming soon

10:40
The future for security in IT – it doesn’t have to be bleak

There’s no doubt that IT systems are growing in complexity, especially with the adoption of AI, ML, RPA, Agile, AIOps, ... Combine that complexity with demands for faster change from business leaders, and it’s no wonder that security and risk management is becoming ever more challenging. A key to resolving these demands is managing access to critical services, applications and devices while not slowing down the business. As a result, every organisation should define and implement a privileged access management (PAM) strategy. Indeed, good PAM can even be an accelerator for the business. In this session, we’ll discuss the challenges and how PAM can be a key success enabler.

 

10:55
Coffee & Networking
11:25
One of two streams to choose from

Click here to see the full schedule of streams on offer

11:55
Seminar Change Over
12:00
One of two streams to choose from

Click here to see the full schedule of streams on offer

12:30
Lunch and networking
13:30
One of two streams to choose from

Click here to see the full schedule of streams on offer

14:00
Chairs Afternoon Address

Colonel (Retd) John Doody

14:05
How to become APT-Proof in 24 hours

Tim Ager

Organizations like yours are investing $15 million annually in information security. They’re doing everything right. From perimeter security to DLP to encryption and segmentation—their practices are best practices. In terms of optimizing their security posture, they’re already 80% there.
Yet big budgets, according to analysts don’t translate into better security, and CISOs of large companies don’t necessarily sleep better at night. So what is the 20%-equivalent of fine-tuning in the security world? What is the missing step to knowing you are truly secure from an APT attack?
Due to their multi-vector nature, defending against APTs require seamless configuration and integration of solutions across your digital estate—ensuring protection against pre-exploitation, exploitation and post-exploitation techniques, tactics and practices (TTPs).

14:20
Weaponising data: the dark nexus of hackers, journalists, data traders and corporate raiders

Geoff White

Investigative journalist Geoff White, author of a forthcoming book on cyber crime, delves into the murky links between hacking and the media.
Over the last decade hackers have demonstrated how data leaks can be used to devastating effect on a victim organisation.
These lessons have not been lost on nation-state hacking teams and organised cybercriminals, who have mastered the news cycle and co-opted journalists to achieve their destructive ends.
Geoff explores this growing confluence of interests through examples of corporate ruination and reputational damage, and probes where the trend might go next.

 

14:40
Available slot

Prensenation detals coming soon

15:05
Presenation details coming soon

Joseph Okonkwo

15:20
Malicious Software Developments

Holly Grace Williams

A look into recent major malicious software attacks for the lessons learned; looking at how recent malicious software spreads and how this might develop in the future. Holly will aim to link malicious software propagation techniques to those techniques used by penetration testers to allow security teams to focus their efforts.

15:35
Coffee and networking
16:00
Q&A with Frank Abagnale "Catch me if you can"

Frank Abagnale JNR

Frank William Abagnale Jr. is an American security consultant known for his background as a former con man, check forger, and impostor between the ages of 15 and 21. He became one of the most notorious impostors, claiming to have assumed no fewer than eight identities, including an airline pilot, a physician, a U.S. Bureau of Prisons agent, and a lawyer. He escaped from police custody twice (once from a taxiing airliner and once from a U.S. federal penitentiary) before he was 22 years old. He served less than five years in prison before starting to work for the federal government. He is currently a consultant and lecturer for the FBI academy and field offices. He also runs Abagnale & Associates, a financial fraud consultancy company.

Abagnale's story inspired the Academy Award-nominated feature film Catch Me If You Can (2002), starring Leonardo DiCaprio as Abagnale and Tom Hanks as the FBI agent pursuing him, as well as a Broadway musical of that name and a TV series White Collar, which are based on the book Catch Me If You Can.

Frank will describe his fascinating life, and his take on cyber security in conversation with Geoff White, an investigative journalist, who has worked for both the BBC & Channel 4 TV.  He will then be taking questions from Geoff and from the audience.

Geoff White’s exclusives have covered everything from developments in artificial intelligence to fraud in the internet dating industry. He is currently writing a book on cybercrime for due for publication in 2020.

The encounter should be memorable.

17:00
Chairs Closing Remarks

Colonel (Retd) John Doody

17:10
Drinks Reception

Supported by: