Programme:
08:30
|
Registration - coffee - networking
|
08:45
|
Chairs Opening Address & House Keeping
A look back over the first half of 2024 - how attackers are evolving their tactics and techniques |
09:00
|
The hidden costs of your security stack: What should you keep, cut, or combine?
In this session, we'll reveal the often-overlooked inefficiencies in your security stack and discuss strategies for streamlining without sacrificing coverage. Are you overspending without knowing it? Explore the art of prioritisation to ensure your team focuses on high-impact activities, protecting critical assets without burning out and how you can boost your defences without breaking the bank. |
09:15
|
Harnessing AI for Cybersecurity: The Evolution and Impact of Edgescan AI Insights
In this session, we explore how Edgescan is transforming the cybersecurity landscape through the integration of AI Insights into our platform. As organisations face increasingly complex threats, the ability to extract actionable intelligence from vast amounts of vulnerability data has become crucial. This presentation will highlight the evolution of AI within Edgescan, showcasing how AI Insights has been designed to enhance the precision, relevance, and effectiveness of vulnerability management. We will walk through the journey of developing AI Insights, from its initial concept to its current capabilities, which include providing tailored recommendations in key areas such as ransomware, remediation, compliance, and training. The discussion will also cover the technical setup, including data integration and prompt engineering, that ensures the highest levels of accuracy and client-specific relevance. |
09:30
|
Panel session - Three Rs of security and how they will impact us in the next year.
Focusing on resilience, risk and regulation; we will discuss our opinions on the impact of third party outages, quantifiable risk and regulatory impact across the next year. |
09:50
|
Cloudflare’s State of Application Security Report, 2024.
Web applications and APIs are integral to modern society, facilitating communication, essential services, and business operations. They generate revenue, enhance efficiency and provide valuable customer insights. However, they also present significant security challenges due to their expanding attack surface. Vulnerabilities can lead to business disruptions, financial losses, and infrastructure failures. The rapid implementation of new features, especially those driven by generative AI, exacerbates these security risks. |
10:05
|
Anticipating the impact of a cyber attack
Why anticipate the impact? |
10:20
|
The Team, The Team, The Team
"Forget the Framework, Systems, Policies and Procedures, if you haven't got the right culture, the rest of it won't matter." Says Ellie Dowsett |
10:35
|
Too many tools, not enough security
Many small businesses are attempting to solve their cyber security challenges by investing in software and tools. Is this really the best approach for managing security risks? • The common pitfalls in over tooling • How to invest smartly • How to ensure value from the tools being purchased • An alternative approach |
10:50
|
Nudging Your Way to a Strong Security Culture
Developing a robust security culture within an organisation is a critical challenge in today's threat landscape. Traditional security awareness programs often struggle to drive lasting behavioural changes. This session explores the power and role of "nudges" – subtle environmental cues and design elements that can positively influence employees' security-related behaviours. |
11:05
|
Coffee & Networking
|
11:35
|
Choose one of two streams
|
12:05
|
Seminar Change Over
|
12:10
|
Choose one of two streams
|
12:40
|
Lunch and networking
|
13:30
|
Chairs Afternoon Address
|
13:35
|
Frontline stories from IR - A Comprehensive Approach to Threat-Informed Defence
A Kudelski Security Incident Response expert shares stories of what happens behind the scenes while learning tips from someone that sees these attacks happen on the daily. |
13:50
|
The ‘Soft’ Skills gap in Cyber Security
Cyber is predominantly perceived as a technical field hence a huge emphasis is placed on recruiting technical professionals and training is also mostly focused on technical qualifications. In doing so are we underestimating the need for soft skills in cyber and if so what can we do to change that? |
14:20
|
At the Crossroads of Threat Intelligence: Which Path To Tread?
Threat Intelligence is at a critical juncture where traditional methods of threat analysis must evolve to address emerging threats. The challenge lies in determining the best path forward
|
14:35
|
Once upon a time...
Engaging the wider business and stakeholders in supporting cyber security culture can be challenging. In this talk, Holly will reflect on how storytelling and sharing her knowledge on consulting can help you engage with all areas of the business, promote clear communication, build cyber resilience as part of ongoing business resilience and ensure by-in from senior stakeholders |
14:50
|
Future-Proofing Your Business: Current and Future Trends in Software Security
Each year, a team within Synopsys work with 130 firms who participate in an annual study, called BSIMM. In this study, we monitor 126 unique activities that make up companies’ software security initiatives. Since its launch in 2008, the world has changed. Software has changed. And this study has tracked those changes. Sometimes to look forwarded we need to look back. |
15:05
|
From Policy to Practice: Cyber Resilience Lessons from Cyber Insurance
This presentation explores the relationship between cyber resilience and cyber insurance, but not in the way you'd think! Rather than looking at the benefits of risk transfer through insurance, we will study real life examples of how intel or requirements from the insurance world has helped organisations improve their maturity and shape cyber risk services on the market. |
15:20
|
The Human Risk Playbook: Essential Moves to Secure Your Cyber Defences
Join Mimecast’s Saiyid Mansoor as he present’s the human risk playbook, detailing essential moves to secure your cyber defences. You will learn strategies to manage human risk and strengthen overall security. |
15:35
|
Coffee and networking
|
16:00
|
‘Fire-side chat’ with David Walliams
This promises to be a session not to be missed |
17:00
|
Chairs Closing Remarks
|
17:10
|
Drinks Reception
|