Registration - coffee - networking
Chair's opening address

Colonel (Retd) John Doody

Security in 2019

  • The changing face of cyber crime: 2019’s cyber threats and new methods to protect against them
  • The risks and costs of cybercrime to businesses
  • Cyber skills: The importance of education and hiring the right people
  • Outlooks on AI & IOT
The Cyber Security Landscape

Richard Parlour

  • The cybersecurity landscape and the key threat actors
  • The international response
  • The linkage to GDPR
  • Impact of Brexit on cybersecurity
The Modern Business Has No Perimeter

Jonny Tennyson

Insider attacks are on the rise – a cyber strategy focused on protecting the perimeter is futile.
Employees are now the perimeter and they’re always on the move; remote working opens organisations up to increased risks surrounding their data.
What does the Insider Threat look like?

A tonic for your data protection headache

Anita Lines

After helping clients navigate data protection programmes for more than a decade across public, private and third sectors, Anita shares some of her insights about what really works and what its really like being at the coalface as an international Data Protection Officer / Privacy Lead. 

What are the trends? 
What are companies still asking me? 
What always catches the attention of, and motivates, the Board?
What are the key things that companies still appear not to know? 
What are the real things that motivate staff?

A New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

John Dyer

•         Leveraging machine learning and AI algorithms to defend against advanced, never seen-before, cyber-threats.
•         How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time.
•         How to achieve 100% visibility of your entire business including cloud, network and IoT environments.
•         Why automation and autonomous response is enabling security teams to neutralise in-progress attacks, prioritise resources, and tangibly lower risk.
•         Real-world examples of subtle, unknown threats that routinely bypass traditional controls.

Panel Q&A Session
Coffee & Networking
Not becoming the next cybersecurity headline is difficult, very difficult !

Nick Brownrigg

The only certainty in Cybersecurity is that high profile compromises will continue to dominate the headlines. This leaves boards with the question: How do we prevent ourselves becoming the next headline? Most companies know that they need to implement a threat detection program to get in front of the cyber challenge. Getting it right is hard, very hard. This talk looks at the overall threat landscape and provides a recipe for designing a threat detection program whether you decide to outsource or do it yourself The key takeaways from this talk include understanding the building blocks and processes required to make sure you stand a chance of not becoming the next headline.

Ensuring Cybersecurity Resilience with a Skilled Workforce

Zeshan Sattar

Cyber-attacks are increasing in frequency and effectiveness. The threat landscape, threat actors and tools employed are many and varied. But how have the threats evolved and what does the future evolution look like? CompTIA will describe the past, present and future evolution of Cyber Security threats and how organisations are trying to keep pace by building capability to defend against these threats. This session will focus on equipping your staff with the right skills to address these ever-changing challenges and what might the future shape of Cyber Teams look like.

Lunch and networking
Chairs Afternoon Address

Colonel (Retd) John Doody

Privileged Access Management fundamentals: how to worry the right amount about real risks

Tim Ager

To execute a truly successful attack, any external breach needs to find a way to elevate its privileges. That’s why these attacks are so dangerous and increase in volume and quality. In his presentation Tim will explore how threats to privileged accounts occur and how to manage them  – malicious external attacks, intentional and unintentional breaches from within the organisation, as well as threats from outsourced resources and third parties you don’t know.

What are bot attacks, and why should you care? A new approach to defeating bots

Nick Baglin

With bot traffic now representing more than half of all internet traffic, how do you identify a bot from a human, and what can you do to stop the malicious ones from launching an account takeover attack?
Bots are continually evolving to avoid detection and are increasingly difficult to differentiate from legitimate users. The bad ones are looking to break into your website and apps to steal money, takeover loyalty points, expose IP and corrupt data.
This presentation will reveal the true extent of the bot problem and what you can do to solve it using behavioural machine learning that identifies even the most sophisticated bots. .

Cybercrime: A Prosecutor's Perspective: Case studies-Facebook, Anonymous, Spamhouse, etc

Sandip Patel QC

How Glen Mangham hacked Facebook’s source code.

How Anonymous waged global cyber campaigns.

How Seth Nolan-McDonagh almost crashed the Internet.

How to become APT-Proof in 24 hours

Tim Ager

Organizations like yours are investing $15 million annually in information security. They’re doing everything right. From perimeter security to DLP to encryption and segmentation—their practices are best practices. In terms of optimizing their security posture, they’re already 80% there.
Yet big budgets, according to analysts don’t translate into better security, and CISOs of large companies don’t necessarily sleep better at night. So what is the 20%-equivalent of fine-tuning in the security world? What is the missing step to knowing you are truly secure from an APT attack?
Due to their multi-vector nature, defending against APTs require seamless configuration and integration of solutions across your digital estate—ensuring protection against pre-exploitation, exploitation and post-exploitation techniques, tactics and practices (TTPs).

The Abyss is Waving Back… The four paths that human evolution is charging down, and how we choose which one’s right…

Chris Roberts

As humans we have four evolutionary paths:
1.     We embrace nanotechnology and Bionanotechnology… we become more dependent upon machines and slowly move towards integration with the systems (we know we’re looking at 80% integration in the next 20 years at least)
2.     We embrace consciousness and some of us end up in New Zealand hanging out in an AS/400…bodies no longer needed
3.     AI wakes up, looks round wonders WHY humans are in the driving seat and takes over… OR we end up unplugging it and rebooting back to the 1900’s…
4.     The stumbling drunk…simply put we keep staring into the abyss and almost falling in, only to somehow manage to come back from the collapse, the challenge is HOW many times can we do this before we simply fall in?

“I am Security Architect, get me out of here”

Mahbubul Islam

“This short presentation will provide an overview of the challenges of being a security architect in a digital programme, including dealing with risks and opportunities.

The presentation will also touch on how security architects navigate through the vast amounts of Standards, Guidance’s, Best Practices and Frameworks. It will also outline the challenges of being a security architect in an agile and non-agile security ecosystem.”

Coffee and networking
Presentation From Frank Abagnale "Catch me if you can"

Frank Abagnale JNR

Keynote address and overvie3w coming soon


Q&A with Frank Abagnale
Chairs Closing Remarks

Colonel (Retd) John Doody

Supported by: