Registration - coffee - networking
Chair's opening address

Colonel (Retd) John Doody

Security in 2018

  • The changing face of cyber crime: 2018’s cyber threats and new methods to protect against them
  • The risks and costs of cybercrime to businesses
  • Cyber skills: The importance of education and hiring the right people
  • GDPR: The importance of compliance and timetable for success 
Cyber Security: Going Back to Basics

Jennie Williams

Probably one of the hardest parts of Cybercrime is to get people to understand the threat and buy into why it is so important to protect yourself and your business. Jennie will provide common sense advice on how to help make your staff change their online behaviours and tell you where to look to get the latest cybercrime advice for free!

The Shift to Self-Learning, Self-Defending Networks

Bea Gully

·       Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats

·       How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time

·       How to achieve 100% visibility of your entire business including cloud, network and IoT environments

·       Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk

·       Real-world examples of subtle, unknown threats that routinely bypass traditional controls

"Via Live Stream" Cybercrime isn't Rocket Science

Brett Johnson

Are cybercriminals computer masterminds?  Not so much.  Join "The Original Internet Godfather" Brett Johnson as he shows the ease in which modern cybercrime is committed.  From data breaches to business email compromise to identity theft, Brett walks the audience through exactly how these crimes are committed and what you can do to protect yourself, your family, and your business.

Endpoint Protection and Privacy: Can you accomplish both?

Neill Cooper

A 2017 report by Haystax Technology found that 90% of organisations reported feeling vulnerable to insider attacks. An increase of over 25% from the previous year. With this figure predicted to rise to 99% in 2018, it has become clear that a cyber strategy focused on protecting the perimeter is now futile - your employees are now the perimeter and they're always on the move, morphing said perimeter by logging onto the network from different devices and locations. While the flexibility of remote working has many benefits to both organisations and employees alike, it also opens organisations up to increased risks surrounding their data.

Join ZoneFox’s CCO Neil Cooper as he discusses how the disappearance of the perimeter is a big challenge for organisations and how the use of UEBA technology can defend a company’s most prised possession - its data - to remain competitive, complaint and empower your business. You can also learn how our client Bede Gaming are using ZoneFox to enhance its security strategy to protect its IP, Data and Employees.

“Keeping the wolf from 1000 doors – Vulnerability Intelligence at scale”.

Eoin Keary

Eoin shall discuss how (from experience) to approach enterprise full stack vulnerability intelligence at scale and how to maintain a secure cybersecurity posture across 1000’s of systems and web applications on an ongoing basis.

How vulnerability discovery / scanning is a small part of an overall enterprise vulnerability management function and how other activities and processes are also equally important in terms of orchestration and visibility of enterprise security robustness.

Endpoint Protection and Privacy: Can you accomplish both?”

Niall Sheffield

With the advent of advanced endpoint protection, the ability for security teams to have unparalleled access to data on endpoints under the purview has grown exponentially. This data should be used to ensure that endpoints are protected from maliciousness, however there are privacy concerns around the availability and usage of the data. Can companies perform advanced endpoint protection, as well as safeguarding the privacy of their users?

Coffee and networking
Battle of the Authentication Methods: Which authentication methods work and which ones will leave you vulnerable to a hack?

Himanshu Verma

Learn about the strengths & weaknesses of each method and understand what authentication myths are true and which are not. Test your own understanding and see if you've fallen victim to the false MFA beliefs that are common today.

Q&A Panel Session

The morning speakers will join our chair to answer any questions from the audiance.

Lunch and networking
Chairs Afternoon Address

Colonel (Retd) John Doody

GDPR compliance and your cyber security programme

Tony Drewitt

  • The impact of obligations imposed by the General Data Protection Regulation (GDPR) on cyber security in public sector organisations
  • Cyber security and privacy – common challenges and solutions
  • The practical steps to initiating a GDPR compliance programme.
Hunting for Lion & Bulls on the dark web

Etienne Greeff

There is a popular analogy that you don’t have to outrun the hacker lion just have to outrun the slower competitors. With criminals finding new ways of monetising hacking however this analogy isn’t accurate any more. This presentation examines the state of the cybersecurity market and provides pragmatic advice for addressing the new cybersecurity reality where everybody is a target.

Digital Identity: Security Component or Value Asset?

Neira Jones

•               Consumer behaviours in a changing world (about hyperconnectivity, digitalisation, social media, etc.)

•               How consumer technology adoption also drives innovation in fraud

•               The balancing act between security and convenience

•               Success in the Digital Economy: what putting the consumer first means.

•               Industry Reactions (W3C, Visa/Mastercard, etc.)

•               Digital Identity: from Hindsight to Prediction

•               What about Privacy? (China, EU regulations incl. PSD2, AML, etc.)

•               Success means...

War Stories; Incidents From The Front Line Of Internet Security!

Stu Hirst

A candid and sometimes humorous look into the kind of incidents faced by a modern, internet-economy security team, how they were discovered, the pain they caused, how they were fixed and lessons learned!

So you think a 12yr old is too young to influence the future of cyber security?

Femi Owolade-Coombes

  • The Cyber Effect: looking at the impact of technology on young people
  • Amazing young hackers - what insights can we learn from their experiences
  • Influences in tech and pathways 
  • Steps in the right direction - what young coders should be thinking about
  • Young people developing community and inclusion
2018 Cyber Threat Landscape as reported by users

Stuart Smith

We look at the cyber attacks trends in 2018 and how malware is evolving and being constantly repurposed.

Stuart Smith, Presales engineer for Flowmon Networks, will cover some examples being reported by customers and review the 3 main layers of a robust cybersecurity strategy.

Coffee and networking
Weaponising information: the future of fake news, cyber breaches and black market data trading

Geoff White

  • What exactly is “fake news” and how will it evolve?
  • Why do some cybersecurity stories get reported while others are ignored?
  • How will legislation and regulation change the landscape for victims and perpetrators?
  • How are hacker tactics changing journalism, politics and finance?
  • What is the impact of the emerging “dark nexus” of cybercriminals, investigators, progagandists and traders?
Q&A Panel Session

Q&A Panel Session with all the afternoon speakers

Chairs Closing Remarks

Colonel (Retd) John Doody

Supported by: