Registration - coffee - networking
Chair's opening address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Security in 2022

  • The changing face of cyber crime: 2022 cyber threats and new methods to protect against them
  • The risks and costs of cybercrime to businesses
  • Cyber skills: The importance of education and hiring the right people
  • Outlooks on AI & IOT
Stopping Ransomware with Autonomous Response

New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.  

Join Oakley Cox, Darktrace’s Director of Analysis, as he unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.  

This presentation will discuss: 

·         Recent ransomware threat trends, including double extortion and RDP attacks 

·         How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office   

·         Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day 

Ransomware the Real Threat

Within the world of Ransomware as a service and the increase of these attacks we look into the goals and targets of these criminal organisations. This in turn while understanding the true perception of this threat within business is key to understanding the real risk of these attacks and their targets.

Keynote Presentation: Purvi Kay, Head of Cyber Transformation and GRC, BAeSystems

Purvi Kay

Hybrid Office for Today and Tomorrow

The traditional ways of secure office working are gone. Everything is moving to the cloud and nothing is static anymore. Join Deryck Mitchelson as he walks you through the challenges of the distributed workforce, the complexities of management of securing access and the key principles to adopt for your organisation’s digital journey.

SpyCloud Ransomware Defense Report: Breaking Down Key Findings

Ransomware escalated dramatically in scale and severity over the last 12 months and has quickly turned the heads of board members & leaders on how best to protect their business.

The SpyCloud Ransomware Defense Report outlines input from 250 individuals in active IT security roles who were surveyed in 2021 regarding their experience and/or thoughts about the impact ransomware has had on enterprises.

In this session, we will walk through the report’s key findings, how criminals leverage stolen data to perpetrate these attacks, and identify best practices organizations can implement to improve their ransomware defenses and remediate vulnerabilities.

Keynote Presentation: Jamie Woodruff, Ethical hacker and Cyber Security Specialist

Jamie Woodruff

Security in an API-oriented world

In today's app-driven world, APIs are the cornerstone for growth and innovation. APIs power modern mobile, SaaS, web applications and drive IoT connectivity between connected devices. It is, therefore, no surprise that APIs are an increasingly popular target for cyber attacks.

This session will cover:

• How APIs drive today’s businesses

• Key API security trends and risks

• Securing APIs with Cloudflare API Shield


Coffee & Networking
Choose one of two streams

Click here to see the full schedule of streams on offer

Seminar Change Over
Choose one of two streams

Click here to see the full schedule of streams on offer

Lunch and networking
One of two streams to choose from

Click here to see the full schedule of streams on offer

Chairs Afternoon Address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust
Keynote Presentation: Sarah Armstrong-Smith, Chief Security Advisor, Microsoft

Sarah Armstrong-Smith

Plan Smart: The Future is SASE

Today’s work environment has been fast-tracked along its journey to hybrid working. As this evolution has driven an increasingly digital landscape, workers are now using cloud-based applications on a daily basis, giving rise to new advanced threats. The transition of the modern workplace from a place to an activity has also made the traditional concept of a network perimeter redundant. We are now in an era where security needs to be designed around an entirely new perimeter, built on identity and context. This is where Zero Trust and ZTNA (Zero Trust Network Access) comes in, as part of the journey towards SASE.

Join Censornet’s CTO Richard Walters as he dispels the SASE one-size-fits-all myth, and instead explains how it can be adapted to serve the needs of a world where the perimeter is no longer “entombed in a box” but anywhere the enterprise needs it to be. Richard will also explore how the smart decisions you make today will optimise your future cloud and network security.

Presentation from Censornet
Presentation from Spycloud
Coffee and networking
One hour Presentation & Q&A with Baroness Karren Brady

Baroness Brady of Knightsbridge CBE

Overview Coming Soon

Chairs Closing Remarks

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Drinks Reception