Registration - coffee - networking
Chair's opening address

Geoff White

Security in 2022

  • The changing face of cyber crime: 2022 cyber threats and new methods to protect against them
  • The risks and costs of cybercrime to businesses
  • Cyber skills: The importance of education and hiring the right people
  • Outlooks on AI & IOT
Stopping Ransomware with Autonomous Response

Oakley Cox

New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.  

Join Oakley Cox, Darktrace’s Director of Analysis, as he unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.  

This presentation will discuss: 

·         Recent ransomware threat trends, including double extortion and RDP attacks 

·         How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office   

·         Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day 

Ransomware the Real Threat

Steve Mulhearn

Within the world of Ransomware as a service and the increase of these attacks we look into the goals and targets of these criminal organisations. This in turn while understanding the true perception of this threat within business is key to understanding the real risk of these attacks and their targets.

Keynote Presentation: Mike Koss - Why is this so hard?

Mike Koss

Cyber security is an arms race and one that appears to have no end in sight, Mike Koss will present a light heart albeit doom filled view of the current state of Cyber security and discuss why this sector is so hard, prone to burn out and difficult to navigate.

Hybrid Office for Today and Tomorrow

Deryck Mitchelson

The traditional ways of secure office working are gone. Everything is moving to the cloud and nothing is static anymore. Join Deryck Mitchelson as he walks you through the challenges of the distributed workforce, the complexities of management of securing access and the key principles to adopt for your organisation’s digital journey.

SpyCloud Ransomware Defense Report: Breaking Down Key Findings

Mandeep Sandu

Ransomware escalated dramatically in scale and severity over the last 12 months and has quickly turned the heads of board members & leaders on how best to protect their business.

The SpyCloud Ransomware Defense Report outlines input from 250 individuals in active IT security roles who were surveyed in 2021 regarding their experience and/or thoughts about the impact ransomware has had on enterprises.

In this session, we will walk through the report’s key findings, how criminals leverage stolen data to perpetrate these attacks, and identify best practices organizations can implement to improve their ransomware defenses and remediate vulnerabilities.

Keynote Presentation: Jessica Barker - The Human Nature of Cyber Security

Dr Jessica Barker

This engaging and insightful session will encourage you to look at cyber security in a different light, leaving you with a greater understanding of why people are at the heart of this field. Dr Jessica Barker highlights how we can use psychology, sociology and neuroscience to understand how cyber criminals operate and how to help our colleagues, family and friends be better protected from social engineering and scams. You will leave this session with a deeper understanding of the human factors of cyber security and an appreciation for the role of security culture.

Security in an API-oriented world

Apoorva Ravikrishnan

In today's app-driven world, APIs are the cornerstone for growth and innovation. APIs power modern mobile, SaaS, web applications and drive IoT connectivity between connected devices. It is, therefore, no surprise that APIs are an increasingly popular target for cyber attacks.

This session will cover:

• How APIs drive today’s businesses

• Key API security trends and risks

• Securing APIs with Cloudflare API Shield


Coffee & Networking
Choose one of two streams

Click here to see the full schedule of streams on offer

Seminar Change Over
Choose one of two streams

Click here to see the full schedule of streams on offer

Lunch and networking
One of two streams to choose from

Click here to see the full schedule of streams on offer

Chairs Afternoon Address

Geoff White

Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust

Ben Jenkins

Join ThreatLocker Senior Solutions Engineer, Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. Understand how businesses are enhancing their cyber resilience and significantly limiting the damage ransomware can inflict with a Zero Trust architecture

Keynote Presentation: Melanie Oldham - Building the Cybersecurity Community

Melanie Oldham

What is it that we’re doing as industry professionals to prepare for the future? What are the key skills required? Melanie believes opportunity and passion are the fundamentals. Building thriving cyber security ecosystems is one of the key pillars in the National Cyber Security Strategy designed to help grow the industry through regional Cybersecurity Clusters. Melanie will discuss what do we do as a community to connect and inspire further generations of cyber security professions and support skills, innovation and growth through engagement with the wider ecosystem.

Plan Smart: The Future is SASE

Richard Walters

Today’s work environment has been fast-tracked along its journey to hybrid working. As this evolution has driven an increasingly digital landscape, workers are now using cloud-based applications on a daily basis, giving rise to new advanced threats. The transition of the modern workplace from a place to an activity has also made the traditional concept of a network perimeter redundant. We are now in an era where security needs to be designed around an entirely new perimeter, built on identity and context. This is where Zero Trust and ZTNA (Zero Trust Network Access) comes in, as part of the journey towards SASE.

Join Censornet’s CTO Richard Walters as he dispels the SASE one-size-fits-all myth, and instead explains how it can be adapted to serve the needs of a world where the perimeter is no longer “entombed in a box” but anywhere the enterprise needs it to be. Richard will also explore how the smart decisions you make today will optimise your future cloud and network security.

Available Sponsor Speaking Slot
Keynote Presentation: Greg Van der Gasst - Reinventing InfoSec

Greg van der Gaast

How one company threw the rulebook out and went from having no dedicated security function to a full multidisciplinary team with traction in every area of the business, with security becoming a core brand value and an important commercial differentiator to clients, driving enough improvements, savings, and sales to pay for itself without even considering the risk equation.

Coffee and networking
One hour Presentatipon & Q&A with Baroness Karren Brady

Overview Coming Soon

Chairs Closing Remarks

Geoff White

Drinks Reception & Tim Peake will be joining us for a drink or two