Seminars:
A series of thirty minute seminars running at 11:30am, 12:05pm and 13:30pm of the event will allow delegates to understand complex areas of specific interest.
11:30
|
Go Hack Yourself: War Stories from ~20k Pentests
In an ecosystem where you know you're being targeted daily, how can you prove you're secure? Are you finding and fixing the most critical attack paths, logging the right data, and alerting on the right events? Do you know if you're ready to respond to an incident and are your security controls configured and integrated correctly? All this effort is supposed to measurably reduce your risk, but is any of it working? Join Dennis Weyel, EMEA Technical Lead at Horizon3.ai, to learn a proven way to find, fix, and verify that you're secure. Dennis will discuss several real-world examples of what autonomous pentesting discovered in networks just like yours. And you'll hear more about how fast and easy it was to safely compromise some of the biggest (and smallest) networks in the world - with full domain takeover in a little more than a few hours. Learn how you can safely do the same in your own network today!
|
11:30
|
Design for security
You have probably heard the term but what does it mean? Allow us to provide an introduction into the world of threat modelling and how it can benefit your business operation not just in terms of security.
|
12:05
|
The Intersection between Communications, People and Data
Cybersecurity is always thought about in terms of technology, but is it that simple or does it involve more to secure an organization? Join this session with Mimecast to learn the cybersecurity intersection between communications, people, and data to protect your organization, reduce risk and manage complexity. |
12:05
|
Cybersecurity in Crisis: Aligning Compliance Strategies to Combat the Triple Threat of Ransomware, Data Breaches, and Extortion Attacks
Cybersecurity in Crisis: Aligning Compliance Strategies to Combat the Triple Threat of Ransomware, Data Breaches, and Extortion Attacks, presents an invaluable opportunity for executives and security leaders, to explore, strategize, and mitigate the risks that are threatening our digital landscape.
|
13:30
|
Kroo: a bank with a conscience, and a cloud security partner to match their values and mission to change an industry
Join Guillaume Ehny, CISO at Kroo Bank, and Ryan Sheldrake, Field CTO at Lacework, on this interactive session as they discuss how this modern challenger bank navigated the jungle of cloud security vendors to conclude working with Lacework, and the results of this relationship so far. Attend this session to learn more about their journey: · The initial criteria during the search · How critical automation is for modestly-sized security teams · Lessons learned and business value generated · What's next for Kroo |
13:30
|
LastPass: Building A Culture Of Cybersecurity
Prioritising cybersecurity as part of a comprehensive corporate culture gives you a better standing in protecting your organisation, data, and people. There are many ways to build the culture you want, allowing employees to spot and handle potential threats and being receptive to adopting security tools like MFA and password managers. Human behaviour is often the weak link with recycled, weak passwords across multiple apps and shared passwords. Remember, hackers don’t break in, they login. Join LastPass to learn practical steps and advice on building a strong cybersecurity culture. |