A series of thirty minute seminars running at 11:25am, 12:00am and 13:30pm of the event will allow delegates to understand complex areas of specific interest.

Can we change behaviours in real-time? A behavioural science approach

• Explore what’s not working about current approaches to security awareness and the human factor in security
• Unpick the science behind behaviour models to help us understand why risky behaviours happen, and more importantly how to stop them.
• Explore how a real-time approach can allow awareness to form part of incident response and actively prevent incidents.
• Offer real-world examples and ways that all organisations can apply the theories to drive secure behaviour change.

People, Process & Partners: Building a Future-Ready Security Monitoring Strategy

Cybercrime is rapidly increasing every year, with ransomware attacks taking place every 11 seconds by 2022, according to Cybersecurity Ventures. Organisations should be treating attacks as a matter of ‘when’ not ‘if’. This means cybersecurity must be a top priority and SOCs must have the visibility to deal with any threats that may come their way. In this presentation, Guy Grieve, Enterprise Sales Engineer at LogRhythm, examines how organisations can build an effective security monitoring strategy to overcome the constant cyber risks of today’s threat landscape. He explains how security teams can leverage the SOC Visibility Triad to provide overlapping fields of visibility, simplified threat hunting and enhanced response capabilities to strengthen their cybersecurity posture.

7 Key Considerations for Choosing the Right Email Security Platform

Invoice fraud. Payroll diversion. Gift card requests. Fraudulent wire transfers. Malicious attachments. These types of attacks have dominated the cybersecurity space for the past few years, as security leaders worldwide attempt to find ways to stop increasingly-sophisticated inbound threats.
But what about those attacks that are circumventing your inbound email, yet still infiltrating your email environment? How do you stop the attacks that come through indirect channels? Or perhaps even more concerning… how do you even discover these attacks in the first place?
Join this session to learn about:
• How the move to cloud email has opened your organization to a variety of new attacks that no longer come through inbound email
• The real-world examples of these side-channel attacks that abuse third-party application access or result from legacy authentication exploitation
• How these attacks can result in credential theft, stolen session cookies, and compromised accounts—without you ever being aware
• How better mitigate this risk with cloud email security designed to detect and prevent these attacks

The Evolution of Managed Services in Cyber Security

Join Practice Director of SCC Cyber, Paul Allen,  on a deep-dive discussion into the changes in approach since Gartner first developed the concept on Managed Deception and Response in 2016. Evolving from a technology centric and use case driven capability, to a risk focused dynamic model.

Choosing the Right Data Protection Strategy

Now more than ever, it’s critical for businesses to remain confident that their data is protected and always available, whether it’s on premises, at the edge or in the cloud. But with an ever-evolving threat landscape, what is the best strategy to protect key business data? Join us to see a presentation with answers to this question, including a sneak-peek of an upcoming Veeam product release.

What is the internet map and how to leverage internet intelligence for threat hunting and exposure management?

What if there was one place to understand everything on the internet? The map of the internet, that proactively protects your organization or nation against advanced threat actors and empowers your security teams with critical information needed to find, monitor threat and exposures.