Programme:
08:30
|
Networking
|
08:55
|
Chairs Opening Address
Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD Security in 2022 •The changing face of cyber crime: 2022 cyber threats and new methods to protect against them •The risks and costs of cybercrime to businesses •Cyber skills: The importance of education and hiring the right people •Outlooks on AI & IOT |
09:00
|
Ransomware the Real Threat
Within the world of Ransomware as a service and the increase of these attacks we look into the goals and targets of these criminal organisations. This in turn while understanding the true perception of this threat within business is key to understanding the real risk of these attacks and their targets. |
09:15
|
Plan Smart: The Future is SASE
Today’s work environment has been fast-tracked along its journey to hybrid working. As this evolution has driven an increasingly digital landscape, workers are now using cloud-based applications on a daily basis, giving rise to new advanced threats. The transition of the modern workplace from a place to an activity has also made the traditional concept of a network perimeter redundant. We are now in an era where security needs to be designed around an entirely new perimeter, built on identity and context. This is where Zero Trust and ZTNA (Zero Trust Network Access) comes in, as part of the journey towards SASE. Join Censornet’s CTO Richard Walters as he dispels the SASE one-size-fits-all myth, and instead explains how it can be adapted to serve the needs of a world where the perimeter is no longer “entombed in a box” but anywhere the enterprise needs it to be. Richard will also explore how the smart decisions you make today will optimise your future cloud and network security. |
09:30
|
Keynote Presentation: Robin Smith, Head of Cyber and Information Security, Aston Martin - 'Protecting Frontier Tech in the Age of the Mega Hack'
|
10:00
|
Darktrace for Cloud: Taking Cover with Self-Learning AI
Cloud computing allows businesses to innovate, collaborate and share like never before, but for security teams the cloud is often a blind spot, leaving organisations open to attack. Join Darktrace’s Beverly McCann, Principal Analyst Consultant, as she discusses the challenge of cloud computing, the rise of novel threats, and how Self-Learning AI can be used to protect the dynamic workforce and changing digital environments, providing total visibility. Includes real-world threat examples, including a Microsoft Azure takeover and accidental insider threat. |
10:15
|
Cloudflare’s guide to API Security
We all know by now that APIs (application programming interfaces), make the world go around. More precisely, they let distinct modern applications communicate with each other. The importance of APIs are growing, with more and more companies describing themselves as “API-first.” In some cases, a company’s actual product is an API with a business model centred on consuming it. Companies devote time and effort to deliberately craft their API approach to consider how it can expose the right data, becoming foundational to revenue and business models. However, building perfect APIs is tough, because just like any piece of software, vulnerabilities will happen, leading to security challenges. Suffice to say, APIs are everywhere and will only gain momentum in the coming years – and they must be protected. For this reason, we’ll examine API attacks and aspects of defense-in-depth when thinking through organizational API security. |
10:30
|
Keynote Presentation: Eliza May Austin, CEO and Co-Founder, th4ts3cur1ty.company and PocketSIEM - 'Cybersecurity Stockholm Syndrome - how to take back the reins of your cyber defence through open source technologies'
It’s common knowledge among senior leadership teams that a large proportion of the expensive products and services we buy serve little to no value in the context of our businesses. Often these new relationships come with bad customer services and are predictably eye-wateringly expensive. Yet despite this common narrative, these same professionals are seemingly in love with their vendors. Here lay a thought-provoking similarity to Stockholm syndrome, the act of defending and being protective over one's abuser. So how can Senior leaders who spot this pattern, break the cycle of vendor abuse and take back the reins of their cyber defences? Through open-source technologies. This talk will discuss the pros and cons of open-source cyber defence and unpick some of the key concerns senior leaders have about utilising open-source technologies in their defence strategies. |
11:00
|
Coffee and Networking
|
11:30
|
Boost Efficiency With The Right Tech-Stack!
Stripping out the unnecessary and focusing optimising your use of the right tools will see a significant rise in the profitability of your business, getting this combo right will also boost team morale and see client value soar. We will discuss the combination of simple yet critical tool-based ingredients to boosting profit levels through enhanced efficiency. We will show you: •How to identify (and strip out) redundant tools and processes that cost you money and time •The steps to avoiding dependency on single team members •How to boost employee productivity without the additional stress and workload •How to harness visibility and automation to counter the skills shortage and build value |
11:45
|
Hybrid Office of Today and Tomorrow
The traditional ways of secure office working are gone. Everything is moving to the cloud and nothing is static anymore. Join Deryck Mitchelson as he walks you through the challenges of the distributed workforce, the complexities of management of securing access and the key principles to adopt for your organisation’s digital journey. |
12:00
|
Keynote Presentation: Lisa Forte, Social Engineering and Cyber Security Expert - 'How to handle an incident like a boss'
|
12:30
|
Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust
Join ThreatLocker Senior Solutions Engineer, Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. Understand how businesses are enhancing their cyber resilience and significantly limiting the damage ransomware can inflict with a Zero Trust architecture |
12:45
|
Lunch and Networking
|
13:50
|
Chair's Afternoon Address
|
13:55
|
Keynote Presentation: Richard Parlour, CEO, Financial Law Markets International - 'Cyber Resilience: The Empire Strikes Back?'
With cyber threats increasing exponentially, and even boosted by the pandemic, cyber resilience is even more important. What impact will the proposals for a new cyber resilience law have? What would you like to see in them? This session will cover the proposed impact on digital service providers, and suggestions as to how to make resilience future proof. |
14:25
|
Ransomware: Top Threats and Best Practices
Ransomware attacks worldwide have gone up by a whopping 102% in 2021 as compared to 2020. The truth is when it comes to ransomware, no business is too big or too small. Don’t fall victim to ransomware. Gather actionable knowledge now to fortify your cyber resilience. Protecting your tenant requires strategies and tactics to reduce the frequency and severity of data loss events in addition to maintaining backup copies of your data. Unitrends and Spanning will show you how to have the best cybersecurity defences. Brought to you by Unitrends and Spanning |
14:40
|
Keynote Presentation: Shawnee Delaney, CEO Vaillance Group - 'Employment Lifecycle Management to Mitigate Insider Threats'
An employee’s lifecycle encompasses several stages throughout their career. This begins with recruitment and concludes with resignation, retirement, or termination. This talk addresses how organizations can establish an employment lifecycle program in order to give employees consistency throughout their careers and teaches you how to prevent insider threats as a result. It also provides a framework to understand important interdependencies, touchpoints, interactions, and gaps in insider protection strategies. It will cover:
Best practices for mitigating insider threat by managing the employment lifecycle |
15:00
|
Coffee and Networking
|
15:30
|
Presentation from: Alexis Conran, British Actor, Writer and TV presenter; as seen on 'The Real Hustle - 'Hacking Human Nature'
Conmen are the hackers of human nature. They have been scamming us for millennia. So what is it about our make up that makes us all susceptible to scams? What are our weaknesses? Through a careful examination of real world scams we look at the pattern that conmen rely on to get the better of us. Along the way we learn to spot the red flags that would otherwise go under the radar and recognise how to spot scams and stay safe both in our professional and personal lives. Cyber News Group is pleased to welcome Alexis Conran to speak at our Birmingham event. Self-confessed technophile Alexis is a British actor, writer & presenter on TV & radio, who currently hosts the weekend afternoon show on Times Radio. He co-hosted the BBC3 show The Real Hustle from 2006 until 2012, & won Celebrity MasterChef 2016, beating Louise Minchin & Jimmy Osmond in the final. Alexis will also be taking questions from the audience. |
16:30
|
Chair's Closing Remarks and Event Close
|
16:35
|
Drinks Reception
|