Programme:

08:30
Networking
08:55
Chairs Opening Address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Security in 2022

•The changing face of cyber crime: 2022 cyber threats and new methods to protect against them

•The risks and costs of cybercrime to businesses

•Cyber skills: The importance of education and hiring the right people

•Outlooks on AI & IOT

09:00
The cyber security threats faced by UK SMBs and how to mitigate them

UK SMBs are faced with multiple cyber security threats, which increasingly limited budgets make it difficult to address. This session will cover:

  • The cyber security threats facing SMBs eg ransomware, targeted attacks, supply chain attacks
  • Factors adding risk: eg outdated operating systems, irregular patching
  • Skills within the business: How to access cyber security skills with limited budget
  • How to create a cyber security strategy that works for your business: Points to take into account. Technology to support this
  • NCSC advice to take into account
09:15
Protecting customer data in a privacy-conscious world

Many companies rely on the data they collect to gain insights on customers to serve them better. But data privacy is now on the agenda, so what can be done to balance customer service with increasingly regulated data protection needs? This session will look at:

  • The types of companies collecting and analysing “big data” eg retail and how privacy awareness affects them
  • Data privacy as a unique selling point: Apple has done it, so how can your business do the same?
  • Data privacy culture: How consumer culture has changed the way customers think about privacy.
  • Increasing regulation: the EU GDPR and UK DPA
09:30
Keynote Presentation:
10:00
Ransomware trends and mitigation techniques

Ransomware continues to be a major concern for all governments and businesses. The data-locking malware is continuing to proliferate, and it’s becoming more sophisticated. This talk will cover.

  • Recent ransomware attacks on business and government, and what can be learned from them
  • How ransomware infiltrates businesses
  • Which APTs use ransomware and how to avoid their attacks
  • Ransomware-as-a-service: A big business
  • Ransomcloud: How attackers are increasingly targeting cloud based applications and cloud providers, and the implications
  • Business strategy and future ransomware trends
10:15
The rise of social engineering

Hotel chain Marriott has been hit by another data breach through social engineering, which led to the exfiltration of 20GB of data from the firm. Social engineers are becoming more sophisticated and targeted in their approach, so how can firms prevent themselves from becoming a victim? Delivered by a seasoned “white hat” social engineer, this talk will look at:

  • How social engineering is changing: What to look out for
  • What kind of tricks do hackers use to get information?
  • Who in the business is most at risk?
  • What technical and policy based controls will help prevent these attacks?
  • How staff training can help
10:30
Keynote Presentation:
11:00
Coffee and Networking
11:30
DDoS explained

DDoS attacks are often seen as rudimentary, but they can cause a lot of damage. DDoS attacks are also getting bigger, reaching 500mbps according to latest figures.

This talk will cover:

  • The Size of DDoS: Some stats demonstrating how big attacks have grown and why that matters
  • Why you shouldn’t ignore DDoS: the threat to your business
  • Who is at risk from DDoS and what’s at stake
  • How to protect from and mitigate DDoS attacks
11:45
Spyware: What is spyware and who is at risk?

In July, it was revealed that Apple’s next operating system iOS 16 will include Lockdown Mode to protect iPhones from spyware. It follows a series of so called zero-click attacks that have hit targeted individuals over the last year – including the infamous Pegasus attack.

This talk will cover:

  • What is spyware: Its role in the murder of Jamal Khashoggi
  • Types of Spyware and signs it could be on a device
  • Which businesses are at risk, and how to include this in your security strategy
  • What can be done to protect against it: Is Apple’s Lockdown Mode an effective mitigation for at risk business users?
12:00
Keynote Presentation:
12:30
Security 101: Doing business in the Metaverse

The Metaverse is on its way, led by companies including Facebook. There are multiple predictions for the new technology, including benefits for businesses, but there are also cyber security and privacy risks. This session will cover:

  • What is the Metaverse and how will it impact businesses eg meetings in the Metaverse
  • What are the security risks for businesses?
  • The privacy risks: What you need to know about employees’ privacy in the Metaverse
  • What businesses should be doing now and when it arrives
12:45
Lunch and Networking
13:50
Chair's Afternoon Address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

13:55
Keynote Presentation:
14:25
AI in cyber security: A 2022 outlook

AI is already being used in cyber security, as part of systems able to catch and mitigate attacks. But what does the future hold for this technology? This session will examine:

  • What is AI in cyber security and how has it developed?
  • AI in cyber warfare: Future predictions
  • AI used by adversaries: As defenders use AI to protect, criminals are using the technology to attack businesses. What can businesses do to respond?
14:40
Keynote Presentation:
15:00
Coffee and Networking
15:30
Keynote Presentation:
16:30
Chair's Closing Remarks and Event Close
16:35
Drinks Reception