Chairs Opening Address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Security in 2022

•The changing face of cyber crime: 2022 cyber threats and new methods to protect against them

•The risks and costs of cybercrime to businesses

•Cyber skills: The importance of education and hiring the right people

•Outlooks on AI & IOT

Ransomware the Real Threat

Steve Mulhearn

Within the world of Ransomware as a service and the increase of these attacks we look into the goals and targets of these criminal organisations. This in turn while understanding the true perception of this threat within business is key to understanding the real risk of these attacks and their targets.

Plan Smart: The Future is SASE

Richard Walters

Today’s work environment has been fast-tracked along its journey to hybrid working. As this evolution has driven an increasingly digital landscape, workers are now using cloud-based applications on a daily basis, giving rise to new advanced threats. The transition of the modern workplace from a place to an activity has also made the traditional concept of a network perimeter redundant. We are now in an era where security needs to be designed around an entirely new perimeter, built on identity and context. This is where Zero Trust and ZTNA (Zero Trust Network Access) comes in, as part of the journey towards SASE.

Join Censornet’s CTO Richard Walters as he dispels the SASE one-size-fits-all myth, and instead explains how it can be adapted to serve the needs of a world where the perimeter is no longer “entombed in a box” but anywhere the enterprise needs it to be. Richard will also explore how the smart decisions you make today will optimise your future cloud and network security.

Keynote Presentation: Robin Smith, Head of Cyber and Information Security, Aston Martin - 'Protecting Frontier Tech in the Age of the Mega Hack'

Robin Smith

  • Review of current trends in cyber crime
  • How to combat malicious innovation by cyber criminals
  • Emerging tech to protect organisations
Darktrace for Cloud: Taking Cover with Self-Learning AI

Dr Beverley McCann

Cloud computing allows businesses to innovate, collaborate and share like never before, but for security teams the cloud is often a blind spot, leaving organisations open to attack.

Join Darktrace’s Beverly McCann, Principal Analyst Consultant, as she discusses the challenge of cloud computing, the rise of novel threats, and how Self-Learning AI can be used to protect the dynamic workforce and changing digital environments, providing total visibility. Includes real-world threat examples, including a Microsoft Azure takeover and accidental insider threat.

Cloudflare’s guide to API Security

Damiete King-Harry

We all know by now that APIs (application programming interfaces), make the world go around. More precisely, they let distinct modern applications communicate with each other. 

The importance of APIs are growing, with more and more companies describing themselves as “API-first.” In some cases, a company’s actual product is an API with a business model centred on consuming it. 

Companies devote time and effort to deliberately craft their API approach to consider how it can expose the right data, becoming foundational to revenue and business models. 

However, building perfect APIs is tough, because just like any piece of software, vulnerabilities will happen, leading to security challenges.

Suffice to say, APIs are everywhere and will only gain momentum in the coming years – and they must be protected. 

For this reason, we’ll examine API attacks and aspects of defense-in-depth when thinking through organizational API security.

Keynote Presentation: Eliza May Austin, CEO and Co-Founder, and PocketSIEM - 'Cybersecurity Stockholm Syndrome - how to take back the reins of your cyber defence through open source technologies'

Eliza May Austin

It’s common knowledge among senior leadership teams that a large proportion of the expensive products and services we buy serve little to no value in the context of our businesses. Often these new relationships come with bad customer services and are predictably eye-wateringly expensive. Yet despite this common narrative, these same professionals are seemingly in love with their vendors. Here lay a thought-provoking similarity to Stockholm syndrome, the act of defending and being protective over one's abuser. 

So how can Senior leaders who spot this pattern, break the cycle of vendor abuse and take back the reins of their cyber defences? Through open-source technologies. This talk will discuss the pros and cons of open-source cyber defence and unpick some of the key concerns senior leaders have about utilising open-source technologies in their defence strategies. 

Coffee and Networking
Boost Efficiency With The Right Tech-Stack!

Wilson Sanders

Stripping out the unnecessary and focusing optimising your use of the right tools will see a significant rise in the profitability of your business, getting this combo right will also boost team morale and see client value soar. We will discuss the combination of simple yet critical tool-based ingredients to boosting profit levels through enhanced efficiency. We will show you:

•How to identify (and strip out) redundant tools and processes that cost you money and time

•The steps to avoiding dependency on single team members

•How to boost employee productivity without the additional stress and workload

•How to harness visibility and automation to counter the skills shortage and build value

Hybrid Office of Today and Tomorrow

Deryck Mitchelson

The traditional ways of secure office working are gone. Everything is moving to the cloud and nothing is static anymore. Join Deryck Mitchelson as he walks you through the challenges of the distributed workforce, the complexities of management of securing access and the key principles to adopt for your organisation’s digital journey.

Keynote Presentation: Lisa Forte, Social Engineering and Cyber Security Expert - 'How to handle an incident like a boss'

Lisa Forte

  • Why do humans struggle to handle a crisis under pressure?
  • How can we be better prepared for a breach or attack? Does this really make us less panicky creatures in a crisis?
  • What lessons should we be learning from other industries when it comes to incident management?
Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust

Ben Jenkins

Join ThreatLocker Senior Solutions Engineer, Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. Understand how businesses are enhancing their cyber resilience and significantly limiting the damage ransomware can inflict with a Zero Trust architecture

Lunch and Networking
Chair's Afternoon Address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Keynote Presentation: Richard Parlour, CEO, Financial Law Markets International - 'Cyber Resilience: The Empire Strikes Back?'

Richard Parlour

With cyber threats increasing exponentially, and even boosted by the pandemic, cyber resilience is even more important. What impact will the proposals for a new cyber resilience law have? What would you like to see in them? This session will cover the proposed impact on digital service providers, and suggestions as to how to make resilience future proof.

Ransomware: Top Threats and Best Practices

Wilson Sanders

Ransomware attacks worldwide have gone up by a whopping 102% in 2021 as compared to 2020. The truth is when it comes to ransomware, no business is too big or too small. Don’t fall victim to ransomware. Gather actionable knowledge now to fortify your cyber resilience. Protecting your tenant requires strategies and tactics to reduce the frequency and severity of data loss events in addition to maintaining backup copies of your data. Unitrends and Spanning will show you how to have the best cybersecurity defences. Brought to you by Unitrends and Spanning

Keynote Presentation: Shawnee Delaney, CEO Vaillance Group - 'Employment Lifecycle Management to Mitigate Insider Threats'

Shawnee Delaney

An employee’s lifecycle encompasses several stages throughout their career.  This begins with recruitment and concludes with resignation, retirement, or termination.  This talk addresses how organizations can establish an employment lifecycle program in order to give employees consistency throughout their careers and teaches you how to prevent insider threats as a result.  It also provides a framework to understand important interdependencies, touchpoints, interactions, and gaps in insider protection strategies.

It will cover:

  • What is an insider threat?
  • What is employment lifecycle management?
  • How the human factor impacts organizations

Best practices for mitigating insider threat by managing the employment lifecycle

Coffee and Networking
Presentation from: Alexis Conran, British Actor, Writer and TV presenter; as seen on 'The Real Hustle - 'Hacking Human Nature'

Alexis Conran

Conmen are the hackers of human nature. They have been scamming us for millennia. So what is it about our make up that makes us all susceptible to scams? What are our weaknesses? Through a careful examination of real world scams we look at the pattern that conmen rely on to get the better of us. Along the way we learn to spot the red flags that would otherwise go under the radar and recognise how to spot scams and stay safe both in our professional and personal lives. 

Cyber News Group is pleased to welcome Alexis Conran to speak at our Birmingham event. Self-confessed technophile Alexis is a British actor, writer & presenter on TV & radio, who currently hosts the weekend afternoon show on Times Radio.

He co-hosted the BBC3 show The Real Hustle from 2006 until 2012, & won Celebrity MasterChef 2016, beating Louise Minchin & Jimmy Osmond in the final.

Alexis will also be taking questions from the audience.

Chair's Closing Remarks and Event Close
Drinks Reception