Programme List - IT Leaders Forum Tackling the latest cloud security challenges
Menu

Programme

8.45 – 9.15

Registration and breakfast

9.15 – 9.25

Welcome and opening remarks

Stuart Sumner, Editorial Director, Computing, V3 and The Inquirer

9.25 – 9.40

Computing research: Making unseen threats visible: the art of managing IT risk

Stuart Sumner, Editorial Director, Computing, V3 and The Inquirer
  • Maintaining the balance between security and innovation
  • New policies required for the self-service era
  • Discovering hidden applications connecting to the network
  • Dealing with insider threats

9.40 – 10.10

Opening keynote: Securing the whenever, wherever workforce in the era of cloud

Nicolas Fischbach, Global CTO, Forcepoint
  • Is a new human-centric approach to cybersecurity needed?
  • What security challenges and gaps are cybersecurity teams facing?
  • What you can do to mitigate risks to securely enable the whenever, wherever workforce.

10.10 – 10.40

Coffee and networking

10.40 – 11.10

End-user keynote: Cloud Security - Things to keep in mind

Steve Williamson, Director, IT Governance, Risk & Compliance, GSK
  • Costs and benefits of cloud adoption. Has 'cloud first' strategy proven to be successful?
  • Understanding the security risks when adopting cloud based applications.
  • How to reduce security risk when adopting cloud applications and public cloud services?
  • Practical strategies organisations can use to control access to public cloud applications.

11.10 - 11.55

Discussion panel: Managing cloud security risk

Dr. Justice Opara-Martins, Research Fellow in Cloud Computing, Bournemouth University
Steve Williamson, Director, IT Governance, Risk & Compliance, GSK
Terry Willis, Head of Information Systems, Age UK
Nicolas Fischbach, Global CTO, Forcepoint
Moderator: Graeme Burton, Group News Editor, Enterprise IT, Incisive Media
  • How do you ensure your data remains secure when an increase in BYOD has led to the proliferation of unmanaged endpoints?
  • What is the best way to control sanctioned cloud applications to safeguard against the loss of critical data and IP?
  • What constitutes suspicious user activity and how do you tackle insider threats?

11.55 - 12.00

Closing remarks

Stuart Sumner, Editorial Director, Computing, V3 and The Inquirer

12.00 - 13.00

Lunch and networking