Programme List - Enterprise Security and Risk Management Live 2018
Menu

Programme

08.30 – 09.00

Registration and breakfast

09.00 – 09.05

Opening Remarks

Stuart Sumner, Editorial Director, Computing, V3 and The Inquirer

09.05 – 09.25

Computing Research

09.25 – 09.55

Morning keynote: The Evolving Cyber Threat to Business

Ben Russell, Head of Threat Response, National Crime Agency 
  • How is the cyber-threat to business changing? 
  • What is law enforcement doing to tackle the threat?
  • Why should victims of cyber-crime support a criminal investigation?

09.55 – 10.40

Panel Discussion: ‘The view from the board’

Andrew Hunt, Digital Data Director, Thought Research
Neil Sinclair, Chief Operating Officer, London Digital Security Centre
  • How does cyber-security funding compare to other business priorities?
  • Risk vs cost: is it worth not paying for protection?
  • What are the cyber-essentials that need to be covered? 

10.40 – 11.10

Morning break, networking and visit to exhibition area

11.10 – 11.30

Google: Securing Your Endpoint With Managed Browser

Oliver Madden, Chrome Enterprise Browser Specialist, Google Cloud
  • For organisations today, cyber-security can feel like a moving target. 
  • As IT teams look to step up their endpoint security strategy, a managed web-browser can offer multiple layers of protection that help reduce the risk of malware, ransomware and other exploits that often target your users. 
  • In this session, a Google expert will help IT leaders identify key ways to improve their current web browser security, while still empowering users to access the web and be productive. 

11.30 – 11.50

Darktrace: The Shift to Self-Learning, Self-Defending Networks 

James Martin, Senior Manager, Darktrace
  • Leveraging machine learning and AI algorithms to defend against advanced, never seen-before, cyber-threats. 
  • How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time. 
  • How to achieve 100% visibility of your entire business including cloud, network and IoT environments. 
  • Why automation and autonomous response is enabling security teams to neutralise in-progress attacks, prioritise resources, and tangibly lower risk. 
  • Real-world examples of subtle, unknown threats that routinely bypass traditional controls. 

11.50 – 12.10

Insider threat

  • Understanding the risk of every human and end-point attached to your network. 
  • Moving away from moat-mentality, the inside is not completely secure. 
  • How to reduce the changes of an insider breach? 
  • What to do if you are breached from within. 

12.10 – 12.30

Be prepared, not held to ransom

  • How significant is ransomware as a threat?
  • What can be done to reduce the risk of ransomware?
  • The do’s and don’ts of ransomware responses.

12.30 – 13.30

Lunch break, networking and visit to exhibition area

13.30 – 14.00

Ex-Hacker Keynote: Poacher turned Gamekeeper - Journey from Hacker to Advising the Boardroom

Mike Koss, Head of IT Security and Risk, N-Brown Group

 

  • Evolution from mid-nineties hacker culture to IT security leader. 
  • Selling my soul to do the right thing - hurdles and challenges both professionally and personally. 
  • The hacker mindset and where senior security leaders sometimes fail.

 

14.00 – 14.45

Panel Discussion: Staff awareness and security culture

Dr Louise Bennett, Management Board, IAAC
Daniel Cuthbert, Global Head of Cyber-Security Research, Grupo Banco Santander
Tarun Samtani, Chief Information Security Officer, Boden
  • How to increase understanding and involvement from senior-decision makers in cyber-security.
  • How do you implement consistent policy throughout your staff?
  • One of the biggest issues is ‘someone else will fix it’, how can you encourage accountability, and therefore smarter responses from your team?
  • How can you encourage staff, of all levels, to admit if they’ve made a mistake?

14.45 – 15.10

Case study:  Security as an enabler

David Deighton, Chief Information Security Officer, University of Birmingham
  • How to use security as an enabler, rather than a ‘no force’.
  • The importance of increasing cyber-security awareness and education.
  • How to improve retention of that new awareness.

15.10 – 15.30

Afternoon break, networking and visit to exhibition area

15.30 – 15.55

A data-lake? Encryption and credential management within the cloud

  • What are the best practices for ensuring your data is safe in the cloud?
  • What encryption and credential management methods should, and could, be used?
  • What are your responsibilities regarding security and confidence within the cloud, rather than just relying on being ‘safe in the herd'.

15.55 – 16.40

Panel Discussion: Designing and implementing an effective security solution

  • What are the best coping mechanisms for the constantly evolving security landscape?
  • What are the core aspects of an effective security plan, including recovery?
  • Security in 6 out of 10 areas still leaves you vulnerable in 4. Are you being consistent with your solutions to ensure you’re secure in the right areas? 

16.40 – 16.45

Closing remarks

16.45 – 17.45

Drinks reception