Programme List - Enterprise Security and Risk Management Summit 2017


Achieving the best security formula


Registration and breakfast


Welcome and opening remarks

Stuart Sumner, Editorial Director, Computing, V3 and The Inquirer


Computing research

Peter Gothard, Technology Analyst, Incisive Media


Threats are evolving. A new approach to cyber security is required.

Andrew Hollister, Sr. Technical Director EMEA, LogRhythm
  • Understanding how you can detect and stop an attack early in the Cyber Attack Lifecycle
  • Learn how to sort through the noise and concentrate on neutralising high-risk threats
  • Discover how end-to-end Threat Lifecycle Management can help you reduce your threat detection and response times


Keynote: Having a closer look at Blockchain and cyber security

Phil Beckett, Managing Director, Alvarez & Marsal
  • Assessing potential risks - does Blockchain pose more security challenges than it solves?
  • Can Blockchain help with GDPR compliance?
  • Is Blockchain the future of cyber security?


Polylogue (discussion stimulated by the audience): Training your staff and security awareness

Jan Langham, Head of Security, Risk & Engagement, Paddy Power Betfair
Jon Townsend, CIO, National Trust 
George Tunnicliffe, Head of IT Operations, National Theatre
Colin Mallett, CEO, Trusted Renewables Limited
  • How to ensure that non-IT staff understands IT security risks?


Morning break, networking and visit to the exhibition area


Ensuring the Internet of Things doesn't turn into the Internet of Vulnerabilities

  • Understanding the importance of IoT security and privacy
  • Principal challenges trying to secure data produced by embedded sensors
  • Best practises for introducing new devices to your organisational network


The new era of cyber-threats: The shift to self-learning, self-defending networks

Dave Palmer, Director of Technology, Darktrace
  • The implication of the new era of cyber-threats for business networks
  • Why legacy approaches like rules and signatures are proving insufficient on their own
  • How new immune system technologies are imperative for the next generation of cyber-defence
  • Why 100% network visibility and intelligence allows you to preempt emerging situations, in real time
  • Real-world examples of subtle threats that routinely bypass traditional controls


Protection of your personal data

  • Ways in which cyber criminals are trying to get unauthorised access to personal data
  • How to ensure your personal data is safe - real world tips and advices
  • Implementing relevant countermeasures


How to protect yourself from phishing attacks?

  • Understanding potential threats
  • Tips how to minimise the success of a phishing attack
  • Integrating these tips into your enterprise culture


Lunch break, networking and visit to the exhibition area


Case study: Multi-layered security approach

Nick Ioannou, Head of IT, Ratcliffe Groves Partnership
  • How much protection is enough?
  • How to ensure a good balance between the money spent and the level of protection?
  • Having multiple security solutions - what is the key to success?


Polylogue (discussion stimulated by the audience): Ensuring your company is ready for the GDPR

Mark Evans, Head of IT, RLB
Karthik Selvaraj, Senior Solutions Architect, Centrica
Erik Vynckier, Board Member, Foresters Friendly Society
  • What steps do you need to take to be GDPR compliant?


Afternoon break, networking and visit to the exhibition area


Case study: Protecting yourself from ransomware

Paul Edmunds, Head of Technology, National Crime Agency
  • How your business can cope with potential ransomware attacks?
  • What protection measures are necessary?
  • The importance of multi-faceted protection.


Panel discussion: The future of cyber security

Richard Benham, Chairman, The National Cyber Management Centre
Andy Boura, Senior Information Security Architect, Thomson Reuters
Jonathan Freedman, CTO, Howard Kennedy LLP
John Unsworth, CEO, London Digital Security Centre
  • What are the latest trends in cyber attacks and how to protect yourself against them?
  • What are the biggest changes in cybersecurity landscape that you envision in the next 5 years?
  • How to futureproof your business against cybercrime?


Closing remarks

Stuart Sumner, Editorial Director, Computing, V3 and The Inquirer


Drinks and networking

Please note this programme is subject to change.