Programme List - Enterprise Security and Risk Management Summit 2017
Menu

Programme

Achieving the best security formula

8.30–9.00

Registration and breakfast

9.00–9.10

Welcome and opening remarks

Stuart Sumner, Editorial Director, Computing, V3 and The Inquirer

9.10–9.30

Computing research: 2017: The year the world was ransomed

Peter Gothard, Technology Analyst, Incisive Media
  • How is the 2017 rise in ransomware affecting, and continuing to affect, the industry?
  • Is increased data security awareness translating into universal action?
  • How are security budgets changing across UK industry to meet the current climate?
  • How will GDPR affect the industry view on cybersecurity?

9.30–10.00

Threats are evolving. A new approach to cyber security is required.

Andrew Hollister, Sr. Technical Director EMEA, LogRhythm
  • Understand how you can detect and stop an attack early in the Cyber Attack Lifecycle
  • Learn how to sort through the noise and concentrate on neutralising high-risk threats
  • Discover how end-to-end Threat Lifecycle Management can help you reduce your threat detection and response times

10.00-10.30

Keynote: Having a closer look at Blockchain and cyber security

Phil Beckett, Managing Director, Alvarez & Marsal
  • Assessing potential risks - does Blockchain pose more security challenges than it solves?
  • Can Blockchain help with GDPR compliance?
  • Is Blockchain the future of cyber security?

10.30-11.10

Polylogue (discussion stimulated by the audience): Training your staff and security awareness

Jan Langham, Head of Security, Risk & Engagement, Paddy Power Betfair
George Tunnicliffe, Head of IT Operations, National Theatre
Colin Mallett, CEO, Trusted Renewables Limited
Moderator: Stuart Sumner, Editorial Director, Computing, V3 & The Inquirer
  • How to ensure that non-IT staff understands IT security risks?

11.10-11.40

Morning break, networking and visit to the exhibition area

11.40–12.00

Driving digital transformation with identity-centric security

Grant Clements, Principal Consultant, Cyber Security, CA Technologies
  • How managing identities is central to security in the modern era
  • What are the challenges and risks associated with the application economy?
  • How do we create a consumer grade digital experience for our employees?

12.00–12.20

The new era of cyber-threats: The shift to self-learning, self-defending networks

Dave Palmer, Director of Technology, Darktrace
  • The implication of the new era of cyber-threats for business networks
  • Why legacy approaches like rules and signatures are proving insufficient on their own
  • How new immune system technologies are imperative for the next generation of cyber-defence
  • Why 100% network visibility and intelligence allows you to preempt emerging situations, in real time
  • Real-world examples of subtle threats that routinely bypass traditional controls

12.20-12.40

Securing your endpoints with browsers

Oliver Madden, Chrome Enterprise Browser Specialist, Google

As more and more applications and services move to the cloud, secure access and data protection increasingly depend on secure connected endpoints. In this session, a Google expert will explore how securing your endpoints with browsers can help IT leaders standardize a modern enterprise web browser that keeps their company and employees secure on the web.

12.40–13.00

Email security - do you have a minute?

Hiwot Mendahun, Product Manager, Mimecast
  • 1m 40s is the median time-to-click in most phishing expeditions.
  • Mimecast will share real-world stories that may scare you, but also offer guidance that you can share with your people.
  • It's worth a minute of your time, isn't it?

13.00-14.00

Lunch break, networking and visit to the exhibition area

14.00-14.25

Case study: Multi-layered security approach

Nick Ioannou, Head of IT, Ratcliffe Groves Partnership
  • How much protection is enough?
  • How to ensure a good balance between the money spent and the level of protection?
  • Having multiple security solutions - what is the key to success?

14.25-15.05

Polylogue (discussion stimulated by the audience): Ensuring your company is ready for the GDPR

Paul Edmunds, Head of Technology, National Crime Agency
Mark Evans, Head of IT, RLB

Erik Vynckier, Board Member, Foresters Friendly Society
Moderator: Graeme Burton, Group News Editor, Enterprise IT, Incisive Media
  • What steps do you need to take to be GDPR compliant?

15.05-15.25

Afternoon break, networking and visit to the exhibition area

15.25-15.50

Case study: Protecting yourself from ransomware

Paul Edmunds, Head of Technology, National Crime Agency
  • How your business can cope with potential ransomware attacks?
  • What protection measures are necessary?
  • The importance of multi-faceted protection.

15.50-16.30

Panel discussion: The future of cyber security

Professor Richard Benham, Director, Corsham Institute
Andy Boura, Senior Information Security Architect, Thomson Reuters
Jonathan Freedman, CTO, Howard Kennedy LLP
John Unsworth, CEO, London Digital Security Centre
Moderator: Tom Allen, Special Projects Editor, Computing, V3 & The Inquirer
  • What are the latest trends in cyber attacks and how to protect yourself against them?
  • What are the biggest changes in cybersecurity landscape that you envision in the next 5 years?
  • How to futureproof your business against cybercrime?

16.30-16.35

Closing remarks

Stuart Sumner, Editorial Director, Computing, V3 and The Inquirer

16.35-17.30

Drinks and networking

*Please note this programme is subject to change.