Programme List - Enterprise Security and Risk Management Live 2018
Menu

Programme

08.30 – 09.00

Registration and breakfast

09.00 – 09.05

Opening Remarks

Stuart Sumner, Editorial Director, Computing, V3 and The Inquirer

09.05 – 09.25

Computing Research: SOCs and Threat Hunters - Proactive Defence 

Peter Gothard, Technology Analyst, Incisive Media

Current and emerging cyber threats and strategies to defeat them. 

  • Cyber stories in the headlines. 
  • SOCs and threat hunters, worth the investment. 
  • New tools and techniques.

09.25 – 09.55

Morning keynote: The Evolving Cyber Threat to Business

Ben Russell, Head of Threat Response, National Crime Agency 
  • How is the cyber-threat to business changing? 
  • What is law enforcement doing to tackle the threat?
  • Why should victims of cyber-crime support a criminal investigation?

09.55 – 10.40

Panel Discussion: ‘The view from the board’

Nadeem Bukhari, Head of Information Security, House of Fraser
Andrew Hunt, Digital Data Director, Thought Research

Neil Sinclair, Chief Operating Officer, London Digital Security Centre
Duncan Stott, Chief Information Officer, Kier
Moderator: Tom Allen, Special Projects Editor, Computing, V3 & The Inquirer
  • How does cyber-security funding compare to other business priorities?
  • Risk vs cost: is it worth not paying for protection?
  • What are the cyber-essentials that need to be covered? 

10.40 – 11.10

Morning break, networking and visit to exhibition area

11.10 – 11.30

Google: Securing Your Endpoint With Managed Browser

Oliver Madden, Chrome Enterprise Browser Specialist, Google Cloud
  • For organisations today, cyber-security can feel like a moving target. 
  • As IT teams look to step up their endpoint security strategy, a managed web-browser can offer multiple layers of protection that help reduce the risk of malware, ransomware and other exploits that often target your users. 
  • In this session, a Google expert will help IT leaders identify key ways to improve their current web browser security, while still empowering users to access the web and be productive. 

11.30 – 11.50

Darktrace: The Shift to Self-Learning, Self-Defending Networks 

James Martin, Senior Manager, Darktrace
  • Leveraging machine learning and AI algorithms to defend against advanced, never seen-before, cyber-threats. 
  • How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time. 
  • How to achieve 100% visibility of your entire business including cloud, network and IoT environments. 
  • Why automation and autonomous response is enabling security teams to neutralise in-progress attacks, prioritise resources, and tangibly lower risk. 
  • Real-world examples of subtle, unknown threats that routinely bypass traditional controls. 

11.50 – 12.10

Sumo Logic: Modern Business Require Modern Analytics for The Cloud

Colin Fernandes, EMEA Product Market Development Director, Sumo Logic
  • The importance of machine data and continuous intelligence. 
  • The modern application stack - transformation / use cases. 
  • Modern security and compliance requirements for the Cloud. 

12.10 – 12.30

Mimecast: The role of malware behaviour analytics in identifying and tracking campaigns

Kiri Addison, Threat Labs Engineer, Mimecast

Mimecast processes, analyses, and filters hundreds of millions of emails every day. Turning the related logs and security information into meaningful output is a major undertaking that produces valuable threat intelligence. In this session we will look at some of the techniques we use for extracting threat intelligence from email data and how we can automate some of these processes.

 

  • How to automate campaign detection. 
  • How to identify campaigns that employ some evasive tactics. 
  • How to help threat intelligence analysis with automation.

 

12.30 – 13.30

Lunch break, networking and visit to exhibition area

13.30 – 14.00

Ex-Hacker Keynote: Poacher turned Gamekeeper - Journey from Hacker to Advising the Boardroom

Mike Koss, Head of IT Security and Risk, N-Brown Group
  • Evolution from mid-nineties hacker culture to IT security leader. 
  • Selling my soul to do the right thing - hurdles and challenges both professionally and personally. 
  • The hacker mindset and where senior security leaders sometimes fail.

14.00 – 14.45

Panel Discussion: Staff awareness and security culture

Dr Louise Bennett, Management Board, IAAC
Daniel Cuthbert, Global Head of Cyber-Security Research, Grupo Banco Santander
Andjela Djukavonic, Technology Risk Analyst, KPMG
Tarun Samtani, Chief Information Security Officer, Boden
Moderator: Graeme Burton, Group News Editor, Enterprise IT Incisive Media
  • How to increase understanding and involvement from senior-decision makers in cyber-security.
  • How do you implement consistent policy throughout your staff?
  • One of the biggest issues is ‘someone else will fix it’, how can you encourage accountability, and therefore smarter responses from your team?
  • How can you encourage staff, of all levels, to admit if they’ve made a mistake?

14.45 – 15.10

Case study:  Security as an enabler

David Deighton, Chief Information Security Officer, University of Birmingham
  • How to use security as an enabler, rather than a ‘no force’.
  • The importance of increasing cyber-security awareness and education.
  • How to improve retention of that new awareness.

15.10 – 15.30

Afternoon break, networking and visit to exhibition area

15.30 – 16.15

Panel Discussion: Designing and implementing an effective security solution

Michael Barry, Head of IT Risk and Compliance, Gallagher Global Brokerage UK
Arshid Bashir, Chief Information Security Officer, Department for Transport 
Laura Jones, Senior Risk Analyst Cyber Security, Financial Times 
Carlo Petrini, IT Telecommunications Coordinator, Allianz
Moderator: John Leonard, Group Research Director, Incisive Media
  • What are the best coping mechanisms for the constantly evolving security landscape?
  • What are the core aspects of an effective security plan, including recovery?
  • Security in 6 out of 10 areas still leaves you vulnerable in 4. Are you being consistent with your solutions to ensure you’re secure in the right areas? 

16.15 – 16.20

Closing remarks

Stuart Sumner, Editorial Director, Computing, V3 and The Inquirer

16.20 – 17.20

Drinks reception