Date and Time | Title | |
---|---|---|
Aug 7, 2024 8:45am - 9:00am (London) | Chairperson's Welcome from Sarah Armstrong-Smith | |
Aug 7, 2024 9:00am - 9:30am (London) | Supply Chain Risk: The Weakest Link in the Chain Join us for an insightful and practical talk on Supplier Evaluation Risk Management, where Daniel Wood, Group CISO and Steve Giachardi, Senior Information Security Manager at ZDL will discuss the crucial aspects of mitigating risks in your supply chain. In an era where global markets are increasingly interconnected, businesses face unprecedented challenges in ensuring the reliability and resilience of their suppliers.Dan and Steve will cover:What is supply chain risk? Identifying & Assessing supply chain riskMitigation Strategies & Building ResilienceIntroducing VenDoor | |
Aug 7, 2024 9:30am - 10:00am (London) | Keeping Pace: Managing the Risks of AI Generated Code AI coding assistants, such as Microsoft CoPilot and ChatGPT, will fundamentally change the way teams build software, much like open source software has over the last decade. As with open source, teams seeking the benefits of AI will also need to take precautions to address the security, quality, and intellectual property risks that come with the use of AI-generated code. The question is: Is your team ready for AI? Join Lucas von Stockhausen, as he explores the key risks teams might encounter using coding assistants. As well as the safeguards needed for the confident use of AI-generated code. | |
Aug 7, 2024 10:00am - 10:30am (London) | New Phishing Benchmarks Unlocked: Is Your Organisation Ahead of the Curve in 2024 In an era where cyber threats are constantly evolving, staying ahead of phishing attacks is crucial for every organisation. This enlightening session draws from KnowBe4's latest UK & Ireland Phishing Benchmarking Report to provide you with cutting-edge insights into the current state of phishing preparedness across industries.We'll dive deep into the 2024 data, exploring how different sectors fare in their ability to recognise and respond to phishing attempts. You'll gain valuable perspectives on:The latest Phish-prone Percentage™ benchmarks across various industriesHow security awareness training impacts an organisation's vulnerability to phishingThe effectiveness of simulated phishing tests in improving employee vigilanceIndustry-specific trends and challenges in combating phishing threatsOur experts will break down the numbers, helping you understand where your organisation stands in comparison to industry peers. We'll also discuss practical strategies to lower your Phish-prone Percentage™ and strengthen your overall security posture.Whether you're in finance, healthcare, education, or any other sector, this session will equip you with the knowledge to assess your current anti-phishing measures and implement data-driven improvements. Join us to ensure your organisation isn't just keeping pace, but leading the charge in phishing defence for 2024 and beyond. | |
Aug 7, 2024 11:00am - 11:30am (London) | KEYNOTE SESSION from Daniel Selman - How to train your dragon In this session Daniel will explore the challenges of implementing a successful Data Protection Programme, how you identify what needs to be done and gain the support of leadership and the organisation to deliver the necessary changes. | |
Aug 7, 2024 11:30am - 12:00pm (London) | Automate detection and response with a smart, secure workflow builder Rob Walsh will show how using Tines as a no-code smart, secure workflow builder enables you to break down barriers across systems with fewer duplicate efforts, unnecessary alerts, and information silos. Then, Pat Meehan, will run through a demo of a suspicious log in, to show how you can effectively use Tines to automate detection and response. | |
Aug 7, 2024 12:00pm - 12:30pm (London) | KEYNOTE Sarah Connelly - Privacy and Tech Enabled Abuse As security professionals, our mandate is to support others to use technology safely, while reducing the opportunities for harm caused by malicious individuals. We target both the remediation of vulnerabilities, and design for protection from unknown threats.
But what if we are missing a significant threat to our users privacy and safety? This talk discusses the topic of Technology Enabled abuse and the growing harms that are impacting a significant number of individuals today. | |
Aug 7, 2024 1:00pm - 1:30pm (London) | Managing risks under NIST 2.0 CyberSecurity Framework The newly updated NIST Cybersecurity Framework (CSF) 2.0 framework underscores the importance for all organizations – despite their industry, size, or maturity – to manage and reduce cybersecurity risks within their organization. Improving their cybersecurity posture and defending against the onslaught of attacks by threat actors should be a concern and responsibility of all within the organization from executives to practitioners. The Censys Internet Intelligence Platform is uniquely positioned to help organizations understand their external attack surface (EAS), the risks associated with their organization, and their overall cybersecurity posture. | |
Aug 7, 2024 1:30pm - 2:00pm (London) | An expert look at The State of Ransomware Discover the latest trends of the ever-changing threat landscape, causes of cyber attacks, the costs incurred and how organisations can take proactive steps to protect themselves from cybercrime. | |
Aug 7, 2024 2:00pm - 2:30pm (London) | Data-Backed Decisions: Where to Invest in Cybersecurity Arun Banerjee, Cyber Risk Consulting Lead at Zurich Resilience Solutions, along with Sheá Panayi, Cyber Risk Consultant, will discuss the importance and applications of Cyber Risk quantification in Cyber Risk management. They will share practical use cases, illustrating how quantifying cyber risk will guide investment decisions in cybersecurity. The talk will emphasise the creation of long-term roadmaps, integrating various security controls and demonstrating their impact on reducing potential losses. They will also highlight the significance of clear reporting and metrics to showcase the effectiveness and performance of cybersecurity measures. The presentation will conclude with an overview of the services offered by Zurich Resilience Solutions in Cyber Risk management, including audits, risk quantification, incident response exercises, and supply chain management. | |
Aug 7, 2024 2:30pm - 3:00pm (London) | Monitor and Secure ChatGPT Conversations for Compliance and DLP Dive deep into the world of AI communication security with our exclusive webinar designed for IT and security professionals in highly regulated sectors. As ChatGPT becomes a staple in business communications, the risks and regulatory demands also rise. This session will equip you with: - An understanding of the potential risks and compliance challenges posed by AI-driven chat platforms. - Advanced techniques and tools to monitor and secure ChatGPT conversations effectively. - Insights into how leading organizations maintain impeccable compliance and data integrity amidst evolving security threats. | |
Aug 7, 2024 3:00pm - 3:30pm (London) | How to Ruin an Adversaries' Day: Focusing on threat actor behaviors in cyber threat intelligence Cyber threat intelligence is much more than indicators of compromise and operational intelligence. Indicators have utility in defending an organization, but their value decreases as adversaries adapt and become more sophisticated. Cybersecurity teams need to expand their focus on attacker behaviors, and producing operational and strategic intelligence. Using a recent hack, join us In this session as we cover:
• Why moving up the Pyramid of Pain is important
• Moving your CTI focus from operational to tactical and strategic intel, and how to identify and work with intel consumers who will use it
• The role of ATT&CK and CTI | |
Aug 7, 2024 4:00pm - 5:00pm (London) | Live Fireside Chat with Chris Roberts Sarah Armstrong-Smith – Chief Security Advisor at Microsoft & Cyber Author & Event Chair will quiz :- Chris Roberts Strategist, Researcher, Hacker, Advisor, ‘Hacking is not a crime henchman,’ PITA, & various technical names. Podcast Co-Host on "WTF Did I just Read". A strategist within the AI & Deepfake realm at World Wide Technology, & company advisor, & formally a CISO/vCISO/Advisor for a number of entities & organisations globally. Recent projects focused within Artificial Intelligence, Threat Intelligence, Identity, GRC, Cryptography, & Aviation/Transportation. Has been also called a ‘Scottish Security Warlock....’ |