Please see below the agenda for day 1, Thursday 9 June which takes place in London.

>>Click here for day 2's agenda

>>Click here for day 3's agenda

Please note, day 1 in London is specifically for IT professionals from end user companies. All qualified registrations will be confirmed via email after booking your place. We welcome everyone to our virtual days on 15 & 16 June.

Day 1 Programme

-
Registration
-
Welcome and Opening Remarks
-
Delta Presentation

A brief overview based on Computing’s Delta analysis that will delve into the latest reports and data surrounding the cyber security industry. Join us for an in-depth look at the current industry landscape and trends. 

Speaker
Research Director
Computing & Delta
-
Cleaning up our Digital environment

In the aftermath of major global & political events, Ciaran looks at what cyber threats organizations are really scared of and why. With the uptick in ransomware attacks and the cyber threat associated with international events causing stress across many industries mitigations such as good practice and IoT Security are needed. He will further look at what it tells us and how we approach digital hygiene of today and the cyber security of tomorrow.

Speaker
First CEO
National Cyber Security Centre
-
Fast and Furious Attacks: Using AI to surgically respond

Fast-moving cyber-attacks like ransomware can strike at any time, and security teams are often unable to react quickly enough. Join Dr Beverly McCann, Principal Analyst Consultant at Darktrace, to learn how Autonomous Response uses Self-Learning AI’s understanding of ‘self’ to take targeted action to stop in-progress attacks, without disrupting your business. • Learn how Autonomous Response knows exactly the right action to take, at the right time, to contain an in-person attack • How AI takes precise action to neutralize threats on the behalf of security teams • Use of real-world threat finds to illustrate the workings of Autonomous Response technology

Speaker
Head of Threat Research
Darktrace
-
Morning Refreshments
-
Interactive Panel Discussion- Rebuilding after an attack

While organizations focus on how to prevent an attack, it is how they deal with the aftermath that really counts. What are the next steps for your company and how do you manage the fall out of this intrusion? Join our panellist as we explore the impact a breech had on their business and what their next moves were. You will also get the opportunity to participate in each step of the journey during this interactive panel

Speakers
Head of Threat Research
Darktrace
Former Senior Intelligence Officer
UK Government
Chief Information Security Officer
The Open University
Editor
Computing & Delta
-
Securing Applications from Vulnerabilities with Zero Trust

In order to protect against the evolving threat landscape, we must change the way in which we protect our data against vulnerabilities. To adapt, organizations are operating within the framework that no user, network, or device can be trusted by default until proven otherwise. Join, Ben Jenkins, as he discusses how to secure applications from vulnerabilities using a Zero Trust model.

Speaker
Director of Cyber Security
Threatlocker
-
Lunch and Networking Break
-
Roundtable Discussions- Choose 2 sessions to attend for our take on ‘speed dating’. Each session will last 30 minutes, giving the opportunity to discuss the topic among your peers. When the timer ends, you will join your new group for a new topic.

a. Ransomware: Defence and Mitigation Techniques

b. Diving into the talent pool- how to fill the skills gaps in Cyber Security

    Christelle Heikkila, Non-Executive Director, TechSkills

c. The new ‘9 to 5’ – ensuring security remotely

-
Weaponising the internet

The nature of war has changed with cyber weapons now a standard inclusion in many nation states arsenals. Recent events in Ukraine saw Russia using cyber-attacks as part of its invasion strategy. This itself triggered offensive cyber-attack responses from pro-Ukrainian threat actors. For a number of years now we have seen an escalation of state sponsored cyber-attacks as nation states and their proxies vie for superiority in a virtual arms race. The seriousness of the situation resulted in the 2021 Integrated Defence Review proposing that Britain could use nuclear weapons in response to a devastating cyber-attack. The internet has become a strategic battlefield with cyber weapons capable of virtual mass destruction and the potential to inflict real world devastation. Defensive cyber is no longer enough.

Speaker
Director of Cyber Security
BGL Group
-
Interactive Session
-
Afternoon Refreshments
-
Presentation by Okta
-
Cyber Trivia

Get ready to test your knowledge with our cyber trivia! Get your phones out and join us to test you cyber skills. 

-
Identify, Protect & Recover- The Cyber Security Landscape

There are many questions to consider when enacting a cyber security policy in an organization. The main goal is to reduce the unknowns and ensure a contingency plan is in place for if/when you find yourself on the receiving end of an attack. How confident is your company at not only reducing those unknowns but also defending against the latest threats such as ransomware?

Speaker
Former Senior Intelligence Officer
UK Government
-
Close of day 1

Please join us for a drinks reception downstairs