Please see below the agenda for day 1, Thursday 9 June which takes place in London.
>>Click here for day 2's agenda
>>Click here for day 3's agenda
Please note, day 1 in London is specifically for IT professionals from end user companies. All qualified registrations will be confirmed via email after booking your place.
We welcome everyone to our virtual days on 15 & 16 June.
Day 1 Programme
A brief overview based on Computing’s Delta analysis that will delve into the latest reports and data surrounding the cyber security industry. Join us for an in-depth look at the current industry landscape and trends.
In the aftermath of major global & political events, Ciaran looks at what cyber threats organizations are really scared of and why. With the uptick in ransomware attacks and the cyber threat associated with international events causing stress across many industries mitigations such as good practice and IoT Security are needed. He will further look at what it tells us and how we approach digital hygiene of today and the cyber security of tomorrow.
Fast-moving cyber-attacks like ransomware can strike at any time, and security teams are often unable to react quickly enough. Join Dr Beverly McCann, Principal Analyst Consultant at Darktrace, to learn how Autonomous Response uses Self-Learning AI’s understanding of ‘self’ to take targeted action to stop in-progress attacks, without disrupting your business.
• Learn how Autonomous Response knows exactly the right action to take, at the right time, to contain an in-person attack
• How AI takes precise action to neutralize threats on the behalf of security teams
• Use of real-world threat finds to illustrate the workings of Autonomous Response technology
While organizations focus on how to prevent an attack, it is how they deal with the aftermath that really counts. What are the next steps for your company and how do you manage the fall out of this intrusion? Join our panellist as we explore the impact a breech had on their business and what their next moves were. You will also get the opportunity to participate in each step of the journey during this interactive panel
In order to protect against the evolving threat landscape, we must change the way in which we protect our data against vulnerabilities. To adapt, organizations are operating within the framework that no user, network, or device can be trusted by default until proven otherwise. Join, Ben Jenkins, as he discusses how to secure applications from vulnerabilities using a Zero Trust model.
a. Ransomware: Defence and Mitigation Techniques
b. Diving into the talent pool- how to fill the skills gaps in Cyber Security
Christelle Heikkila, Non-Executive Director, TechSkills
c. The new ‘9 to 5’ – ensuring security remotely
The nature of war has changed with cyber weapons now a standard inclusion in many nation states arsenals. Recent events in Ukraine saw Russia using cyber-attacks as part of its invasion strategy. This itself triggered offensive cyber-attack responses from pro-Ukrainian threat actors. For a number of years now we have seen an escalation of state sponsored cyber-attacks as nation states and their proxies vie for superiority in a virtual arms race. The seriousness of the situation resulted in the 2021 Integrated Defence Review proposing that Britain could use nuclear weapons in response to a devastating cyber-attack. The internet has become a strategic battlefield with cyber weapons capable of virtual mass destruction and the potential to inflict real world devastation. Defensive cyber is no longer enough.
Get ready to test your knowledge with our cyber trivia! Get your phones out and join us to test you cyber skills.
There are many questions to consider when enacting a cyber security policy in an organization. The main goal is to reduce the unknowns and ensure a contingency plan is in place for if/when you find yourself on the receiving end of an attack. How confident is your company at not only reducing those unknowns but also defending against the latest threats such as ransomware?
Please join us for a drinks reception downstairs