Please see below the agenda for day 2, Wednesday 15 June which takes place online, live from Computing's studio.

>>Click here for day 1's agenda

>>Click here for day 3's agenda

Day 2 Programme

-
Welcome and opening
-
The Journey to Improve Diversity in the Cyber Security Sector

IASME has been working to bring a more diverse workforce into the cyber security sector. This started with training unemployed neurodiverse adults and supporting them into cyber security jobs and has progressed to working with other groups that experience barriers to employment. Emma will talk about what IASME has learned so far and the plans for the future.

Speaker
Founder
UK Cyber Security Forum
-
Presentation by DarkTrace
-
Debate: The Marmite of IT- Zero Trust

With the shift of working environments bringing employees onto less reliable servers in their homes or public areas, abnormal behaviour is harder to verify leading to the need for stringent checks. Is it worth the expense for a change that may not have the backing needed for proper implementation? IT would seem the idea of implementing a Zero trust approach has the same reaction as marmite- either you love it or you hate it. Join us as we debate the pros and cons of how effective this approach can be and how it will affect companies moving forward.

-
Refreshment Break
-
Panel Discussion: The Business of Security: Integrating Security in Every Role

While many may feel that the cyber security measures are the responsibility of the IT team, the reality is quite different with each employee having an integral part in a company’s security ecosystem. Join our panellists as we discuss how to bring security into the heart of a business and ensure every member of the team adopts good business practices to increase the defences on the front line.

Speakers
Senior Cyber Security Engineer
South Yorkshire Police
Sr Director- Product, Information Security & Global Incident Response,
Canon Europe, Middle East, and Africa
Chief Security Officer
Office for National Statistics
-
Reduce risk, complexity and costs associated with IT compliance and information security

Compliance has become the #1 discipline that an IT professional needs to master in order to ensure that all IT security requirements are met. Compliance Manager GRC is Kaseya’s award-winning compliance process automation platform that simplifies assessing, maintaining, and documenting compliance through its wizard-driven workflow engine, automated network and computer data discovery, web-based management portal and built-in compliance document generation and archiving capabilities. The software is purpose-built for the multi-functional IT professional, to help you reduce risk and improve efficiency while juggling compliance with all your IT security requirements.

Speaker
Compliance Manager GRC
RapidFire
-
Cyber Quiz

Get ready to test your knowledge for the chance to win! 

-
Lunch Break
-
Presentation by Gold Partner
-
Panel Discussion- The Human Side of Cyber Security

To truly understand a cyber-attack, you must look at it through a people focused lens. The intention and incentives to the hackers is a large piece of the puzzle but the role people play in weaking security defences is also crucial to account for in your security strategy. Understanding what makes the hackers tick can be crucial in defending against them. We will explore how to make your business more secure outside of applying tech solutions and how to balance productivity and risk mitigation.

Speakers
Chief Executive Officer
(ISC)²
Professor of Cyber Security
University of Nottingham
-
Refreshment Break
-
Presentation by Gold Partner
-
The Network and Information (NIS) Directive

The Network and Information (NIS) Directive With the EU implementing new regulation to crack down on cyber criminals, the UK feels the implications when conducting business abroad. Ensuring the ‘integrity of the internet’ is key and the NIS directive looks to secure users of the internet and create better practices to thwart data breeches, disinformation campaigns and ensure resilient infrastructure against cyber-attacks. This session will help you to understand how to stay compliant with the NIS directive and what it means for Cyber Security professionals.

Close of day 2