Please see below the agenda for day 3, Thursday 16 June which takes place online, live from Computing's studio.

>>Click here for day 1's agenda

>>Click here for day 2's agenda

Day 3 Programme

-
Opening remarks
-
Keynote: Embracing Neurodiversity as the key to filling the cyber skills gap and tightening defences

The key to ensuring the strongest defence possible is to have a view from every perspective as hackers will come in all forms. What better way to do so than ensuring a team built from a range of skills both learned and unlearned? Through ensuring your organization is attracting neurodiverse applicants you attract different processes and perspectives. We will explore the benefits of ensuring neurodiversity on your team and how these different views on Cyber Security can help strengthen your defences against a possible Cyber threat.

Speakers
CEO
Code First Girls
GCQH
-
How to Move to DevSecOps

In 2022, we live in an era of digital transformation. it is a the fact that software vulnerabilities cause the majority of data breaches, security must be a top priority for all organizations. An app feature that crashes unexpectedly is guaranteed to frustrate users, while a security vulnerability that facilitates a million-dollar data breach will have a profound, crippling impact on the company. DevSecOps is a philosophy streamlines Security, development and operation processes by incorporating them alongside each other. So how can organizations implement a fully functional DevSecOps?  What is DevSecOps and why it is challenging to move to DevSecOps  Benefits of DevSecOps to the whole organization  Products and security Solution  Best Practices how to move DevSecOps

-
How was I hacked as a cybersecurity engineer?

This topic focuses on security awareness, telling from a personal experience how was I facing when it happened to me. It details the possible attack flow, showing the flaws in the retail website, and what I could, and everybody should do to better protect their sensitive details.

Speaker
Security Operations Lead
Deliveroo
-
Strengthening Healthcare through Strengthening Cyber Security

The future of cyber security for healthcare is not about firewalls, end points, threat detection and vulnerabilities, it’s about clinical risk and patient safety’. Hive Health is working with various NHS hospitals to strengthen the protection of local health care devices, systems and networks, and the patient data in them, from security and cyber risks

Speaker
CEO & Founder
Hive Health
-
Refreshment Break
-
Fireside Chat: The Marmite of IT- Zero Trust

With the shift of working environments bringing employees onto less reliable servers in their homes or public areas, abnormal behaviour is harder to verify leading to the need for stringent checks. Is it worth the expense for a change that may not have the backing needed for proper implementation? IT would seem the idea of implementing a Zero trust approach has the same reaction as marmite- either you love it or you hate it. Join us as we debate the pros and cons of how effective this approach can be and how it will affect companies moving forward.

Speaker
Professor of IT
University of Bath
-
The Importance of Health Data Protection
Speaker
CEO
Healum
-
Case Study: Digital Transformation in the NHS: Allowing growth while keeping secure

With change come a learning curve, which is true when companies are going through digital transformation. This learning curve can leave openings for vulnerabilities if the approach is too open but can also stem creativity if it is too staunch. How do you find the correct balance to usher your company into a new age of digitalization? Join our speaker as we look at best practices for ensuring forward movement and safety.

Speakers
VP of Transformation
Healthcare Communications
Product Manager- Patient Pathway
Healthcare Communications
-
Lunch
-
Presentation: Disinformation in a Cyber World

In the past few years, we have seen the destabilizing effects disinformation campaigns can have on governments and organizations. The rise of social media has made the court of public opinion one of the biggest dangers for the reputation of a business. While it has not always been seen as a cyber security issue, the inability to determine what content is safe and what isn’t has been recognized as a Cyber Security issue, and rightly so. Learn how to stay vigilant against smear campaigns and cyber propaganda

Speaker
Director of Cyber Security
BGL Group
-
Panel Discussion: Looking towards the Future of Cyber Security

The future of Technology is bright and fast moving as we see with innovations like the Metaverse, Digital Identities, and cryptocurrency to name a few. As technology becomes further sophisticated, so do the criminals looking to benefit at the misfortune of others. Join our expert panellists as we look to the future of cyber security and what we can expect moving forward.

Speakers
Chief Technology Officer
GraniteShares
Chief Information Security Officer
Mambu
Head of Cyber & National Security
techUK
Editor
Computing & Delta
-
Closing Remarks