Day 1 agenda

-
Registration
-
Welcome & Opening Remarks from Computing
Speaker
Editor
Computing and Delta
-
Keynote Address: Cyber Crime and Cyber Criminals – Threats and Tactics

Charlie discusses the threats and need for appropriate cyber security measures, both physical, human and digital, examining the practical and strategic nature of the precautions required now and in the future and gives operational examples of investigations dealt with in the past. Covering hackers attacking governments, banks, and retailers, organised criminals stealing our personal information, dark markets that facilitate cyber trade, from state sponsored attacks to juveniles just having fun. Charlie highlights current cyber risks, future global threats and how and why every organisation is potentially vulnerable to escalating Ransomware, Ddos and Data breaches.

An overview of cyber crime, real world operational cases investigated and prosecuted, a look at who’s doing what and how including organised crime groups attacking financial institutions, dark markets that facilitate cyber trade, internet frauds, phishing and hacktivist attacks.

Speaker
Former Head of the Police National Cyber Crime Unit and Senior Cyber Crime Advisor
PwC
-
The Purpose of Endpoint Security: Stopping cyber threats or making you feel good?

The plethora of security vendors operating in today's marketplace can be overwhelming. With so many options, it's easy to be distracted with the latest, greatest, shiny tool. Join Rob Allen for a deep dive into the purpose of cybersecurity and how you can use that to your operational advantage today.

Speaker
VP of Operations EMEA
ThreatLocker

-
Networking Lunch and Exhibit Stands
-
The Ultimate Threat – Cyber weapons designed to kill or injure.
  • Cyber as a weapon of mass destruction.
  • Evolution of attacks on critical national infrastructure.
  • Direct and indirect attacks aimed at causing harm.
  • Targeted cyber assassinations.
  • Astroturfing and the incitement of mob rule.
Speaker
CISO
UPP
-
Panel Discussion: Improving diversity aspects in cyber
  • Current state of play on what the companies are doing in attracting and retaining talent to the cyber sector
  • Is the industry doing enough to diversify their workforce? What more can be done?
  • How do we improve diversity, equity and inclusion in the cyber security profession? Practical examples of how diversity is adding value to organisations and unlocking business potential
Speakers
Head of Information Technology
Thrive Homes UK
Chief Information Security Officer
Accenture
PhD
CyberCompare Advisory Board member
Chief Information Security Officer
RS Group PLC
Associate Editor
Computing
-
Boardroom Appointments

CyberSecurity attendees are assigned into peer groups of 8-10 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes with a ten minute buffer between each session. Sponsors will then present new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Afternoon Break and Networking
-
Keynote Showcase - Checkmarx
Speaker
Senior Solutions Engineer
Checkmarx

-
Panel Discussion: Cyber Insurance – is it worth it?

With the rise of cybercrime and the increasing amount of sensitive information being stored online, many businesses and individuals are considering whether to purchase cyber insurance.

  • Assessing the benefits of having cyber insurance. Does cyber insurance worth the investment? What are the potential benefits and drawbacks of cyber insurance?
  • What are the potential risks and limitations of cyber insurance, such as costly premiums and exclusions or limitations on coverage?
  • The factors that businesses should consider when deciding whether to purchase cyber insurance, including the size and type of the business, the sensitivity of the data it handles, the cost of premiums, and the level of risk tolerance of the business
Speakers
Chief Information Security Officer
RS Group PLC
Computing and Delta
Research Director
Interim CIO
University Hospitals Sussex
Head of Information Technology
Thrive Homes UK
-
Thanks & Closing Remarks
-
Networking / Leisure Time
-
Drinks Reception
-
Networking Dinner & Entertainment

Day 2 agenda

-
Welcome & Opening Remarks from Computing
Speaker
Editor
Computing and Delta
-
Opening Presentation: Neurodiversity in Cyber

The cyber security skills gap has long been addressed as an issue within the industry. In this timely talk, Holly will address what she believes is the real gap, which is not a skill gap, but a communication gap. Identified from her own research and industry experience, Holly will present how we must as an industry, be more open to supporting neurodiversity and why as an industry we are at a shortage of skills in the first place.

Speaker
Head of NeuroDiversity
Cyber Research and Consulting, Stott and May Consulting
-
Keynote Address: Just because I can, should I? Protect your organisation in a world in which technology moves faster than the law.

With the explosion of Generative AI onto the scene, with it are as many questions as there are answers. This is just the latest example that technology moves faster than the law. As organisations there is no simple set of rules to follow, we are going to have to make more and more judgement calls. How do we as cybersecurity professionals protect our organisations in this context? ? Join Natalie Cramp and Alistair Dent for an insightful and interactive session exploring data ethics, getting a sneak preview of insight from their Good Data Guide launching on 19 May and ultimately helping you work with your teams to answer the question – just because I can, does it mean I should?

Speakers
CEO
Profusion
Chief Strategy Officer
Profusion
-
Morning Networking & Refreshments Break
-
Boardroom Appointments

CyberSecurity attendees are assigned into peer groups of 8-10 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes with a ten minute buffer between each session. Sponsors will then present new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Case Study: How to implement Cyber Risk Quantification (CRQ) without a degree in maths

With mainstream media reporting on major cyber-attacks nearly every month, most company Boards have cyber-security firmly on their radar. If security functions want to be respected at this level and get the investment they need, it helps to be able to communicate in a language that Boards understand: pounds and pence. CRQ is an incredibly useful tool to achieve this objective and allows security functions to estimate annualised financial losses from a cyber-attack, estimate the Return on Investment (ROI) from security projects and help identify suitable insurance cover. It can also, however, be incredibly dauting and difficult to implement with its use of mathematical functions, estimation of attack frequency and myriad of software available.

Speaker
Chief Information Security Officer
MHR
-
Networking Lunch and Exhibit Stands
-
Boardroom Appointments

CyberSecurity attendees are assigned into peer groups of 8-10 based on business focus and technology interests. Vendors select and meet with the boardrooms for 25 minutes with a ten minute buffer between each session. Sponsors will then present new products, programs, and opportunities – in an environment conducive to spirited conversation and constructive feedback.

-
Panel Discussion: Optimising the remote working experience without compromising on security
  • How to optimise the remote working experience by providing best practices for communication, collaboration, and problem-solving
  • How to make remote working secure -analysis of the security measures that should be in place to keep employee data and personal information secure work remotely
  • Users ‘off the office network’ presents unique challenges to IT Security. How do you ensure the integrity of the devices connecting, and verify the identity of the user logging on?
  • How do we, as Business Leaders, use our IT skills, and knowledge, to help build the social networking in our businesses when users are spread far and wide?
Speakers
Head of Information Technology
Thrive Homes UK
Information Security Manager
Goodlord
Editor
Computing and Delta
IT Director
University of East london
-
Afternoon Networking & Refreshments Break
-
Panel Discussion: Automation and Zero trust approach

Analysing automation and zero trust approach in cybersecurity and uncovering the main pain points, challenges and opportunities for the market participants

Speakers
Chief Information Security Officer
Mattbzh Consulting
Computing and Delta
Research Director
Interim CIO
Landsec
Information Security Manager
Goodlord
-
Thanks & Closing Remarks. End of Conference
Conference Concludes