Welcome & Opening Remarks

Welcome to CyberSecurity Festival - Chapter 2!


A short presentation by Delta.

John Leonard, Group Research Director, Incisive Media

Keynote: Locked and Loading
  • What new technologies will revolutionise how we approach maintaining and securing IT networks?
  • How do you spot threats as data become increasingly digitised, remote and interconnected?
  • How do you protect your data when sharing and collaborating with other organisations?
KnowBe4: Your Organisation through the eyes of an attacker

The bad guys are out there, watching and waiting for an opportunity to strike. They are gathering information about your organisation and users, devising the perfect plan to infiltrate your defences. What if you could see your organisation through the eyes of an attacker?

We'll give you insights into their motivations and how you can use that information to your advantage. Plus, we’ll show simple strategies you can implement to make your organisation a harder target.

Javvad Malik, Security Awareness Advocate, KnowBe4

Field Effect Software: No SIEM, no problem - Why more technology and automation is not always the answer to all your cyber security headaches
As cyber threats and have become more sophisticated and more frequent, organisations have added ever more point solutions to their security stack – adding cost, complexity, and resourcing challenges. It’s an environment that sees vendors thrive off upselling new solutions to customers as they seek to avoid featuring in the next data breach headline.

Businesses are now looking for new ways to combat this security infrastructure sprawl, often turning to SIEM solutions for centralisation of security events and greater use of automation and threat detection. While these routes have their benefits, they also come with their own problems and can be beyond the budgets of SMEs and smaller enterprises. However, that doesn’t mean comprehensive, cost-effective, and manageable security is unachievable for those organisations. This webinar, in which we’ll be sharing our bespoke research findings, will reveal how SMBs and small enterprises can overcome their alert fatigue, resourcing challenges, and security infrastructure sprawl, without blowing their budget on SIEM and bleeding-edge automation.

For all the technology advances, cyber security analysts continue to play a leading role in keeping organisations secure for the foreseeable future. And they can do this most effectively when supported by fully integrated, holistic approaches to security solutions – automating what is known but relying on human analysts to keep customers truly secure and uninterrupted by alerts.

Rob Brewer, Lead Senior Sales Engineer , Field Effect Software

Panel Discussion: Hyrbid Hazards
  • As your workforce migrates to a hybrid setup, how can you protect your teams and hardware?
  • What are the major risks of hybrid working?
  • How to futureproof your systems for long-term hybrid working?

Javvad Malik, Security Awareness Advocate, KnowBe4

Neil Sinclair, National Cyber Lead, Police Digital Security Centre

Gold Partner: Darktrace
  • TBD
Okta: Digital Transformation - The Future of Work has Changed Forever

Over the past 18 months, our lives have been upended, presenting both challenges and opportunities. We’ve learned to cope with intense work schedules dictated by marathon video meetings and inviting our colleagues and customers into our most personal spaces. The global shift to anytime, anywhere, any device way of working has transformed how we live and operate. And with malicious attacks happening every 14 seconds on average, the challenge for IT is finding a way to support and secure today’s dynamic workforce.

Watch this session to:

  • Learn about the challenges we are facing when it comes to securing a dynamic workforce
  • Discover the latest security solutions and how they protect your company's employees and data
  • Find out how to strengthen your security posture attack

Craig Hinchliffe, Senior Solutions Engineer, Okta

Refreshments Break
Keynote: Ethical Hackers
  • How does hiring an ethical hacker differ from hiring normal security personnel?
  • What knowledge does an ethical hacker offer?
  • What will your team gain from possessing an ethical hacker?

Joe Burns, Co-Founder & CEO, Reformed IT

Gold Partner - Zero Trust
  • What are the most common issues with user generated passwords?
  • How to effectively implement multifactor authenticators
  • What does the future of zero trust look like?
Gold Partner - Diverse Defence
  • What does the typical cybersecurity team look like?
  • How to build a security team with diverse backgrounds and skillsets
  • What transferable skills could help to strengthen your current team?
Case Study: Cyber Crime - Easier Than You Think
  • Who is behind the recent increase in cybercriminal activity?
  • How do cybercriminals select their targets?
  • What can be done to deter would-be cybercriminals?

Shelton Newsham, Divisional Information Security Officer, UK Health Security Agency

Panel Discussion: Spreading the Costs
  • How do you effectively incorporate development costs and technical debt into your budget?
  • What simple savings can you make to persuade the board to maintain/ increase your budget?
  • What are your recommendations for reducing costs without impacting security?

Andrew Hunt, Director - Change & Transformation, Migrators

Closing Remarks

Thank you for attending CyberSecurity Festival - Chapter 2!