We’re still in the process of finalising the agenda for the Cyber Security & Data Protection Summit 2022. In the meantime, you can take a look at last year’s programme to give you a taste of what to expect when we return to QEII Centre in London on 17th November 2022.
Cyber resilience is more than about securing technology. It encompasses preparedness for risks, continuous efforts to deter and defend against cyber-attacks, and remediating from crises. Our panel session explores:
According to the Department for Digital, Culture, Media & Sport, 37% of all vacancies for cyber roles have been hard-to-fill with many businesses struggling to recruit employees with the necessary technical skills. The sector has made strides in diversity; the NCSC published its ‘Decrypting Diversity’ report in 2020 to benchmark and track levels of diversity and inclusion states that “improving diversity and inclusion will be crucial to the cyber security industry’s ability to address its well-documented skills gap.” Hear from industry insiders about:
During this break why not join one of our Fireside Chats & Roundtables
Our fireside chats and roundtable sessions are open to all attendees. The sessions will allow attendees to drive their own learning and share experiences with others on a number of different subject areas
This talk will consider the key aspects of a good online identity scheme:
Exploring ways in which the National Cyber Security Centre is leading the response to the Covid19 pandemic, building a resilient nation, proactively engaging and partnering with key public sector bodies and driving cyber skills and innovation.
Public sector organizations face challenging times:
This session looks at ways to address this “perfect storm” of increasing attack volumes, expanded threat vectors and a targeted focus on public sector bodies. It highlights the opportunities deep learning brings to prevent ransomware and other malware in <20 ms, before an attacker can gain persistence.
The session will show the range of malicious threats facing the public and private sectors and the vulnerabilities of initiatives such as Building Information Modelling (BIM), Open Data and Smart City/Connected Places that can be mitigated by forethought and proportionate countermeasures that enable rather than inhibit the desired innovation.
The Centre for the Protection of National Infrastructure (CPNI) is the UK Government’s National Technical Authority for Physical and Personnel protective security advice. CPNI are part of the National Security apparatus and they have a long history of providing advice on securing critical infrastructure, sensitive technologies, digital engineering, open data initiatives, advanced manufacturing processes, automotive and intelligent transport system security and managing the security of smart city initiatives.
Public Sector organizations planning for 2022 are looking, more than ever, to embrace their new normal. A significant element of that is to ensure that the changes made over the past year or so didn’t send them one step forward and two steps back in terms of security, compliance and usability. We have found that many Public Sector organizations are reviewing security gaps and identifying improvements that can be implemented to their technology and processes to achieve a more unified, secure security status moving forward.
The security threats that were apparent a couple of years ago have not changed or gone away. If anything, the attack surface that Privilege Access Management (PAM) tools help secure has become even larger. Threats are more difficult than ever for organizations to manage with native tools, and the traditional desktop and server estate has become a thing of the past.
Join this session to learn how Secure Remote Access and Privilege Management solutions can be implemented to solve PAM challenges quickly, across entire estates. You will also find out how to provide your users (and third parties) with a secure, compliant platform from which to work remotely – via an on-premises or SaaS deployment – in just weeks, not months or years.
Everyone knows Active Directory (AD). It is a seasoned IAM, not to mention one that nearly every organization in the world uses. As AD is responsible for controlling access to most corporate assets, it is the target of most attacks. After 20 years of being overlooked, Active Directory is riddled with vulnerabilities. In this security workshop, a 16x Microsoft MVP will give you direct actions that you can take to reduce your AD security risk.
During this break why not join one of our Fireside Chats & Roundtables
Our fireside chats and roundtable sessions are open to all attendees. The sessions will allow attendees to drive their own learning and share experiences with others on a number of different subject areas
IT complexity is rapidly increasing as organizations continually adopt new tools and technology. While IT assets are a necessity to increase productivity and performance, they can become hard to keep track of, resulting in IT security vulnerabilities for enterprises.
Since COVID-19, the US FBI reported a 300% increase in reported cybercrimes, and ransomware is the latest hot topic due to recent highly publicized attacks in the US. In this session, we’ll use the Colonial Pipeline as a case study. Discussing what went wrong to understand how you can improve your IT asset and risk management practices to proactively protect your organization from ransomware.
KEY TAKEAWAYS:
The shift to working from home and then to hybrid working have had a significant impact on security posture. But it’s not just new threats, it’s the change of “context” – who would have thought in 2019 that security awareness training should warn people about being overheard when by your neighbour when working at home!? Traditional awareness, with typical quarterly or yearly content cycles, has been too slow to adapt. Phishing tests risk alienating staff. In this talk, ThinkCyber explores the behavioural science of helping people adapt to changing risk contexts, driving secure behaviours and empowering users to protect themselves against cyber threats that target the human user. This talk will offer real-world examples and ways that all organisations can apply the theories to adapt their approaches.
Key Takeaways
To be compliant with GDPR, organisations must take necessary steps to protect the data in their care, including data that is shared with third parties such as contractors, partners, suppliers and service providers. This session looks at effective strategies for managing third party risks, common gaps in contract management, and maturing your organisation’s security postures.
DevSecOps involves building security as a culture with continuous and flexible collaboration between security and developer teams. For most organisations, DevSecOps does not happen all at once since it is iterative process that relates to a culture of change. We discuss:
During this break why not join one of our Fireside Chats & Roundtables? Our fireside chats and roundtable sessions are open to all attendees. The sessions will allow attendees to drive their own learning and share experiences with others on a number of different subject areas
A Cyber Security Ecosystem has evolved across Greater Manchester nurtured and grown through activities without boundaries and across disciplines. At the heart of this are Manchester’s Universities living the Turing legacy bringing innovation to underwrite a bright Digital Future. Professor Danny Dresner will explain: