Agenda

123

9:15 am - 9:20 am

Chair’s Opening Remarks

123

9:20 am - 9:45 am

A Universal Regulatory Approach to Cyber Security

  • Supporting organisations through legislation and regulatory clarity – Guidance with NIS Directive and GDPR.
  • No business left behind: Breaking down the complexity of cyber through an evolving rationale of general and bespoke guidance.
  • Working with international organisations and allies to secure Britain’s economy and its place as global cyber power.

123

9:45 am - 10:15 am

Strategic Headline Sponsor

123

10:15 am - 10:40 am

Spotlight on Leadership: Championing the Place of Cyber in Strategic Decision Making

  • Moving beyond mitigation by building a whole-team approach to business impact assessment.
  • From Customers to the C-Suite – How HSBC has sought to embed and champion a security culture.
  • Upholding the role of Cyber in HSBC’s engagement with disruptive transformation and emerging technologies and practices.

123

10:40 am - 11:25 am

Morning Refreshment and Exhibition Break

123

11:25 am - 12:10 pm

The Swedish Perspective on Cyber Security: How to Enhance International Cooperation with the UK to Prevent Cybercrime

  • Preparing for a dark horizon of cyber-crime as Sweden embarks on a hyper connectivity drive to secure 98% of households and firms connected to 1 gigabit per second internet by 2025
  • Discerning the real threat of state sponsored cyber attacks with 13,000 monthly cyber activities targeting Swedish entities and strategic threats against Swedish CNI
  • Working with the UK and co-operating internationally as an essential part of the National Cyber Strategy build resilience and capabilities to prevent and counter future attacks

123

12:15 pm - 1:00 pm

Seminars

     

123

1:00 pm - 2:00 pm

Lunch and Exhibition

123

2:00 pm - 2:45 pm

Seminars

        

123

2:50 pm - 3:10 pm

Stream Keynote

Stream 1 : Threats and Trends
The Rise of the OCGs and the Evolving Crime Toolkit

  • The OCG landscape and the exploitation of AI and data analytics to target organisational vulnerabilities
  • Defending against outsider trading spreads out from traditional finance markets to other sectors.
  • Meeting adversarial capabilities with the latest armoury of digital forensics, intelligence and data sharing tools as well as dedicated regional specialists in Cyber Crime

Stream 2: Tech and Team
Fostering Cyber Heroes – In-Team and Across the Business

  • Putting the spotlight on soft-skills and reevaluating the role of all staff members in detecting, reporting and communicating cyber-attacks
  • Telling the story of what good looks like in nominating, training, tooling and multiplying Cyber Champions to motivate improved Cyber Hygiene
  • Nurturing champions within your central cyber team and creating direct lines between technical and non-technical champions to ensure an embedded cyber culture

123

3:10 pm - 3:30 pm

Stream Sponsor

123

3:30 pm - 4:00 pm

Afternoon Refreshments and Exhibition

123

4:00 pm - 4:20 pm

Case Studies

Stream 1 : Threats and Trends
Phishing Season: Developing the Right Approach to Socially Engineered Cyber Attacks

  • Building Internal Awareness through insight into the HMRC tax rebate phishing phenomenon
  • Reducing spoof smashing scams by up to 90% through tag and terminate technology
  • Keeping ahead of the enemy by identifying vulnerable target groups such as students or the elderly.

Stream 2: Tech and Team
Recruitment and Retention in an Insecure Security Employment Market

  • Working with comms and HR to attract the right talent and bake security into the image of your company.
  • Obtaining the right balance between upskilling and work-life balance to incentivise and retain your security team.
  • The idiosyncrasies of growing a security team at pace and the place of cyber in the story of TransferWise’s success.

123

4:20 pm - 5:00 pm

Closing Session

Stream 1 : Threats and Trends
Hyperconnected, Hype-vulnerable: Anticipating the Threats Posed by Emerging Technology and Future Digital Practices

  • Spelling out the threat vectors to determine the greatest area of vulnerability in hyper connected networks.
  • Balancing risk and cost when baking security into product development – What is the right formula?
  • Championing relationships with suppliers, partners and third parties as the strongest safeguard

Stream 2: Tech and Team
The Next Wave of Cyber Solutions and Engaging the Start-up Ecosystem

  • Moving beyond the solution-focused mindset and how the UK’s start-ups succeed in the user-centric model
  • Signalling and end to the provider-buyer ideal through a more collaborative approach to tacking cyber threats through partnered innovation
  • Succeeding with the scale phase and the role of industry in the future of the UK’s Cyber Innovation Cluster
  • Cyber Security shift towards looking at cyber as an enabler for business growth rather than a layer in a software stack