The events of 2020 have highlighted and exacerbated pre-existing challenges around remote workers, supply chains and external cloud services provision. The complexity of access to systems and data has dramatically increased; the growth in staff working remotely from insecure networks, differing levels of security within the supply chain, and Shadow IT are all examples of the challenges faced. In this session we will share examples of how organisations have taken proactive steps to address the remote challenge, to ensure trusted friends do not become exploited weaknesses.
With the dramatic increase in distributed workforces and the growing adoption of cloud applications, companies face unprecedented levels of IP, data, and identity sprawl beyond the enterprise firewall. Every endpoint is an entry into your business, cybercriminals have more ways to break in than ever before, and human error on the inside is a constant risk. Historically, endpoint security has been a zero-sum game—with the odds inevitably stacked against IT. But rather than protect devices, what if you could just control the security of them?
In this presentation, see how Chrome OS and Chrome Browser are secure by design—embedding security into every workflow to provide proactive protection for users, devices, applications, and data, wherever work happens. This is cloud-first security control in the hands of the modern businesses that will thrive moving forward.
This session will focus on the role of The UK Cyber Security Council, which is to champion the cyber security profession across the UK, provide broad representation for the industry, accelerate awareness and promote excellence. As Co-Chair of the Council Formation Project, Budgie will provide updates on the Council’s vision, aims, and objectives and how it will become the ‘voice of the profession’.
The risks and importance of your third parties vary drastically. To build an efficient third-party risk management (TPRM) program, its critical to prioritize which vendors and suppliers present the most risk, as well as which ones are essential to your operations. Insight into your third parties’ inherent risks can change the way you run your TPRM program, helping to increase security and performance. By understanding where to prioritize your time, you can onboard key vendors faster, spend the right amount time performing due diligence, and invest the most resources assessing and monitoring the third parties that matter most.
Today, you’ll learn how inherent risks can help you:
When your IT is under cyberattack, every second counts. In a digitally connected organization, the impact of business outage can multiply by the second. Manual, siloed approach to cyber recovery may lead not only to prolonged downtime, lost business and high recovery costs but also compliance failure and damage to your reputation.
Combining security, business continuity and risk management practices including right cyber culture can help organizations transform their business resilience posture and mitigate risks more effectively. In this session, watch the story of an organization suffering cyber outage and learn from their experience how public sector organizations can be prepared for any cyberattacks by taking a fresh approach to risk assessment and deploying the right programs, expertise and technologies.
2020 has been quite the year for unrest. The rapid transition to a remote workforce as a result of the COVID-19 pandemic has given rise to a slew of cybersecurity challenges. Organisations must deal with securing their data across both company-supplied and employee-owned devices, as cybercriminals leverage the crisis to launch new attacks. If that wasn’t enough of a problem, add into the mix the 150% increase in targeted and e-crime intrusion attacks being executed by these cybercriminals. The security professional in 2020 is not only dealing with an unpredictable infrastructure challenge but is having to work twice as hard in combatting the sheer multitude of attack scenarios. It seems neither the adversary or the security professional is taking any rest!
Key Takeaways:
Join key members of ITGL’s award winning Security Practice for an engaging panel discussion focusing on effective cyber defence against criminal and nation state sponsored threats.
According to EY, consumers, regulations, and business concerns are driving UK public and private sector industries to re-examine their data disposition processes, particularly for sensitive and personal information. We’ll show how UK enterprises can ensure data security at data end-of-life, comply with data protection laws, and align data disposal policies with both the National Data Strategy and environmental goals.
Data Sanitization – Ask the Expert
Following the presentation, Blancco will be hosting an interactive Q&A session. The 10-minute session will give attendees an opportunity to meet with data sanitisation subject matter experts and have a more detailed conversation about their data pain points, or concerns around their data security posture.
Public Sector organisations planning for 2021 are looking, more than ever, to ensure that their transition to remote working didn’t send them one step forward and two steps back in terms of security, compliance, and usability. We have found that many Public Sector organizations are in the process of reviewing security gaps and identifying improvements that can be made to their technology and processes – many of which were implemented quickly due to the sudden changes to the workplace this year.
In addition to this, many of the security threats that existed pre-COVID (remember then?) have not changed or gone away. If anything, the attack surface that Privilege Access Management (PAM) tools help secure has become even larger. Threats are more difficult than ever for organizations to manage with native tools, and the traditional desktop and server estate has become a thing of the past.
Join this session to learn how Secure Remote Access and Privilege Management solutions can be implemented to solve PAM challenges quickly, across entire estates. You will also find out how to provide your users (and third parties) with a secure, compliant platform from which to work remotely – via an on-premises or SaaS deployment – in just weeks, not months or years.
The WannaCry attack in 2017 left the NHS with a £92m bill. Learn how the NHS is aggressively improving health and care security posture, tackling the challenges presented by Covid-19 through:
According to new research from the Department for Digital, Culture, Media & Sport 50% of UK businesses have a basic cyber skills gap: Hear how the UK plans to sustain a cyber security sector fit for the future by: