Cyber Security Summit
Data Protection Summit
Theatre 1 Breach
Theatre 2 Recovery
Theatre 3 Prevention
Cyber Security Summit
Data Protection Summit
Theatre 1 Breach
Theatre 2 Recovery
Theatre 3 Prevention

Programme Builder

Plan your day by adding your favourite sessions to create a custom agenda. Once you've selected your sessions click download to request a printable copy to bring with you on the day. It's that simple!
No sessions

9:00 am - - Cyber Security Summit

Coffee and registration in the exhibition area

9:40 am - 9:45 am - Cyber Security Summit

Chairman’s opening remarks

Mike StJohn-Green
Honorary Fellow and Technical Advisor
University of Warwick - Information Security Forum

9:45 am - 10:15 am - Cyber Security Summit

Opening keynote: A look at the evolving nature of the cyber threat

  • Communication – A look at the disconnect between the CISO and the board
  • An analysis of the changing face of the cyber threat over the past 5 years
  • A look at the geopolitics of cyber security: What have we learnt in 2018 and what can we expect in 2019?
Misha Glenny
Journalist, award-winning writer and broadcaster and leading expert on cyber crime.

10:15 am - 10:45 am - Cyber Security Summit

Morning keynote: Safeguarding the nation – The NCSC vision for a more secure Britain

Senior Representative


10:45 am - 11:15 am - Cyber Security Summit

NHS keynote: Cyber security – Responding to the threat to the UK health service

  • What can government, businesses and the NHS do to enhance cyber security?
  • The impact of GDPR and NIS on data security in the NHS
  • What are the predicted cyber security threats to health and care services in 2019 and how are they evolving?
  • The strategic framework for managing cyber at board level
Will Smart
NHS England

11:15 am - 11:45 am - Cyber Security Summit

Morning coffee and networking in the exhibition area

11:45 am - 12:20 pm - Cyber Security Summit

How CISOs should interact with the board when it comes to cyber security

  • Getting cyber security in line with business operations
  • Building a relationship with the board and not only meeting after a breach
  • Working as a team to deal with existing and new and complex threats
Mike StJohn-Green
Honorary Fellow and Technical Advisor
University of Warwick - Information Security Forum
Robert Coles
Barry Coatesworth
Independent Cyber Security Advisor
Sebastian Hess
Cyber Risk Executive

12:20 pm - 12:40 pm - Cyber Security Summit

The cyber security evolution: Why being ‘secure’ is not enough

  • Uncovering how to raise threat awareness
  • Unlocking the value of your existing IT security investments and continuing to improve your security posture
  • A look at the distinction between being ‘secure’ and ‘safe’
  • How the approach to cyber security needs to evolve to ensure that you are fully remediated against the impact of any future attacks, while allowing for business continuity when they happen
  • Practical advice, using the ‘assess, plan, build, run and improve’ (APBRI) model
Nicholas Griffin
Senior Cyber Security Specialist - Cyber Defence
Elad Sherf
Head of Cyber Defence

12:40 pm - 1:00 pm - Cyber Security Summit

The need for an international approach to cyber resilience in an increasingly connected world

  • Financial business has a greater global presence than ever before.
  • Firms must establish, maintain and develop a global risk model that meets the threat faced by each of their businesses.
  • A strong cyber resilience posture is needed across a global marketplace.
  • Firms must build a security culture that protects their business.
  • Firms must work together to defend themselves.
  • Regulatory authorities must work together to promote cohesion across industry sectors and jurisdictional borders.
Robin Jones
Head of Technology, Resilience & Cyber Specialist Supervision
Financial Conduct Authority (FCA)

1:00 pm - 2:00 pm - Cyber Security Summit

Lunch and networking in the exhibition area

2:00 pm - 2:25 pm - Cyber Security Summit

The cloud challenge: The changing role of corporate IT Security teams

  • Cloud computing brings advantages and challenges to the IT Security team. A good cloud computing service provider lifts the burden of a lot of routine cyber hygiene actions. But you cannot outsource liability – you still have to take care!
  • A look at how careful consideration is needed to make sure that the system owner is clear about the remaining responsibilities for security patching and vulnerability management: not all cloud options have the same ITSEC implications
  • Analysing why the cloud service needs to be set up to perform when bad things happen


Ken Ducatel
Director, DG DIGIT
European Commission

2:25 pm - 2:55 pm - Cyber Security Summit

Management view from the board – A case study by HSE

  • Protecting and exploiting precious assets
  • Leading the way – governance and culture
  • Understanding the landscape: Threats, vulnerabilities and actions
  • Management information and assurance
  • Legal and regulatory responsibilities
  • Stimulating innovation
Martin Temple
HSE (Health and Safety Executive)

2:55 pm - 3:20 pm - Cyber Security Summit

A look at the importance of content protection and content security from the perspective of the film and TV industries and what other industries can learn

  • Looking at acts of content piracy as a prelude to future major cyber security issues within the entertainment industry
  • Understanding the different types of content piracy threats
  • Addressing the need for proactive content security to counter threats
  • What are the most popular and most effective content protection strategies?
  • De-bunking the myths about pirates and anti-piracy when it comes to content protection and content security
  • Content protection as a business intelligence tool and getting the right return on investment when implementing anti-piracy remedies.
Pascal Hetzscholdt
Director of Content Protection for Europe and Africa
21st Century Fox

3:20 pm - 3:50 pm - Cyber Security Summit

Afternoon tea and networking in the exhibition area

3:50 pm - 4:00 pm - Cyber Security Summit

Tussell’s analysis of trends in public sector cybersecurity contracting

  • A look at the biggest contracts
  • Who are the most active buyers and suppliers
  • What are the most valuable contracts due to expire in the near future


Gus Tugendhat

4:00 pm - 4:30 pm - Cyber Security Summit

Security regulation – An outcome-focused approach to cyber risk exposure

  • Evidencing effective security plans and regimes that address the risks that effect the most important assets
  • Getting the best value from intelligence
  • What is it like to have outcome based as opposed to forced based regulations?
  • Understanding and addressing supply chain risk: Are you at risk from your own suppliers?
Tom Parkhouse
Head of Nuclear Cyber Security Regulation
‎Office for Nuclear Regulation
Sarabjit Purewal
Principal Specialist Inspector

4:30 pm - 4:50 pm - Cyber Security Summit

Utilising AI effectively to stay ahead of cyber security threats

  • Is AI the ‘saviour’ it is made out to be?
  • Using AI and machine learning to detect threats: Pipe dream or the future of combating cyber security threats?
  • Harnessing AI to be in the position of planning forward strategically to counter future cyber risks, not reacting to the past.
  • Discover how AI will shape the future of cyber security (in terms of both cyber defence and cyber offence) and will it replace cyber security experts?
Charles Fox
Security Lead
Digital Catapult

4:50 pm - 5:00 pm - Cyber Security Summit

Chairman’s closing remarks

Mike StJohn-Green
Honorary Fellow and Technical Advisor
University of Warwick - Information Security Forum

Programme Builder

Plan your day by adding your favourite sessions to create a custom agenda. Once you've selected your sessions click download to request a printable copy to bring with you on the day. It's that simple!
No sessions

9:00 am - - Data Protection Summit

Coffee and registration in the exhibition area

9:40 am - 9:45 am - Data Protection Summit

Chairman’s opening remarks

Scott Sammons
Information and Records Management Society (IRMS)

9:45 am - 10:00 am - Data Protection Summit

The first 6 months of GDPR: The view from the ICO

Peter Brown
Group Manager (Technology Policy)
Information Commissioners Office (ICO)

10:00 am - 10:45 am - Data Protection Summit

Panel discussion: A look at the first 6 months of GDPR – Implementation insights

  • Deep dive into the implications of the EU data economy for a long-term GDPR implementation strategy
  • What’s GDPR got to do with a “risk based approach/risk management”
  • Global implications: How GDPR has affected organisations outside of the EU
Jeremy Lilley
Policy Manager - GDPR
Rhiannon Lewis
Senior Region Counsel, Privacy & Data Protection
Stephen Latham
Data Protection Programme Manager
Peter Brown
Group Manager (Technology Policy)
Information Commissioners Office (ICO)
Richard Merrygold
Director of Group Data Protection

10:45 am - 11:00 am - Data Protection Summit

The UK’s approach to GDPR: an international perspective

Rory Munro
Head of Engagement for the EU Exit Data Protection Negotiation Hub
The Department for Digital, Culture, Media & Sport (DCMS)

11:00 am - 11:20 am - Data Protection Summit

GDPR six months later: Top 10 lessons learned in the new privacy era

  • Now that the GDPR is here, what’s next for data privacy?
  • How will regulators assess accountability?
  • Will we see massive fines? And what about ePrivacy Regulation?
  • A look at top predictions and practical advice for an ongoing GDPR program.
David Sinclair
Privacy Solution Consultant

11:20 am - 11:45 am - Data Protection Summit

Morning coffee and networking in the exhibition area

11:45 am - 12:15 pm - Data Protection Summit

Data protection insights: The size of your company does not matter to data thieves

  • Addressing data protection challenges for SMBs as well as enterprises
  • Reducing risk by controlling the data that matters most to your company
  • Implementing a simplified approach to data protection
Kris Lahiri
Co-founder, Vice President of Operations and Chief Security Officer
Jeff Sizemore
Vice President of Governance and Compliance

12:15 pm - 12:40 pm - Data Protection Summit

How DPAs conduct technical investigations: A practical example from the Bavarian DPA

  • Analysing how DPAs select companies and how the Bavarian Data Authority conduct audits
  • A look at the technical equipment and laboratories available to the Bavarian DPA
  • An insight into results and conclusions by the Bavarian DPA
  • Helpful “tips and tricks” on how to deal with DPAs in general
Dorit Buschmann
Department for Cybersecurity and Privacy Engineering
Bavarian Data Protection Authority

12:40 pm - 1:40 pm - Data Protection Summit

Lunch and networking in the exhibition area

1:40 pm - 2:00 pm - Data Protection Summit

Implementation of GDPR within a unitary local authority: The challenges faced in the first 6 months

  • Leicester City Council and the impact of GDPR
  • An analysis of the key changes required as a unitary local authority needed and the changes made by Leicester City Council
Iain Harrison
Information Governance and Risk Manager
Leicester City Council

2:00 pm - 2:30 pm - Data Protection Summit

”How to DPO like a boss” – Integrating the role of the DPO into your business

  • Who should be the DPO?
  • Understanding the duties, obligations and liabilities of the DPO
  • Elevating the role within the organisation
  • Creating an effective reporting structure; ensuring all privacy risks (including data breaches) are reported to the DPO immediately to facilitate an effective and adequate response
Samantha Simms
Senior Principal and Founder
The Information Collective

2:30 pm - 2:55 pm - Data Protection Summit

Understanding what a good data compliance culture looks like

  • Investing in a programme of staff training and making the case for greater investment
  • Creating awareness of data protection and its significance to your organisation
  • Addressing internal risk factors and what measures should be taken to avoid internal data breaches
  • Raising awareness among your organisation’s management to set the appropriate ‘tone from the top’
  • Identifying the personal information your organisation holds about employees, customers and suppliers and the level of risk associated
  • Checking your use of data is compliant and overcome misinformation concerning the requirement for consent
Brian Shorten
Charities Security Forum

2:55 pm - 3:30 pm - Data Protection Summit

Afternoon tea and networking in the exhibition area

3:30 pm - 3:55 pm - Data Protection Summit

Data mapping: What needs to be done to comply with GDPR

  • Maintaining accountability of the data for the full data life cycle
  • Providing evidence that your data is protected in its full cycle and kept in adherence to the rules of GDPR to submit to the regulatory and supervising authorities
  • Understanding consent under GDPR – assessing your current consent procedures
Rowenna Fielding
Data Protection Lead

3:55 pm - 4:20 pm - Data Protection Summit

Using ISO 27001 to achieve GDPR compliance

  • Implementing ISO 27001 Information Security Management System (ISMS) within your organisation
  • Putting processes in place that protect all information assets, not just customer information or information that is stored electronically
  • Setting a realistic scope to improve the chances of success
Bridget Kenyon
Global CISO
Thales eSecurity

4:20 pm - 4:30 pm - Data Protection Summit

Chairman’s closing remarks

Scott Sammons
GDPR Implementation Lead

Programme Builder

Plan your day by adding your favourite sessions to create a custom agenda. Once you've selected your sessions click download to request a printable copy to bring with you on the day. It's that simple!
No sessions

9:45 am - 10:10 am - Theatre 1 Breach

Analysing the latest trends in cyber-attacks – A look at the risk landscape for 2019

  • An in-depth look at the motivations, behaviours, tactics and techniques of the cyber criminal
  • Exploring new areas of vulnerability and new opportunities for exploitation
  • Examining the changing nature of the threat
  • Understanding why AI and machine learning are crucial to your 2019 IT strategy
Hasan Al-Saedy
Professor of Cyber Security
British Institute of Technology

10:20 am - 10:45 am - Theatre 1 Breach

Taking a proactive approach to cyber defence

  • What is cyber threat intelligence?
  • How does cyber threat intelligence enable a proactive approach to developing an effective cyber risk management programme?
  • How does cyber threat intelligence improve understanding of your relevant cyber threats?
  • How and why are Regulators expecting organisations to use cyber threat intelligence?
Oliver Church
Orpheus Cyber Ltd

10:55 am - 11:20 am - Theatre 1 Breach

Shift to self-learning, self-defending networks

  • Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats
  • How new immune system technologies enable you to preempt emerging threats and reduce incident response time
  • How to achieve 100% visibility of your entire business including cloud, network and IoT environments
  • Why automation and autonomous response is enabling security teams to neutralise in-progress attacks, prioritise resources, and tangibly lower risk
  • Real-world examples of subtle, unknown threats that routinely bypass traditional controls


Steffan Jones
Senior Cyber Security Manager

11:30 am - 12:00 pm - Theatre 1 Breach

Cybersecurity and BYODs: Combating the internal threat

  • Analysing the challenges mobile devices are imposing on conventional services and browser-oriented communication
  • Reacting so as not to have the need to service a variety of platforms still enabling all of them in a secure way.
  • Looking at the increasing range of vulnerabilities created by the introduction of new technologies and business models like BYOD, Cloud, Network Access to Industrial Control Systems and so forth
  • Analysing the next-generation endpoint security triggers
  • The ABCs of a Successful Security Awareness Program
Reinhard Posch
Federal Government of Austria

12:10 pm - 12:40 pm - Theatre 1 Breach

Analysing the increased sophistication of phishing attacks

  • The evolution of phishing attacks- The journey from the obvious to the sublime
  • Social Engineering, Spear Phishing, Criminal Campaigns, Whaling to CEO Fraud
  • What’s next and emerging trends
  • How to implement an effective defence
Luke Noonan
Enterprise Sales Manager

12:50 pm - 1:15 pm - Theatre 1 Breach

Managing cyber security risks in major hazard industries and complying with legal regulations

  • How industrial control systems can be compromised
  • What the business risks are and how they relate to compliance with the law including health and safety and NIS directive regulations
  • Steps that can be taken to mitigate the risks
  • Key issues looking ahead and what the regulators will be looking for
Sarabjit Purewal
Principal Specialist Inspector

1:25 pm - 1:55 pm - Theatre 1 Breach

Hatfields and McCoys: feuds, anti-patterns and other crossed-connections in the dev/sec relationship

  • Developers want security to get out of their way – Security wants to stop finding the same old security flaws they found last month.
  • Developers want fewer sleepless nights before a big launch – Security wants everything to be tested properly before it goes out into the world.
  • How do we reconcile our different missions to build fully featured, secure products, on time and on budget? – Thoughts from a front-line developer who has spent the last 2 years building purposefully broken things as teaching tools for budding infosec professionals.
Rachelle Saunders
Helical Levity/SANS

2:05 pm - 2:35 pm - Theatre 1 Breach

“The door was open…: a look at the cyber gaps in your building systems”

  • A look at how  the devices and applications keeping your buildings safe and secure pose unique cyber security challenges.
  • What are the cyber security risks these types of systems add to your network from their installation and basic operation to maintenance and decommissioning.
  • How insecure are these products? A look at cases where vulnerabilities in building systems caused real damage.
  • Who is responsible? The challenge of the supply chain and maintenance of building products.
  • Now what? Steps to close the gaps and keep your network – and you building – more secure.
Will Brown
Sr. Engineering Manager, Cyber Protection

2:45 pm - 3:15 pm - Theatre 1 Breach

A look at how an organisation should react to a breach from that ‘initial call’ saying that there has been an attack

  • Setting the scenario: What do you do when you get a call from someone in your organisation saying that there has been a breach
  • What are the challenges an organisation will face when a breach occurs?
  • What action should your organisation take
  • A look at the potential consequences of a breach and lessons learnt
Simon Citron
Full Frame Technology Limited

3:25 pm - 3:55 pm - Theatre 1 Breach

Improving managements view and understanding of information security as a strategic priority

  • Do business leaders really understand cyber threats?
  • Making information security everyone’s responsibility: The importance of an enterprise wide strategy to develop and embed a collective approach to information security
  • Overcoming organisational barriers and gaining C-Level buy-in
  • Understanding the core elements of an effective enterprise wide corporate plan for Information Security
  • Establishing a structure so that directors can meet their duty of care with regard to cybersecurity
Matt Argyle
Head of Information Technology
Children's Hospital South West

Programme Builder

Plan your day by adding your favourite sessions to create a custom agenda. Once you've selected your sessions click download to request a printable copy to bring with you on the day. It's that simple!
No sessions

9:45 am - 10:10 am - Theatre 2 Recovery

Thwarting a cyberphysical attack in the IoT era

  • Understanding how to deploy effective, layered technological countermeasures against IoT breaches
  • Effectively aligning policy goals to your information security program
  • Architecturally integrating IoT into a successful information security program
  • Understanding how to guide corporate responses to local, national, and global regulatory initiatives
  • A look at how the absence of well-defined security standards and regulations can turn projected benefits into unforeseen problems
Bharat Mistry
Principal Security Strategist
Trend Micro UKI

10:20 am - 10:50 am - Theatre 2 Recovery

IT Risk – From boring to roaring a case study by ING

  • How do make IT risk accessible and understood
  • How to challenge your engineers to stay ahead of cyber criminals?
  • Can you be both agile and in control of risk and security?
  • How do you make risk management meaningful?
  • Enabling engineers to engineer – especially when dealing with risk and security
Jan-Joost Bouwman
Identity and Access Management Specialist

11:00 am - 11:25 am - Theatre 2 Recovery

BreachMarkers: Real-time identification of data breaches and their source

  • Protecting your data has never been so important, but how can this be guaranteed when your data sits on third-party servers outside your control?
  • Whether you use CRM systems, HR software, email marketing systems, or payroll, training and pension providers, your data is already outside the firewall and is at risk of being breached
  • Learn how the use of unique BreachMarker™ identifiers can widen your corporate threat detection surface allowing you to monitor your data held by third-party suppliers, alert you if your data is leaked, hacked, or sold on the Dark Web, and identify the source of the breach.


Jeremy Hendy

11:35 am - 12:00 pm - Theatre 2 Recovery

General cyber resilience: No absolutes and no certainties

  • Understanding that resilience is more than prevention alone
  • Appreciating that IT systems should not be looked at in isolation as they are all connected to the global digital environment
  • Recognising that 100% risk mitigation is not possible in any complex system and that the goal of a risk-based approach to cybersecurity is system resilience to survive and quickly recover from attacks and accidents
  • Establishing a good cyber resilience through a complete, collaborative approach driven by the board and involving everyone in the organisation and extending to the supply chain, partners and customers
Tim Watson
Director, Cyber Security Centre
WMG Cyber Security Centre

12:10 pm - 12:35 pm - Theatre 2 Recovery

Identifying potential weaknesses in your organisation network before the hacktivists can!

  • Monitoring and detecting online activities to check whether a hacktivist attack is being prepared
  • Looking out and monitoring for internal attacks
  • Enhancing proactive monitoring of what is being said about your organisation online to stop an attack before it starts
Cal Leeming
Founder, CEO, Security Advisor

12:45 pm - 1:10 pm - Theatre 2 Recovery

A look at a counter-kill chain Security Target Operating Model that addresses challenges facing cyber security management

  • Security skills and resourcing
  • Ever more challenging threats and risks
  • Budget constraints.
Alex Henneberg
Digital Security Practice Director
Sopra Steria

1:20 pm - 1:45 pm - Theatre 2 Recovery

Using machine learning and graph analytics to detect fraud in high volume consumer facing websites

  • Leveraging graphs analytics and data science to identify fraudulent networks and transactions
  • Fraud detection using graph analytics & machine learning at JustGiving
  • Using graphs and machine learning in your organisation
Richard Freeman
Lead Data and Machine Learning Engineer

1:55 pm - 2:30 pm - Theatre 2 Recovery

Panel session: Collaborative security – How information sharing can add to your team

  • Getting to grips with how information is shared
  • Learning what information is shared and with whom
  • Understanding why information sharing is an important tool in prevention and incident response
  • An analysis of case studies of effective sharing and collaboration that mitigated against threats
  • A look at how collaboration can quickly create mitigation strategies
Denise Anderson
Health Information Sharing and Analysis Center (H-ISAC)
Robert Coles
Tony Clarke
Head of Information Security

2:40 pm - 3:10 pm - Theatre 2 Recovery

Cyber insurance and cyber risk quantification: An insurers perspective

  • What is cyber insurance – a brief overview and how can it protect you before and after an attack
  • How are cyber risks viewed by an insurance company and how are you assessed after an attack
  • How can an insurer’s view help to better understand and quantify your own cyber risk even if you have been a victim of an attack
Sebastian Hess
Cyber Risk Executive

3:20 pm - 3:45 pm - Theatre 2 Recovery

Building Bridges: How to engage the business in Data Protection

  • The role of Records Management and Cyber Security Experts in handling information
  • Winning colleagues round to a successful records management implementation and/or maintenance
  • Improving the relationship between records management and cyber security experts in your organisation
Martin Fletcher

3:55 pm - 4:20 pm - Theatre 2 Recovery

Smart cities security: How policy smart are you?

  • Protecting individual identities first
  • Securing information at the source
  • Standardising the need to know
  • Implementing appropriate deterrents
  • How to scale up to urban context through planning and policy
Dr Theo Tryfonas
Reader - Smart Cities
Bristol University

Programme Builder

Plan your day by adding your favourite sessions to create a custom agenda. Once you've selected your sessions click download to request a printable copy to bring with you on the day. It's that simple!
No sessions

9:45 am - 10:10 am - Theatre 3 Prevention

Analysing the best solutions to the ever evolving cyber threat

  • A look at the current threats faced by organisations and the threats likely to emerge in 2019
  • Latest results from academic research
  • Security as a socio-technical challenge — analysing the technical and cultural solutions
Professor Chris Hankin
Co-Director, Institute for Security Science and Technology
Imperial College London

10:20 am - 10:45 am - Theatre 3 Prevention

Planning security under uncertainty

  • How can a CISO deliver effective change and security improvement when the business is constantly changing, evolving, and making step changes through mergers, acquisitions and divestments?
  • How can a CISO deliver IT improvements when the evolution and development of new technology is exponentially increasing in speed?
  • How can a CISO remain secure when the threat actors are constantly evolving and developing new techniques?
Robert Coles

10:55 am - 11:20 am - Theatre 3 Prevention

AI driven security, the next big thing and is it enough?

  • A look at the growth in AI driven security
  • Does AI really make us more secure and does it go far enough?
Simon Wilson
Aruba, a Hewlett Packard Enterprise company

11:30 am - 12:00 pm - Theatre 3 Prevention

Protecting against the insider breach

  • A look at how organisations can respond to the insider threat using recent advances in graph databases, big data processing and machine learning
  • How to study historical user behaviour, detect anomalies and protect against data breaches
Sudeep Venkatesh
Chief Product Officer

12:10 pm - 12:30 pm - Theatre 3 Prevention

Preventing cyber crime – from one of three angles

  • A look at ‘the business’ of cybercrime
  • What are the ‘generations’ of cybercrime?
  • Analysing the future trajectories and threats
Dr. Erik Wennerström
Swedish National Council for Crime Prevention

12:40 pm - 1:05 pm - Theatre 3 Prevention

Understanding how new cyber exposures are shaping the insurance industry

  • Analysing what is covered and what is not covered by cyber insurance
  • How to quantify cyber exposures and risk within your organisation
  • How the insurance sector is responding with changes in business models and product initiatives.
  • How do you distinguish between the various tools available?
Dan Trueman
Global Head of Cyber, Axis Insurance
Axis Capital

1:15 pm - 1:45 pm - Theatre 3 Prevention

Privacy threats: Preventing breaches and misuse

  • A look at the legal framework to protect public privacy
  • Website data control through team collaboration – diminishing the risks
  • Analysing the future outlook and a look at changing perceptions
  • Real-life stories from leading companies
Charlotte Olsen
Product Expert for Privacy and Security
Klint Ozolins
Senior Business Development Manager

1:55 pm - 2:20 pm - Theatre 3 Prevention

Zero Trust: The future of cyber security?

  • Identifying your sensitive data
  • Mapping the data flows of your sensitive data to understand how data flows across the network and between users and resources
  • Architecting your network to identify where micro-perimeters should be placed and segmented with physical or virtual appliances
  • Creating an automated rule base
  • Monitoring the ecosystem effectively and efficiently
Giacomo Collini
Director of Information Security

2:30 pm - 2:55 pm - Theatre 3 Prevention

A breakdown of what businesses and the public can do to protect themselves from a cyber attack

  • Helping organisations prepare, protect, prevent, respond and recover from cyber threats
  • Engaging with local enterprise partnerships to create a shared awareness culture
  • Encouraging organisations to help prevent attacks from spreading through the Cyber Security information Sharing Partnership (CiSP)
  • Working with national partners across government, crime sector and industry to provide regular updates on attack trends
Jennie Williams
Cyber Protection Officer
TITAN - North West Regional Organised Crime Unit

3:05 pm - 3:30 pm - Theatre 3 Prevention

Phishing and users: Improving on imperfection

  • Educating your workforce as a first line of defence – How email is at the heart of this evolving threat
  • Coping with the limitations of password management to protect against phishing attacks
  • Ensuring that when users fall foul of scams there are other controls in place
  • How do phishers use websites, domain names of social sources for phishing
  • What companies can do to improve protection, detection and response
Piers Wilson
Institute of Information Security Professionals

Programme Builder

Plan your day by adding your favourite sessions to create a custom agenda. Once you've selected your sessions click download to request a printable copy to bring with you on the day. It's that simple!
No sessions

10:25 am - 10:30 am - Hackchat

Chairman’s opening remarks

Oscar Williams
News Editor
NS Tech, a division of the New Statesman

10:30 am - 11:15 am - Hackchat

Understanding the threat landscape

  • A look at the mindset of a hacker
  • A live demonstration of hacking – Are you brave enough to get hacked?
  • Staying cyber safe in an uncertain world
Cal Leeming
Founder, CEO, Security Advisor

11:30 am - 12:00 pm - Hackchat

Agile cyber security

  • Adopting an agile workflow for cybersecurity for a more efficient environment through process consistency
  • Creating enhanced project visibility and increase team collaboration across the business
Giacomo Collini
Director of Information Security

12:15 pm - 12:45 pm - Hackchat

How your organisation can benefit from ethical hacking

Zoë Rose
Baringa Partners

1:00 pm - 1:30 pm - Hackchat

A look at the future of the CISO role

  • Embracing the role of driving innovation
  • “Enabling” your companies employees to be more productive
  • Providing an accurate picture of your InfoSec program and how you are measuring up
Bridget Kenyon
Global CISO
Thales eSecurity

1:45 pm - 2:15 pm - Hackchat

Building Bridges: How to engage the business in Data Protection – Data Mapping

Martin Fletcher