*Agenda is subject to change. 

Monday, June 29

09:30am

Welcome Remarks & Opening Keynote: Cybersecurity, You Wanted Board Attention, Now What?
  • 2020 has seen the role of cybersecurity as a key board agenda item, but as we consider its future role what needs to be done to ensure we remain in a position to establish information risk as a key focus for organizations globally.

Tony Morbin, Editor In Chief, SC Media UK

Alex Bell, Portfolio Manager – Energy and Environment, Haymarket

Raj Samani, Chief Scientist, Fellow, McAfee

 

10:15am

Opening Keynote: Cyber Security in the ‘New Normal’

Raj Samani, Chief Scientist, Fellow, McAfee

10:20am

Panel Discussion: The Future Outlook of the Cyber Security Industry – Women, Diversity and its Increased Importance in ‘New Normal’ of Working from Home
  • How has the ‘new normal’ of increased working from home changed the priorities of cyber security professionals?
  • How can the industry address the skills gap, bias in AI and societal perceptions to encourage more women to enter the industry?
  • As the cyber security industry is ever changing and developing at a rapid pace, what will be the next’black swan’ for professionals to prepare for?

(Moderator) Jane Frankland, Founder & CEO, Cyber Security Capital & the IN Security Movement

Deshini Newman, Managing Director EMEA, (ISC)2

Victoria Baines, Visiting Research Fellow, University of Oxford

Sarah Lucas, Head of Cyber Security and Digital Identity, Department for Digital Culture, Music and Sport

Mahbubul Islam CSyP, Chief Information Security Officer, HM Courts & Tribunals Service (HMCTS)

Stream A: Cloud & Network Security
Stream B: Protecting Your Organisation from Ransomware
Stream C: Endpoint Security
11:15am Presentation: Security Secrets – Why Leading SOC Teams Have Cloud-y Vision
  • What the future of security operations centres (SOCs) and job roles will look like
  • How the SOC Team needs to be strategically embedded in DevOps
  • How to ensure and monitor compliance with an organization’s security policy across multi-cloud services
  • How DevOps’ principles can be practiced in the SOC operating model
  • What it looks like to plan and establish a SOC in the cloud
  • Starting your plan and how to communicate it to management

Matthias Maier, Security Expert, Splunk

11:15am Presentation: How to prevent, detect and react to Ransomware incidents
  • What are the most effective solutions (people, process and technology) that help with preventing Ransomware incidents? 
  • Once you are are a victim of an attack, what are techniques you can use to gain an advantage on the malicious behaviour? (which will dramatically reduce the impact of the attack) 
  • What should the focus be during and after an incident so that the business and customer impact of the incident is minimised?

Dinis Cruz, SVP of Engineering and CISO, Glasswall Solutions

11:15am Presentation: The importance of the endpoint in a Zero Trust world
  • Moving trust to the endpoint
  • Key elements of device health
  • What are the main lessons learned?

Richard Archdeacon,  Advisory CISO, EMEA, Duo

Alex Morgan, Customer Solutions Engineer, Duo

11:50am Presentation: Security and the Cloud – The Missing Ingredient? Identity

Mobile and cloud proliferation has exposed organisations to much higher risks for potential hacks and attacks. The traditional perimeter is crumbling under the weight of these threats, making it imperative to re-examine traditional security approaches. IAM must now take centre stage to defend against identity-based security breaches.

This session will discuss the best practices and success factors to dramatically reduce attack surfaces and vectors.

Topics include: Credential theft and compromise; Gaps in the security landscape; The missing ingredient, Identity; Adaptive Multi-Factor Authentication; Strategic direction for identity-driven security.

Max Faun, EMEA Head of Business Consulting, Okta

11:50am Quick Fire Case Study

How to become a sought after leader in the cyber security world

Jane Frankland, Founder & CEO, Cyber Security Capital & the IN Security Movement

11:50am Integrating Remote Endpoint Management And Security
  • How has the sudden shift to work from home mode awkwardly exposed the inherent risks of incomplete endpoint management?
  • How can you use integrated automation to satisfy the increasing needs of remote users while mitigating risk?

Ken Galvin, Senior Product Manager, Quest

12:20pm

Lunck Break & Networking 

This is an opportunity for you to use the networking features of the digital platform to chat with other attendees.

Stream A: Cloud & Network Security
Stream B: Protecting Your Organisation from Ransomware
Stream C: Endpoint Security
1:45pm Presentation: European Data Security Requires a Zero Trust Approach – Discover Insights from the 2020 Thales Data Threat Report
  • How are the adoption of digital transformation technologies, especially cloud, putting sensitive data at greater risk?
  • What are the data security challenges facing European enterprises today?
  • How can your organization be most effective when selecting the right tools to protect their sensitive data?

Chris Harris, Director of Sales Engineering EMEA, Thales

1:45pm Presentation:The Next Step – re-appraising the security risk associated with a growing remote workforce

Many organisations have transitioned to a new way of working, with many more employees working remotely or in different ways. But, with this new norm, many organisations have increased their security risk inadvertently. We will discuss the evolving threats and how to protect your organisation in the best way possible.

Ed Rowley, Sr Manager, Technical Sales EMEA, Proofpoint

1:45pm Presentation: How can you be proactive rather than reactive when securing your endpoints?

Successful cyber security operations understand the limitations of automated, passive detection technologies, and how these limitations can lead to a silent failure scenario. On this session we’ll be covering the hot topic of threat hunting and its benefits:

  • Threat Hunting: What it is and what it isn’t.
  • Why do we even need threat hunting?
  • Threat hunting trends and where is it headed?

George Petre,  Senior Sales Engineer, CrowdStrike

2:20pm

Live Demonstration from Ken Munro of PenTest Partners

At previous SC Congress events Ken has hacked a teddy bear to make it swear. Join in to this session to see what Ken will do next and understand where your business is at risk.

Ken Munro, Partner, PenTest Partners

3:00pm

CISO Panel Discussion: Leadership Lessons & Best Practice in Unprecedented Times
  • Allocating the right security budget when the risk and threats have increased but the economy has shrunk
  • Data Compliance, Management & Security: Cloud storage vs. own data centres: how do you know what to store where?
  • How can you map your supply chain cyber security dependencies to identify the ‘weakest link’?
  • How can you prepare for the upcoming M&A cycle?

(Moderator) Tony Morbin, Editor In Chief, SC Media UK

Paul Harragan, Director, EY

Becky Pinkard, CISO, Aldermore Bank PLC

Siân John, Director EMEA/APJ Cybersecurity Strategy, Microsoft

Stream A: Cloud & Network Security
Stream B: Protecting Your Organisation from Ransomware
Stream C: Endpoint Security and Application Security

3:50pm Presentation: The Storm before ‘The Cloud’

  • The TTPs & cybercrime eco-systems currently affecting cloud environments 
  • Critical security practices needed to mitigate the impacts of a cloud breach
  • Insights into transforming Cloud SecOps to better connect security and GRC needs

Richard Cassidy, Senior Director, Security Strategy, Exabeam

3:50pm Presentation:  The Ransomware Threat -From Recent Years to Today

  • What can you do in your organisation in order to render ransomware harmless?
  • Can you trust the ransomware actors to decrypt your files?
  • What are other threats to organisations today that are either as dangerous or more dangerous than ransomware?

Christine Bejerasco, VP, Tactical Defense Unit, F-Secure

3:50pm Presentation: A Guide to Application Security: What to Look for and Why
  • Learn about development workflows and the tools developers need to stay productive
  • How do you evaluate different AppSec tools
  • What features should you look for in an AppSec tool?

Anna Chiang, Senior Product Marketing Manager, Synopsys

Utsav Sanghani, Senior Product Manager, Synopsys

4:25pm Panel Discussion:  Big is better, but also more complicated -Understanding the risks when scaling up your cloud and network

  • hen using multiple cloud environments, where do traditional perimeter defenses fail? 
  • How can you manage identity and access management when employees are working from home and using personal equipment?
  • What are the key risk factors to consider when scaling up your cloud or going hybrid?
  • Why is cloud risk a shared risk?

Moderator: Tony Morbin, Editor, SC Media

James Hanlon, Director of Security Specialisation, EMEA, Splunk

Chris Harris, Director of Sales Engineering EMEA, Thales

Dai Davis, Partner, Percy Crow Davis & Co

4:25pm Panel Discussion: Show me the money – How to protect yourself from the most expensive attack

  • The human element: how can you create a ‘human firewall’?
  • Where do you prioritise incident response planning?
  • Your cyber hygiene: How can you identify and address entry points on the cyber kill chain?

Moderator: Nick Ioannou, Head of IT, Ratcliffe Groves Partnership

Adam Wedgbury, Head of Cyber Security Innovation & Scouting, Airbus

John Scott, Head of Security Education, Bank of England

Chris Goettl, Director, Product Management, Security, Ivanti

James Alderman, Sales EngineerBlackBerry

Dinis Cruz, SVP of Engineering and CISO, Glasswall Solutions

4:25pm Panel Discussion: Endpoints are just the starting point: Understanding your endpoint risk
  • Visibility of endpoints: what is best practice for endpoint risk assessments in order to ensure you identify risk effectively? 
  • What are the benefits of synergising your protections to give a 360 understanding of your endpoint?
  • What pragmatic and cost effective endpoint protection is available for smaller or medium businesses?

Moderator: Nasser Fattah, Managing Director Cyber, IT and Third Party Risk Management, Mitsubishi UFJ Financial Group

Amit Basu, Vice President, Chief Information Officer & Chief Information Security Officer, International Seaways

Stuart Jackson, Senior Director Cybersecurity Technical Leader EMEA, BlackBerry

Ken Galvin, Senior Product Manager, Quest

Richard Archdeacon,Advisory CISO, EMEA, Duo

5:15pm

Closing Keynote: What comes next? Moving on from the New Normal 

Ian West, Chief, NATO Cyber Security Centre

5:50pm

Closing Remarks & Summation by Tony Morbin, Editor of SC Magazine