*Agenda is subject to change. 

Monday, June 29

09:30am

Welcome Remarks & Explanation of the features of the Digital Platform

10:05am

Opening Keynote: Cyber Security in the ‘New Normal’

10:40am

Panel Discussion: The Future Outlook of the Cyber Security Industry -Women, Diversity and its Increased Importance in ‘New Normal’ of Working from Home
  • How has the ‘new normal’ of increased working from home changed the priorities of cyber security professionals?
  • How can the industry address the skills gap, bias in AI and societal perceptions to encourage more women to enter the industry?
  • As the cyber security industry is ever changing and developing at a rapid pace, what will be the next’black swan’ for professionals to prepare for?

Victoria Baines, Visiting Research Fellow, University of Oxford

11:45am

The Big Interview: In a world that is pivoting to digital solutions, how can you limit the fundamental human risk factor?

Interviewed by: Tony Morbin, Editor, SC Media

12:15pm

Lunck Break & Networking 

This is an opportunity for you to use the networking features of the digital platform to chat with other attendees.

Stream A: Cloud & Network Security
Stream B: Protecting Your Organisation from Ransomware
Stream C: Endpoint Security
1:15pm Presentation: How do you know what works best for your configuration?
1:40pm Quick Fire Case Study

This quick fire case study will focus on a breach of a cloud, the response to the breach and the lessons learnt from the case.

1:15pm Presentation: What are the latest ransomware trends and how can you protect your organization from these new forms of attack?
1:40pm Quick Fire Case Study

This quick fire case study will explain how one company dealt with a ransomware attack including their lessons learnt and processes implemented after recovery.

1:15pm Presentation: How can you be proactive rather than reactive when securing your endpoints?
1:40pm Quick Fire Case Study

This quick fire case study will explain the lessons learnt from an endpoint being compromised and the processes that have been implemented to prevent it happening again.

2:10pm

Live Demonstration from Ken Munro of PenTest Partners

At previous SC Congress events Ken has hacked a teddy bear to make it swear. Join in to this session to see what Ken will do next and understand where your business is at risk.

Ken Munro, Partner, PenTest Partners

2:35pm

CISO Panel Discussion: Leadership Lessons & Best Practice in Unprecedented Times
  • Allocating the right security budget when the risk and threats have increased but the economy has shrunk
  • Data Compliance, Management & Security: Cloud storage vs. own data centres: how do you know what to store where?
  • How can you map your supply chain cyber security dependencies to identify the ‘weakest link’?
Stream A: Cloud & Network Security
Stream B: Protecting Your Organisation from Ransomware
Stream C: Endpoint Security
3:10pm Big is better, but also more complicated: Understanding the risks when scaling up your cloud and network
  • When using multiple cloud environments, where do traditional perimeter defenses fail? 
  • How can you manage identity and access management when employees are working from home and using personal equipment?
  • What are the key risk factors to consider when scaling up your cloud or going hybrid?
3:10pm Show me the money: How to protect yourself from the most expensive attack
  • The human element: how can you create a ‘human firewall’?
  • Where do you prioritise incident response planning?
  • Your cyber hygiene: How can you identify and address entry points on the cyber kill chain?
3:10pm Endpoints are just the starting point: Understanding your endpoint risk
  • Visibility of endpoints: what is best practice for endpoint risk assessments in order to ensure you identify risk effectively? 
  • What are the benefits of synergising your protections to give a 360 understanding of your endpoint?
  • What pragmatic and cost effective endpoint protection is available for smaller or medium businesses?

3:40pm

Regulatory Update from the European Commission
  • Allocating the right security budget when the risk and threats have increased but the economy has shrunk
  • Data Compliance, Management & Security: Cloud storage vs. own data centres: how do you know what to store where?
  • How can you map your supply chain cyber security dependencies to identify the ‘weakest link’?

4:00pm

Closing Remarks & Summation by Tony Morbin, Editor of SC Magazine