*Agenda is subject to change.
PREVIOUS AGENDA

09:30am
Welcome Remarks & Opening Keynote: Cybersecurity, You Wanted Board Attention, Now What?
- 2020 has seen the role of cybersecurity as a key board agenda item, but as we consider its future role what needs to be done to ensure we remain in a position to establish information risk as a key focus for organizations globally.
Tony Morbin, Editor In Chief, SC Media UK
Alex Bell, Portfolio Manager – Energy and Environment, Haymarket
Raj Samani, Chief Scientist, Fellow, McAfee
10:15am
Opening Keynote: Cyber Security in the ‘New Normal’
Raj Samani, Chief Scientist, Fellow, McAfee
10:20am
Panel Discussion: The Future Outlook of the Cyber Security Industry – Women, Diversity and its Increased Importance in ‘New Normal’ of Working from Home
- How has the ‘new normal’ of increased working from home changed the priorities of cyber security professionals?
- How can the industry address the skills gap, bias in AI and societal perceptions to encourage more women to enter the industry?
- As the cyber security industry is ever changing and developing at a rapid pace, what will be the next’black swan’ for professionals to prepare for?
(Moderator) Jane Frankland, Founder & CEO, Cyber Security Capital & the IN Security Movement
Deshini Newman, Managing Director EMEA, (ISC)2
Victoria Baines, Visiting Research Fellow, University of Oxford
Sarah Lucas, Head of Cyber Security and Digital Identity, Department for Digital Culture, Music and Sport
Mahbubul Islam CSyP, Chief Information Security Officer, HM Courts & Tribunals Service (HMCTS)
Stream A: Cloud & Network Security
Stream B: Protecting Your Organisation from Ransomware
Stream C: Endpoint Security
11:15am Presentation: Security Secrets – Why Leading SOC Teams Have Cloud-y Vision
- What the future of security operations centres (SOCs) and job roles will look like
- How the SOC Team needs to be strategically embedded in DevOps
- How to ensure and monitor compliance with an organization’s security policy across multi-cloud services
- How DevOps’ principles can be practiced in the SOC operating model
- What it looks like to plan and establish a SOC in the cloud
- Starting your plan and how to communicate it to management
Matthias Maier, Security Expert, Splunk
11:15am Presentation: How to prevent, detect and react to Ransomware incidents
- What are the most effective solutions (people, process and technology) that help with preventing Ransomware incidents?
- Once you are are a victim of an attack, what are techniques you can use to gain an advantage on the malicious behaviour? (which will dramatically reduce the impact of the attack)
- What should the focus be during and after an incident so that the business and customer impact of the incident is minimised?
Dinis Cruz, SVP of Engineering and CISO, Glasswall Solutions
11:15am Presentation: The importance of the endpoint in a Zero Trust world
- Moving trust to the endpoint
- Key elements of device health
- What are the main lessons learned?
Richard Archdeacon, Advisory CISO, EMEA, Duo
Alex Morgan, Customer Solutions Engineer, Duo
11:50am Presentation: Security and the Cloud – The Missing Ingredient? Identity
Mobile and cloud proliferation has exposed organisations to much higher risks for potential hacks and attacks. The traditional perimeter is crumbling under the weight of these threats, making it imperative to re-examine traditional security approaches. IAM must now take centre stage to defend against identity-based security breaches.
This session will discuss the best practices and success factors to dramatically reduce attack surfaces and vectors.
Topics include: Credential theft and compromise; Gaps in the security landscape; The missing ingredient, Identity; Adaptive Multi-Factor Authentication; Strategic direction for identity-driven security.
Max Faun, EMEA Head of Business Consulting, Okta
11:50am Quick Fire Case Study
How to become a sought after leader in the cyber security world
Jane Frankland, Founder & CEO, Cyber Security Capital & the IN Security Movement
11:50am Integrating Remote Endpoint Management And Security
- How has the sudden shift to work from home mode awkwardly exposed the inherent risks of incomplete endpoint management?
- How can you use integrated automation to satisfy the increasing needs of remote users while mitigating risk?
Ken Galvin, Senior Product Manager, Quest
12:20pm
Lunck Break & Networking
This is an opportunity for you to use the networking features of the digital platform to chat with other attendees.
Stream A: Cloud & Network Security
Stream B: Protecting Your Organisation from Ransomware
Stream C: Endpoint Security
1:45pm Presentation: European Data Security Requires a Zero Trust Approach – Discover Insights from the 2020 Thales Data Threat Report
- How are the adoption of digital transformation technologies, especially cloud, putting sensitive data at greater risk?
- What are the data security challenges facing European enterprises today?
- How can your organization be most effective when selecting the right tools to protect their sensitive data?
Chris Harris, Director of Sales Engineering EMEA, Thales
1:45pm Presentation:The Next Step – re-appraising the security risk associated with a growing remote workforce
Many organisations have transitioned to a new way of working, with many more employees working remotely or in different ways. But, with this new norm, many organisations have increased their security risk inadvertently. We will discuss the evolving threats and how to protect your organisation in the best way possible.
Ed Rowley, Sr Manager, Technical Sales EMEA, Proofpoint
1:45pm Presentation: How can you be proactive rather than reactive when securing your endpoints?
Successful cyber security operations understand the limitations of automated, passive detection technologies, and how these limitations can lead to a silent failure scenario. On this session we’ll be covering the hot topic of threat hunting and its benefits:
- Threat Hunting: What it is and what it isn’t.
- Why do we even need threat hunting?
- Threat hunting trends and where is it headed?
George Petre, Senior Sales Engineer, CrowdStrike
2:20pm
Live Demonstration from Ken Munro of PenTest Partners
At previous SC Congress events Ken has hacked a teddy bear to make it swear. Join in to this session to see what Ken will do next and understand where your business is at risk.
Ken Munro, Partner, PenTest Partners
3:00pm
CISO Panel Discussion: Leadership Lessons & Best Practice in Unprecedented Times
- Allocating the right security budget when the risk and threats have increased but the economy has shrunk
- Data Compliance, Management & Security: Cloud storage vs. own data centres: how do you know what to store where?
- How can you map your supply chain cyber security dependencies to identify the ‘weakest link’?
- How can you prepare for the upcoming M&A cycle?
(Moderator) Tony Morbin, Editor In Chief, SC Media UK
Paul Harragan, Director, EY
Becky Pinkard, CISO, Aldermore Bank PLC
Siân John, Director EMEA/APJ Cybersecurity Strategy, Microsoft
Stream A: Cloud & Network Security
Stream B: Protecting Your Organisation from Ransomware
Stream C: Endpoint Security and Application Security
3:50pm Presentation: The Storm before ‘The Cloud’
- The TTPs & cybercrime eco-systems currently affecting cloud environments
- Critical security practices needed to mitigate the impacts of a cloud breach
- Insights into transforming Cloud SecOps to better connect security and GRC needs
Richard Cassidy, Senior Director, Security Strategy, Exabeam
3:50pm Presentation: The Ransomware Threat -From Recent Years to Today
- What can you do in your organisation in order to render ransomware harmless?
- Can you trust the ransomware actors to decrypt your files?
- What are other threats to organisations today that are either as dangerous or more dangerous than ransomware?
Christine Bejerasco, VP, Tactical Defense Unit, F-Secure
3:50pm Presentation: A Guide to Application Security: What to Look for and Why
- Learn about development workflows and the tools developers need to stay productive
- How do you evaluate different AppSec tools
- What features should you look for in an AppSec tool?
Anna Chiang, Senior Product Marketing Manager, Synopsys
Utsav Sanghani, Senior Product Manager, Synopsys
4:25pm Panel Discussion: Big is better, but also more complicated -Understanding the risks when scaling up your cloud and network
- hen using multiple cloud environments, where do traditional perimeter defenses fail?
- How can you manage identity and access management when employees are working from home and using personal equipment?
- What are the key risk factors to consider when scaling up your cloud or going hybrid?
- Why is cloud risk a shared risk?
Moderator: Tony Morbin, Editor, SC Media
James Hanlon, Director of Security Specialisation, EMEA, Splunk
Chris Harris, Director of Sales Engineering EMEA, Thales
Dai Davis, Partner, Percy Crow Davis & Co
4:25pm Panel Discussion: Show me the money – How to protect yourself from the most expensive attack
- The human element: how can you create a ‘human firewall’?
- Where do you prioritise incident response planning?
- Your cyber hygiene: How can you identify and address entry points on the cyber kill chain?
Moderator: Nick Ioannou, Head of IT, Ratcliffe Groves Partnership
Adam Wedgbury, Head of Cyber Security Innovation & Scouting, Airbus
John Scott, Head of Security Education, Bank of England
Chris Goettl, Director, Product Management, Security, Ivanti
James Alderman, Sales Engineer, BlackBerry
Dinis Cruz, SVP of Engineering and CISO, Glasswall Solutions
4:25pm Panel Discussion: Endpoints are just the starting point: Understanding your endpoint risk
- Visibility of endpoints: what is best practice for endpoint risk assessments in order to ensure you identify risk effectively?
- What are the benefits of synergising your protections to give a 360 understanding of your endpoint?
- What pragmatic and cost effective endpoint protection is available for smaller or medium businesses?
Moderator: Nasser Fattah, Managing Director Cyber, IT and Third Party Risk Management, Mitsubishi UFJ Financial Group
Amit Basu, Vice President, Chief Information Officer & Chief Information Security Officer, International Seaways
Stuart Jackson, Senior Director Cybersecurity Technical Leader EMEA, BlackBerry
Ken Galvin, Senior Product Manager, Quest
Richard Archdeacon,Advisory CISO, EMEA, Duo
5:15pm
Closing Keynote: What comes next? Moving on from the New Normal
Ian West, Chief, NATO Cyber Security Centre
5:50pm