what sessions can you expect?

AGENDA

Over the last 12 months cybersecurity has shot up the boardroom agenda to become one of the top priorities. The pandemic and a home based workforce has provided the opportunity for businesses to recognise the value of IT and cybersecurity teams. As we move forward to hybrid workforce, this will only continue to grow as businesses are reminded that whilst not revenue generating, cybersecurity is revenue protecting and securing function crucial for every business. 

Hosted virtually across two days, the SC Annual Digital Congress 2022 will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business. 

SC Annual Digital Congress - 27/28 June

09:30 – 09:40 GMT

OPENING REMARKS – Chairperson’s opening comments

A welcoming introduction from the conference chairperson, providing a thematic overview of the day, as well as additional details for all attendees

09:45 – 10:15 GMT

PRESENTATION – The future of information security

With an ever evolving threat paradigm seemingly changing with every passing day, keeping ahead of the curve remains a challenge for all. Against the backdrop of rising geopolitical tensions, hybrid and extended security models and the drive for talent, this keynote will address how you can stay prepare for the unknown.

10:20 – 10:50 GMT

PRESENTATION – Best Practices in Ransomware Response, Prevention & Negotiation

These increasingly sophisticated ecosystem type attacks require a multi faceted response. Join our thought leaders and experts from CS, MC & Netskope for a discussion on how together they can stop threat actors in their tracks and ensure your organisation remains resilient against the accelerating threat landscape

Quentyn Taylor, Director of Information Security, Canon Europe

10:50 – 11:20 GMT

INTERMISSION

11:20 – 12:00 GMT

CASE STUDY – The state of cyber-resilience in the UK

With the release of the annual UK government survey detailing the cost and impact of cyber breaches and attacks on businesses, charities and institutions, a number of questions arise as to the preparedness of businesses, and their ability to combat malicious attacks effectively. What sort of patterns does this survey demonstrate? Where are criminals having the most success?

Jayesh Shah, Researcher, Ipsos MORI

Sam Donaldson, Director, Perspective Economics

Steven Furnell, Professor of Cyber Security, University of Nottingham

12:05 – 12:35 GMT

PRESENTATION – Power or the cloud – Modernising threat detection

The ability to detect and respond to the latest threats has risen to the forefront of concerns for security leaders and practitioners around the globe. This session will address how transforming security operations and building a modern threat detection and response program that takes advantage of the speed, automation, and scale of the cloud offers greater security.

Senior Representative from Mimecast

12:40 – 13:10 GMT

PRESENTATION – Utilising Inherent Risk for More Efficient Vendor Management

Building an effective third party risk management (TRPM) program requires a keen understanding of which elements of your supply chain are most risk averse. Learn how you by understanding how best to prioritise your teams time on boarding key vendors, investing your teams time into performing due diligence car on the third parties that matter most and investing resources into these third parties can pay dividends in the future.

Nina Paine, Managing Director – Cyber Partnerships & Third-Party Security Risk Oversight, Standard Chartered Bank

13:15 – 14:00 GMT

ROUNDTABLE – Extending network security across the entire supply chain – SOPHOS

Most financial institutions are linked to a complex web of third party vendors, each of which must be measured and managed. What efforts are being used to manage downstream supplier cybersecurity? How can increased diligence and investment into networked security mitigate exposure risk? How can such protection be used in tackling both internal and external threats?

Kostandino Kustas, Cybersecurity Consultant, Sophos Cybersecurity Consultant, Sophos

14:00 – 14:30 GMT

INTERMISSION

14:30 – 15:00 GMT

PRESENTATION – Tackling the widening cyber security skills gap

With the changing demands of the cyber skills market ever changing, how has the demand for professionals changed over the last few years? Where are the key barriers that exacerbating this issue? Is the issue recruitment or education? What can the industry do to tackle specific vacancy issues and attract the best potential talent?

15:05 – 15:50 GMT

PANEL – Decrypting the D&I dilemma – Nurturing future cyber generations

Cybersecurity has quickly become one of the most important functions for businesses globally, and as the demand for cyber professionals increases, so must the focus on diversity and inclusion. What challenges does the industry face in thid respect? How can a diverse team ensure greater securitisation and productivity? What can be done to redress the imbalance?

15:50 – 16:00 GMT

CLOSING REMARKS – Chairperson’s closing comments

A closing address from the conference chairperson, briefing on all the outcomes from the day, and digesting tangible takeaways for the audience

09:30 – 09:40 GMT

OPENING REMARKS – Chairperson’s opening comments

A welcoming introduction from the conference chairperson, providing a summary of day one, a thematic overview of day two, as well as additional details for all attendees

09:45 – 10:15 GMT

PRESENTATION – Passing the cybersecurity leadership test

With increasing cyber attacks globally, a security breach is tantamount to a breach of trust to stakeholders across your business. This session will explore how leadership playing an engaged, active and continuous role in the development of effective security measures, along with a consistent communication line between the CEO, CISO, CTO and CIO is imperative to for CEOs to ensure the trust in the business security is maintained

10:20 – 10:50 GMT

ROUNDTABLE – Sophos Roundtable #2

10:50 – 11:20 GMT

INTERMISSION

11:20 – 12:00 GMT

PRESENTATION – Defining a successful IAM strategy

In today’s digital business climate, understanding and prioritising the metrics that matter to your IAM stakeholders is critical to developing and monitoring an IAM programmes effectiveness. How can you communicate the value of IAM strategies upwards? What does the next generation of identity centric access controls look like? How are privacy regulations likely to impact this?

12:05 – 12:35 GMT

PRESENTATION – Building Cyber Security and Resilience across the UK Economy

Given the rise of state sponsored attacks, and with geopolitical tensions at all time records, Evaluating how the UK stacks ups as a global cyber power is paramount. What do cyber investment levels across the UK currently look like? Is the current security climate sufficient to keep businesses protected? How can embedded digital awareness within organisations bolster this?

12:40 – 13:10 GMT

PRESENTATION – Navigating the intricate balance between security & convenience

Many customers increasingly value convenience as the measure of quality, yet these products must still remain secure. How do cyber professionals manage this duality? Where does the burden lie in developing a resilient security culture? Can a pluralistic security environment, where the responsibility for security is shared across all aspects of development and operations, change this?

13:15 – 14:00 GMT

PRESENTATION – Why CIAM & KYC are critical for driving sustainable and secure growth

CIAM and KYC is a critical function for any business moving forward. How do we define identity in 2022? How can the industry ensure accurate verification while driving growth amongst a stringent regulatory operational environment? How can and should CIAM and KYC help to mitigate identity access issues, especially in the wake of more sophisticated ID theft criminals?

14:00 – 14:30 GMT

INTERMISSION

14:30 – 15:00 GMT

PANEL – The risk within – Protecting against insider threats

One of the largest risk factors to accout for, and one that accesses security networks daily, is that of insider attacks. What do you need to create an effective insider risk programme? How can you balance the need for a business to be flexible against the securitisation of networks? What tools and platforms are of most need to maintain security?

15:05 – 15:50 GMT

DISCUSSION GROUPS – Interactive discussion topics
In this session, delegates have the opportunity to engage in intimate discussion groups, hosted by a moderator, providing the opportunity to reflect, share and delve into the discussions throughout the day. Tables includeTable 1: Cybersecurity LeadershipTable 2: Application & Data SecurityTable 3: Identity & Access ManagementTable 4: Supply Chain and Third Parties

15:50 – 16:00 GMT

CLOSING REMARKS – Chairperson’s closing comments and close of conference

A closing address from the conference chairperson, briefing on all the outcomes from the day, and digesting tangible takeaways for the audience

In association with

Developing your capabilities & competency in cyber security 

WHEN

28 - 29 June 2022

WHERE

Online via our virtual platform