Accredited event by the CPD
The recent global crisis is causing ripple effects that will have a lasting impact on businesses, increasing the risk of cyber attack. The ‘new normal’ of hybrid business environments is heightening cyber security vulnerabilities, as organisations work to protect assets both in the office and at home.
It was the time to re-evaluate security strategies and safeguard your operations.
The second event of the Cyber Risk and Resilience Series, ‘Protecting Against Cyber Attack’, gave attendees tools to understand the human and structural process that can protect a business online. With analysis and debate on the role of AI to monitor your network for unusual activity, how to manage and prevent insider threats as well as the insights into creating a security culture in reality rather than just paying lip service to it. ‘Protecting Against Cyber Attack’ provided practical and business critical tools to improve the standard of monitoring, certification and training in any business.
Key questions that were answered:
Welcome Remarks & Explanation of Features of Digital Platform
Data Download Presentation: Tread the Route to Cyber Resilience through your Unknowns
Panel Discussion: Beyond the Marketing Spiel - What should you be looking for in a solution to protect your business?
Presentation: Beyond BloodHound: Who let the dogs out?
In 2014, researchers from ANSII (National Agency for the Security of Information Systems) present a research paper detailing a new and unique approach using graph theory to map Active Directory security. This research was then used by third parties to develop BloodHound. Fast forward 6 years and the same researchers responsible for this initial research have gone above and beyond to explore strange new AD worlds where no one has gone before. Join us as we explore some of the advanced AD security issues that can only be seen via continuous AD graph theory!
Industry Specific 'Off the Record' Roundtables
These roundtables will provide you with the same experience as meeting and chatting to someone new during the coffee break of a live conference. Organised by industry sector, each table will give you an opportunity to lesson share and network with others dealing with the same industry specific challenges as you.
There will be a table leader to drive the conversation and provide you with actionable learnings to take away from the conversation.
All you have to do is:
- Click on a topic table
- Choose whether you want to share your audio and visual
- Jump into the conversation
There will be several topics for each industry sector so that you have the opportunity for as much networking and lesson sharing as possible.
+ Finance & Legal
+ Remote Working
+ Government/Public Sector & Charities
Lunch & Screen Break
Presentation: Reducing the Human Factor: Can AI and Machine Learning Revolutionise the Cyber Security Sector?
A few facts are crystal clear. We, as a security industry, are not winning the war against cybercrime despite more than $100B spent each year by organizations. In addition it is equally clear that throwing more security professionals at the problem, even if they were widely available and affordable (which they aren’t), won’t solve the problem either as there is too much data, not enough integration, and too much forensic complexity for humans to keep up. The emergence of AI and machine learning as applied to security has received its fair share of hype, but can it really make a difference? This session will explore key aspects of AI and machine learning, will give some real-life examples of it in practice, and then you can decide if it is a revolution in the making.
Presentation: A Human Centric Approach to Ransomware & Phishing Attacks: How do you protect your workforce from themselves?
Thought Leadership & Management Panel Discussion: The Big Debate of Human vs. Technology: What is the best team structure to ensure the most efficient monitoring or is it better to rely on technology?
- How do you consider and factor in diversity of thought in the structure of your teams?
- Recruiting and retaining talent: has this become harder since the start of the pandemic?
Afternoon Screen Break
Presentation: Cybersecurity resilience in the new order
No part of our life has been left untouched by digitalisation. Already in play way before 2020, the Coronavirus pandemic has dramatically hastened the speed at which businesses are digitally transforming. However, at the same time it has also scattered the people who work within them and the customers who transact with them. The threat surface has multiplied, and controls are stretched like never before. How do Cybersecurity leaders navigate the new order, build resilience into their teams, systems and processes to pre-empt, detect and protect their organisations from a very clear and present danger.
Panel Discussion: How can you use governance structures, team training and processes to prevent a breach?
If you are interested in speaking at the next event please contact:
Alsid is a cybersecurity vendor specialising in defending the common denominator of most attacks we see in the wild nowadays: Active Directory (AD) infrastructures. As a fully-automated cloud solution, Alsid for AD provides users with step-by-step, tailored recommendations for hardening their AD, a real-time attack detection engine, as well as capabilities for investigating AD breaches when they unfortunately occur. Whether in the cloud or on premise, Alsid is easy to deploy and operate – no specialised security knowledge required.
Cyber attacks don’t stop at your email perimeter. Your security can’t either. That is why it is Mimecast’s mission to mitigate the risks you face from email, and support you in reducing the cost and complexity of protecting yourself by moving this workload to the cloud. Mimecast lives and breathes cloud technology. With developed proprietary cloud architecture, Mimecast offers you comprehensive email security, service continuity and archiving in a single subscription service. Ultimately, Mimecast’s goal is to make it easier for you to protect your business in today’s fast-changing security and risk environment.
(ISC)² is an international, nonprofit membership association for information security leaders like you. We’re committed to helping our members learn, grow and thrive. More than 150,000 certified members strong, we empower professionals who touch every aspect of information security.
Okta is one trusted platform to secure every identity. More than 9,400 organisations trust Okta’s software and APIs to sign in, authorise, and manage users. Accelerate a world where everyone can safely use any technology. Okta brings simple and secure access to people and organisations everywhere. They promise to not only protect the identities of our customers’ workforce and users, but to ask, “what more can we make possible?”.
The easiest to manage and most readily adopted privilege management solutions are powered by Thycotic. Thycotic’s security tools empower over 10,000 organisations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritising productivity, flexibility and control. Headquartered in Washington, DC, Thycotic operates worldwide with offices in the UK and Australia.