august event
Days
Hours
Minutes
Seconds

Our Virtual Platform

With impressive virtual venues built in 3D, our online cybersecurity conferences host up to 400 delegates. Immersive and engaging, it’s possible to perform video calls inside the platform for one-to-one chats with other delegates without the need to export to Zoom or Teams. 

During the event, we provide the opportunity to eat and socialise with other delegates through a partnership with Just Eat. We even offer an afterparty with Live entertainment following the conference.

Home workers require a new approach to cyber security

COVID-19 has changed the workplace forever, with many firms saying they will implement more home working even after the pandemic is over. It can increase efficiency, but this approach also requires a greater focus on cyber security.

As businesses continue to realise the benefits of remote working, cyber security has never been more important, which is why we have decided to run the Future of Cyber Security as a virtual event.

Following hot on the heels of Cyber News Group’s highly successful 2020 and 2021 events, the Future of Cyber Security’s virtual conference will be better than ever. Attracting an exclusive audience of senior industry executives, the conference will feature topics relevant to the current COVID-19 working environment as a huge number of employees across all industries continue to work from home.

There is no doubt that cyber-criminals are jumping on opportunities to exploit employees working remotely during coronavirus, and the number of cyber-attacks will continue to increase, according to Europol.

Indeed, cyber-criminals are already profiting from the pandemic, with email phishing campaigns designed to steal employees’ credentials and compromise business systems, the agency has warned.

Ransomware is still a major threat to today’s businesses. Interpol’s Cybercrime Threat Response has detected a “significant increase” in the number of attempted ransomware attacks against key organisations around the world.

The cost of a breach can be huge, often reaching millions of pounds. According to Accenture and the Ponemon Institute, the average cost of a cyber-attack is $13 million.

The Annual Cost of Cybercrime study found that criminals are adapting their attack methods by targeting the human layer — the weakest link in cyber defence — through increased ransomware with phishing and social engineering attacks as a path to entry.

This is especially relevant in today’s climate, which has never been riskier for businesses as the work from home ethos opens new avenues for attack. With this in mind, the Future of Cyber Security and Virtual Conference will include sessions on the risks associated with a remote workforce and how to resolve them.

For example, many businesses and their employees are using video conferencing apps such as Zoom to communicate. This is attracting more hackers to the platform, exposing businesses that use video conferencing to an increased number of threats.

With this in mind, the Future of Cyber Security will examine the risks posed by video conferencing, especially when using consumer-grade apps, and outline how best to stay secure.

One of the greatest threats to businesses is email phishing, which sees employees targeted with malicious emails when they are working from home. The conference will address this and also look at how hackers use social engineering to track and lure victims in.

As part of this, The Future of Cyber Security Virtual Conference will include a professional social engineer who will share their tips and tricks to entice employees into giving up their data or give access to buildings or systems.

The Future of Cyber Security Virtual Conference will examine the general threat landscape during COVID-19 and assess the nation state threat to UK businesses.

The Future of Cyber Security Virtual Conference aims to help businesses to stay one step ahead of attackers through a number of insightful sessions not available at any other security conference.

The event will provide essential intelligence that enables senior personnel to stay one step ahead of cyber criminals as the attack surface expands amid COVID-19.

Covering business security during COVID-19 and video conferencing in the morning, and password security, social engineering and the threat landscape in the afternoon, the conference covers today’s cyber security trends and threats across Europe – as well as those of the future – equipping delegates with the strategies, tools and technology needed to cope in an increasingly complex landscape.

It follows the huge success of our events in London, Manchester and Birmingham. This educational exclusive conference brings senior decision-makers face to face with leading cyber security specialists. Covering the strategic needs of all enterprises, the conference provides delegates with a unique opportunity to learn from thought leaders in the field and gain new knowledge and skills to manage the latest technology.

John Doody is the Author of “From Stripes to Stars” and Director of Interlocutor Services Limited, a company established in 2003 to promote Information Assurance and Cyber Security issues both nationally and internationally, the company offers a range of services including Marketing, Communications, Public Speaking, Strategy Reviews, Information Assurance, Cyber Security and Information Technology, these services are geared to the strategic level within government and industry.

Prior to this John served at CESG/GCHQ for 10 years in the appointment of Head of Information Assurance Customer Services. John has a wealth of knowledge across the whole spectrum of Cyber Security and Information Assurance. In this latter appointment he was a major contributor to CESG’s move to a commercial business footing. John also had a role as a Non-Executive Director to a security company as well as providing Strategic Advice to a number of major UK and US IT Security companies. John’s recent major role was as the Global Strategic Cyber Security Adviser to Ultra Electronics Limited where he reported directly to the CEO on Cyber Security matters. He also provided Strategic Advice to FireEye, Booze Allan and Safenet, three large US Cyber companies. John has the unique experience of having held appointments in Defence, the Intelligence Services and Industry.

John is currently a Deloitte Associate.

John is a retired officer of the UK Royal Corps of Signals, a Corps in which he served for 33 years rising to the rank of Colonel.

John is a qualified engineer and has held a number of strategic engineering appointments in the UK Ministry of Defence including system support to PTARMIGAN and WAVELL, the army’s tactical communication and CIS systems, Director in the Procurement Executive as Project Director for Army Electronic Warfare, Battlefield Target Engagement System (BATES), Air Defence CIS system (ADCIS) and WAVELL managing £1B of programmes.

John has also worked in the R&D environment working on Electronic Warfare Simulation. John also served in various operational environments including Loan Service to the Trucial Oman Scouts (A Paramilitary Force) in the Middle East.

John has chaired many international committees dealing with Cyber, Information Assurance, Communications and Interoperability. John is well known on the national and international Cyber/ Information Assurance Conference circuit where he has chaired many events and has given over 100 talks on Cyber and Information Assurance. John is a renowned Evangelist for Cyber Security and Information Assurance.

John held the position of an International Class Director for the Armed Forces Communications and Electronics Association (AFCEA) International (Fairfax Virginia USA). John is a past President and Vice-President of the AFCEA UK WEST Chapter and he served as a Member at Large for AFCEA London in the early 90s. John was also the Cyber Security Lead for the BCS Security Community of Expertise.

John was awarded the CESG/GCHQ Directors Medal in 2003.

John was elevated to the Infosecurity Europe Hall of Fame in 2012.

John was nominated “Godfather of Cyber Security 2021” at the Unsung Cyber Heroes Award Ceremony in the city of London in October 2021

We will discuss how we can help IT Administrators shift away from traditional patch management and evolve to comprehensive software management instead.

We will share:

– Common Software-types that make you more exposed than you think

– How to re-prioritize your approach to vulnerability management

– Key pillars required for a modern software management strategy to work

Ransomware is “the most immediate cyber threat” faced by UK businesses, according to NCSC CEO Lindy Cameron. The threat has already been demonstrated across the globe, with ransomware attacks such as the US’s Colonial Pipeline hack and the UK attack on Hackney Borough Council showing the damage that can be done. But most businesses aren’t as prepared as they need to be.

This session will cover:

• How big is the threat from ransomware to UK organisations?
• Examples of recent ransomware attacks and the damage caused
• Who is most likely to be affected by ransomware and why
• How incident response and the ability to test defences are key
• Increasingly sophisticated methods: Ransomware-as-a-service and multi-extortion attacks
• Paying the ransom—and how to avoid this

DDoS attacks are getting bigger. Microsoft reports it mitigated an attack on an Azure customer that came in at 2.4Tbps in 2021, beating the peak traffic volume of a 2.3Tbps attack that hit Amazon Webservices in 2020.

As DDoS attacks surge in scale and number, this talk will look at:

• The size and scale of DDoS: Examples of attacks
• Why attackers use DDoS
• The risk of DDoS to businesses: Who will be targeted and what’s the impact?
• Prevention and mitigation: How to prevent DDoS and mitigate attacks if they do happen

Mass-scale migration to the cloud has surged as organizations embrace more flexible working patterns. This rapid transformation brings new security challenges as IT teams grapple with unfamiliar and complex technologies. Achieving visibility and control across third-party environments can be difficult, while attackers continue to find creative ways to scale their attacks and bypass common tools. Join Dr Beverly McCann, Principal Analyst Consultant at Darktrace, as she discusses the challenges of securing the cloud and SaaS applications, and why organizations are turning to Self-Learning AI technology that learns its unique surroundings in order to stop cyber-attacks in their tracks. Includes real-world examples of attacks detected and stopped by this technology.

Please visit our exhibition area and network with our sponsors

The threat from Russia has never gone away, but it is growing. According to Microsoft’s Digital Defense report, the majority of state-sponsored attacks over the past year were performed by Russia. The SolarWinds attackers dominated threat activity, according to Microsoft data.

This session will look at:

• The Russia threat: A historical look at the nation and how the cyber threat evolved
• Examples of recent hacks and a breakdown of the SolarWinds attack
• Russia’s aims: What does Russia want from the West and why does it target organisations?
• Which industries are most likely to be targeted by Russia?
• Indicators of compromise: Russia’s tactics, techniques and procedures
• What firms can do to protect against and mitigate Russia-backed cyber attacks

As the workforce returns to the office, BYOD needs a complete overhaul. So much so that the NCSC has released updated guidance to help firms deploy and manage a “potentially difficult IT set-up” post-pandemic.

This session will cover:

• Why pandemic “quick fix” BYOD strategies are not fit for purpose
• How attackers take advantage of vulnerabilities and misconfigurations in devices and networks
• Creating a BYOD policy that works for the current office/working from home environment

Supply chain threats aren’t dying down, making it integral that organisations are able to protect themselves.

This session will examine:

• Examples of supply chain attacks and how these took advantage of vulnerabilities
• Who is the most likely to fall victim to a supply chain attack
• How to protect the supply chain: The importance of baking security into contracts
• How to ensure your own foundational security is good enough to avoid being the “weakest link in the chain”

The UK government’s new National Cyber Force (NCF) will be located in Samlesbury in the North-West, drawing together personnel from GCHQ, the MoD, MI6 and the Defence Science and Technology Laboratory (DSTL), under one unified command for the first time.

This session will look at:

• What is the NCF and what will it do?
• Why offensive cyber capabilities are key in today’s threat landscape
• The types of technologies being used by the NCF
• The NCF’s roadmap and how the organisation will keep the UK secure

Tune in to find out how to locate all the missing information you have on your customers without having to manually cross-check numerous documents or rely on employee knowledge.

The webinar will cover:

  • How to achieve zero degrees of separation and link all customer information together
  • How you can make better business decisions by identifying knowledge gaps and plugging holes
  • How flexible asset tracking will instantly enable improved efficiency

The session will guide you through the following features:

  • Relationship Mapping
  • Completion Profile
  • Flexible Assets / Asset Tracking

Please visit our exhibition area and network with our sponsors

Manchester is a well-established cyber security hub. GCHQ is now also in Manchester, and the area boasts digital security companies including Avecto, Hedgehog, NCC Group and Secarma, as well as established cyber divisions of global defence companies such as Raytheon, BAE Systems AI and Northrop Grumman.
This session will examine the thriving cyber security scene in Manchester including the Cyber Innovation Centre – an £10m programme to facilitate the growth of cyber security businesses in the region. It will also take an inside look at the GM Cyber Foundry – a £6m ERDF funded initiative, which four north west universities are collaborating on, to be run out of the Cyber Innovation Centre with the aim of encouraging engagement between a range of businesses on cyber innovation research.

0
% Client Re-Book Rate 2021
0
Years Running Cyber Events
0
Subscribers To Date

Confirmed Speakers

Sponsors

All Events

transparent

The Future of Cyber Security

17 FEBRUARY 2022

transparent

The Future of Cyber Security

27 JANUARY 2022

transparent

The Future of Cyber Security

3 March 2022

transparent

The Future of Cyber Security

17 March 2022

transparent

The Future of Cyber Security

September

transparent

The Future of Cyber Security

November

Community Area

Books

Home Workouts

Recipe

spaghetti Bolognese
Days
Hours
Minutes
Seconds