Menu Close
webheader_virtual_1920px_18_aug

Programme

  • ·     The growing risks and costs of cybercrime to businesses
  • ·     The importance of cyber skills and strategies
  • ·     The threats to businesses and how to overcome them
  • ·     The latest tools and technologies to fight cyber-attacks

The mystery behind the terms “AI” and “Machine Learning” to look at some key questions:
• Just how advanced are we with Artificial Intelligence?
• Some common misconceptions about AI
• Research around Machine Learning and how to break it
• How Machine Learning could be weaponised against us
• The role that humans still have to play in the Detection and Response lifecycle
 
AI and Machine Learning are not “magic”.  This talk is designed to look behind the curtain and give you the insight you need to make more informed decisions as AI and ML become more commonplace in the cyber security industry.

Lights Out: How Hackers Target Critical Infrastructure

Cyber crime has surged up the news agenda and now presents a very real risk to our critical services: hospitals, political processes and the energy networks have all become targets.

Investigative journalist Geoff White has spent years researching the shadowy nexus of criminal hackers, state-sponsored cyber attackers and hacktivists movements behind this evolving threat.

In this talk he will discuss real-world examples of attacks on critical national infrastructure, and what they tell us about the increasing convergence of tactics, tools and psychology among previously disparate cyber threat groups.

Please take time to visit our sponsors, and interact live with speakers and staff members within their booth.

The cost of an attack is rising. According to Accenture and the Ponemon Institute, the average cost of a cyber-attack is now $13 million.

    

  • The costs of attack, both financial and reputational
  • What types of attacks are most common in 2019?
  • Examples of high-profile attacks: big hacks and exposed data
  • Is it possible to prevent an attack?
  • The basic security measures that every business must have in place
  • Why the board room must include security in overall business strategy 
  • Developing methods of monitoring the network for attack

Please take time to visit our sponsors and network in our lounge.


Industry 4.0 is a massive digital transformation of manufacturing, supply chains and their relationships to product engineering processes and customers. While the economic benefits of this Industrial Digital Revolution are massive, so are the potential Cybersecurity threats. The first main vulnerability drivers will be access security to the industrial equipment and the interaction between OT & IT and Industrial applications. The presentation will cover a new way to approach industrial cybersecurity with 3 easy steps to reduce these vulnerabilities.

Key takeaways:
– Learn about the cybersecurity challenges of Industrial IoT
– Learn why and how to apply to principle of ZERO TRUST with technologies such as EPM and PAM to secure industrial environments
– Benefit from real use cases and industrial cybersecurity best practices

The most valuable IT assets in your organization are identities and the most vulnerable identities have privileged access.
Traditional approaches to privileged access management (PAM) focus on the account, vaulting the password, changing the password and recording who does what with the account. Often these controls to mitigate risk will introduce friction to agile automation and devops exercises, while creating a burden on operational costs.
In this webinar One Identity will talk about some of the trends that are driving the future of privileged access management and things to consider in your PAM strategy for increasing value from existing digital investment, mitigating risk from privileges in motion and removing friction from introducing next generation privilege management controls.

Security experts already know that the weakest link is the business’ employees. But hackers are also realising this and are constantly finding more innovative ways to attack. This session will cover:

  • The rise of spear phishing and social engineering
  • Examples of data breaches that started this way
  • Educating employees: why real life scenarios help
  • Managing access to data
  • Password security: An essential factor that firms often get wrong

The insider threat: When employees go rogue

 

Famous for the WannaCry attack that hit the NHS, ransomware continues to target businesses and the public sector. The effect can be catastrophic: In the US a number of local governments were forced offline because of this malware. Meanwhile aluminium producer Norsk Hydro was forced to switch to manual operations after being hit with ransomware.

This session will cover:

  • Why the malicious software is a particularly big threat – and who is at risk
  • Why if the ransom is paid, there’s no guarantee that information will be released
  • How to regularly back up data to avoid ransomware having an impact and other strategies
  • Paying out: should you ever pay the ransom?

According to the government, 14 billion objects are connected to the internet and by 2020, it could be as many as 100 billion worldwide.

  • How you might be using IoT but not know it
  • Data privacy: coping with the information created by IoT
  • Security by design: Is the UK government’s IoT strategy having an impact?
  • An IoT security strategy
  • 2020 predictions

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about:

  • Paradigm shifts in the cyber landscape
  • Advancements in offensive AI attack techniques
  • The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
  • Real-world examples of emerging threats that were stopped with Cyber Al

Enjoy a catch up with speakers, sponsors & peers and join our after party and DJ Set.

Days
Hours
Minutes
Seconds
0
Delegates booked so far

Sponsors

Community Area

Books

Home Workouts

Recipe

spaghetti Bolognese
Days
Hours
Minutes
Seconds