Menu Close
jan_2021_header new

Programme Day 1

  • ·     The growing risks and costs of cybercrime to businesses
  • ·     The importance of cyber skills and strategies
  • ·     The threats to businesses and how to overcome them
  • ·     The latest tools and technologies to fight cyber-attacks

Today Intelligence is key to fighting in Cyber Warfare. This must also be balanced with understanding the risks and how they are evolving. In this presentation we look at the changing landscape and where the major changes are evolving from. We also attempt to understand the cyber-criminal organisations and their motivations and drivers. Then finally looking at the evolution of solutions and their ability to communicate and share this intelligence.

While the world has been adjusting to the ever-shifting new-normal, IT teams and security professionals have been diligently working in the background to make remote working a possibility for millions across the globe. Cybercriminals have taken every advantage of the situation to play on the emotions and insecurities we all share, and leverage new systems, processes and technologies rapidly thrust upon the workforce. In this session Censornet CTO Richard Walters will share some of the findings from Censornet’s 2020 industry survey and explore the three key themes dominating cyber security:

  • Remote Working Culture
  • Embracing Cloud Services
  • Advanced Email Threats

Join us to discover the extent of risky employee behaviour we uncovered, the dangers associated with large scale cloud adoption and why email remains an enduring threat. We will leave you with practical advice on how to drive positive change and solve some of the most relevant security challenges of today with the latest innovative cyber security.

Please take time to visit our sponsors, and interact live with speakers and staff members within their booths.

The Covid-19 pandemic has driven enterprise adoption of mass remote working for their global workforces, from 30% before the pandemic to 81% today. Seventy-four percent plan to enable large-scale remote working permanently.  However, many organisations overlooked critical aspects of security in the race to enable remote working, which significantly increased their exposure to cyber-attacks.


Join Noa Zilberman,  Product Manager and former co-founder and CPO of Odo Security, acquired by Check Point and Eytan Segal, Head of Product Management, SASE and learn how Check Point’s acquisition of Odo Security, a clientless SASE technology, will provide your employees, partners, DevOps and admins with secure remote connectivity anytime, anywhere to any resource.

Join this talk to learn how to:

  • Secure access for diverse roles including users, admins, DevOps and third parties
  • Eliminate network-layer risks with granular application-specific policies
  • Deploy clientless ZTNA-as-a-service within minutes from the cloud

Today’s enterprise is truly borderless. The network perimeter is dissolving with digital transformations like SD-WAN, IoT, and hybrid cloud, complicating traditional security approaches. Securing evolving IT architectures is becoming one more challenge that short-staffed security teams are facing today. What’s needed is a foundational approach that is simple yet pervasive, cost-effective yet powerful and boosts the efficiency of security operations through automation. Attending this event gives you exclusive access to security experts who will explain how to:
• Unleash the full power of your security stack
• Improve incident response times through extensive integrations
• Extend protection to support your digital transformations


Please take time to visit our sponsors, and interact live with speakers and staff members within their booths.

Adoption of the cloud is rapidly accelerating, one estimate of spend on cloud in 2022 is $360bn, agility and ability for business to innovate and keep pace is the key driver of this. Businesses are at a variety of stages on their journey, from digital natives born and formed in the cloud to the majority of businesses who are at some point on the journey of moving from traditional infrastructure to cloud to support the evolution of their business and business models. Today we are going to discuss some of the many challenges and areas for consideration around managing cyber risk from traditional infrastructure and into managing this risk in the cloud.
What you will learn:
• How to mitigate common cyber risks and challenges of cloud migration
• Explosion of the edge and the impact of shifting to remote working
• The implications of the growing number of applications to enable workforces and support customers
• Recommendations on what to focus on given the pace of change as you migrate to the cloud

Does your career sometimes feel like a game of snakes & ladders? Are you wondering what your next move will be, or where it will take you?
In this session, Sarah Armstrong-Smith provides some insights on how to navigate the ups and downs, and build a career that delivers real impact and longevity.

Ransomware attacker tactics are constantly shifting – sometimes drastically – In this session Greg looks at the evolution of this prolific and damaging type of attack. He’ll share stories from the frontline, looking at how the criminals operate, their techniques and how you can lower your risk of becoming their next victim.

Learn about the evolving DDoS threat landscape from Cloudflare’s vantage point, as the product team shares Q4 2020 DDoS trends and observations. Omer Yoachimik, DDoS Product Manager at Cloudflare will showcase how Cloudflare is uniquely positioned to help protect you from DDoS attacks and cyber threats, helping businesses to manage the implications of the current crisis on their infrastructure.

Cryptoassets are a fast growing new asset class. In the UK over the past year cryptoasset holders have increased from 3.5% to 5.35%, or 1.5 million to 2.6 million people. With increasing popularity comes increasing threats and increasing vulnerabilities. A few recent incidents have given cryptoassets a less than perfect perception, but there is a lack of understanding of this asset class.

This short presentation aims to cut through the hype:

  • What exactly do we mean by cryptoassets?
  • The new approach to regulation
  • Threats and vulnerabilities
  • Criminal use of cryptoassets
  • Red flags
  • 2021 predictions

In the past few years, 64% of organizations’ ERP systems have been breached, according to a research study by IDC. Are you aware how attackers have breached and can break into unprotected customer SAP landscapes? Attend this session to gain insights into:

  • What attacks on your SAP systems look like
  • What security challenges exist in SAP environments (e.g. S/4HANA)
  • Moving to the cloud with confidence — how to address security in hybrid landscapes
  • Ways to protect your organization

Please take time to visit our sponsors, and interact live with speakers and staff members within their booths.

Discover the art and science behind deception, and why you may still fall for dirty tricks even after you understand how they work. From the slight-of-hand used by magicians, to the slight-of-tongue used for social engineering, we are all wired to deceive and to be deceived. See how threat actors use these techniques against your end-users and how security awareness training can help them spot deceptions before it’s too late. Join Perry Carpenter, KnowBe4’s Chief Strategy Officer, as he shows you how easily we can be deceived and how that relates to our understanding of social engineering scams that come our way.

During this intriguing session, Perry will share his insights and answers to these questions:
• Are we wired for deception?
• Why are some more susceptible to manipulation than others?
• How do hackers use these techniques to create scenarios to entrap your employees?
• How can you ethically leverage these techniques to bring about desired behavior change?

Public cloud providers like AWS, Azure, and GCP enable you to deliver new products and capabilities at breakneck speeds, but how do you balance speed to market against compliance mandates and risk – do you have to choose? Join Patrick Pushor, Technical Evangelist at Orca Security, for a fast-paced session as he takes you through best practices, and pitfalls to avoid in securing public cloud infrastructure. 6 risks hiding inside every public cloud estate How to get instant-on, workload-level visibility across 100% of your AWS, Azure, and GCP assets The power of addressing both the control plane and data plane at once Pros and cons of different cloud security tools: traditional agent-based tools and scanners, CWPP (cloud workload protection platforms), and CSPM (cloud security posture management).

From the NSA to Facebook, Original Internet Godfather Brett Johnson and Founding Member of Anonymous Mike Jones sit down for a unique discussion on the positive and negative aspects of living in a world where the only thing of value is information.

Enjoy a catch up with speakers, sponsors & peers and join our post-event entertainment with mind-reader Ashley Green! 

Ashley’s performances have been seen around the world. He has performed on American TV and is a member of The Magic Circle.  His strange intuitive ability enabled him to predict lottery draws, the 2018 World Cup and the fire at the Notre-Dame Cathedral. His style and persona is unlike anything you have experienced before. He has an incredible ability to connect with everyone he meets!

Programme Day 2

2020, a year in which the world is turned upside down. Digitisation is therefore essential for many organisations. Now-a-days we work a lot from home, but we just want to be able to access all the information and manage crucial infrastructure remotely. To ensure that only the right person has access to the right information, you need to have a solid Identity & Access Management solution. Do you already have such a solution? Or how can you improve your Identity & Access Management?

For over three years, Darktrace experts investigated whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and this challenge took analysing over one hundred of the world’s top threat analysts and complex machine learning algorithms. During this presentation, Darktrace’s Director of Threat Hunting, Max Heinemeyer, will outline the capabilities this world-first technology, the Cyber AI Analyst, and discuss how automated investigation and triage is helping to uplift and augment human teams across the globe. He will also demonstrate how an APT using a zero-day was caught weeks before public attribution using cyber AI analyst technology.

Please take time to visit our sponsors, and interact live with speakers and staff members within their booths.

For some time it has been recognised that an organisation cannot rely on its perimeter defences alone. Compromised accounts have become a major threat and point of entry. The perimeter has now moved down to the level of the user and the device. This is referred to as the BeyondCorp or zero trust model. In this session you’ll learn how you can secure access to the internet and protect the usage of cloud apps as part of your overall security landscape. Duo Security, is the leading provider of Trusted Access security and multi-factor authentication. Duo’s zero-trust security platform, Duo Beyond, enables organisations to provide trusted access to all of their critical applications – for any user, from anywhere, and with any device. Cisco Umbrella is a cloud security platform that provides the first line of defence against threats on the internet wherever users go. And because it’s built into the foundation of the internet and delivered from the cloud, Umbrella is the simplest security product to deploy and delivers powerful, effective protection.

When 90% of cyber-attacks start with the human user, and technical controls can never be 100%, you need your people to be the last line of defence. In this talk, ThinkCyber explore how an understanding of influence, persuasion and behavioural science theory can be applied to security awareness. You’ll hear how leading organisations are realising we can influence behaviours for good. Learn about the importance of timely cues to drive behaviours. Explore examples of how cognitive psychology, behavioural and social science can and are being used to guide user behaviour. This talk will offer real world examples and ways that all organisations can apply the theories to drive secure behaviour change.

Please take time to visit our sponsors, and interact live with speakers and staff members within their booths.

Leading Information Security in the 4th Industrial Revolution, now places new challenges on leaders within Information Security within all sectors.
Operating in a volatile, uncertain, complex and ambiguous world now requires enterprise leadership skills which start from leading self and evolves to coaching, managing and leading others.
This comes at a price however, with 88% of CISO’s experiencing moderate or tremendous stress. This stress can occur following a security incident, perception of little progress in delivery of security improvements or failure to influence culture change, amongst many other reasons.

With businesses now seeking efficiencies within their operations and the reported lack of skills within the industry we now find ourselves in a position where we have to become talent catalysts in order to break the cycle, empower others whilst empowering ourselves with the skills required to lead within an environment which is constantly evolving.
This presentation will showcase tools & techniques which leaders can adopt to thrive while driving a culture of continuous maturity improvement as we evolve from a back room function to one of the key functions within the core of the enterprise.

Many organziations struggle with digital transformation and cloud computing particularly when implementing a framework to meet their compliance requirements. In this session, we will discuss a framework and operational approach to support you to move your business forward delivering quality services balancing cost and risk.

This talk will use our experience as penetration testers and a case study to analyse the kill chain used by malicious threat actors when targeting an
organisation. Attendees of this talk will understand the process used by hackers to target, exploit, and retrieve assets.

Everyone knows Active Directory! It is a seasoned and known IAM, not to mention that nearly every organization in the world uses it. This being said, there are also many built-in configurations and processes that “just work” without the need for any manual configurations, that many administrators are not aware they are there. Unfortunately, the attacker does and leverages misconfigurations to move laterally and gain privileges. In this webinar, 16X MVP Derek Melber will guide you through the most common settings that attackers know about, but most AD administrators don’t. You will have a full list of items to verify and fix when you are done with this webinar! In this webinar you will learn:

  • How an attacker can leverage the SDProp process
  • Which service account configurations attackers look for
  • How an old Unix attribute can cause an immediate privilege elevation
  • How a migration related attribute can allow domain admin privileges
  • What details you need to verify for your trusts

Despite the technological advancements to combat cybercrimes, we continue to witness more and more sophisticated cyber breaches. Investigations of many major cybercrime incidents show that most cases are down to an employee error. Indeed, the majority of cybercrimes in the workplace can be prevented if employees develop basic cyber hygiene. In this talk, Prof Benkhelifa emphasises the human factor in cybercrimes, and the importance of considering a more holistic approach to cybersecurity involving technology, processes and people. He will show how some UK cybersecurity initiatives have failed or are failing to address this challenge, and how this links to deficiencies in the actual UK national cybersecurity strategy. He will also argue for the need of an interdisciplinary approach to achieve positive behavioural changes towards cyber safety in the workplace. Finally, he will introduce you to the Cyber Champion in the Workplace Initiative, which he is currently working on in partnership with Staffordshire Police and shed some light on future directions.

It is no secret that the easiest way into an organisation is not by cracking its technology, it is by cracking its people. Social engineering can take multiple forms and be delivered multiple ways but remains to this day mostly about email and phishing. Cybercriminals commonly marry email-borne threats with web sites to steal login credentials, deliver malware, grab intellectual property, or just loiter for reasons to be determined. And the rushed move to work from home last March with the pandemic has not made the security job any easier. Join Matthew Gardiner, Principal Security Strategist in this session where he will review some of the most common attack techniques and will provide some ideas for improving defences against them.

Please take time to visit our sponsors, and interact live with speakers and staff members within their booths.

One of the biggest challenges organisations face today is the inability to detect and mitigate cyberattacks at scale. Adversaries are constantly improving their techniques and evading defences, leaving security teams scratching their heads. In this talk, Nour Fateen, presales manager for UKI & META at Recorded Future, will demonstrate how access to security intelligence empowers organisations to learn about these attacks proactively and take action, before they have the chance to cause real damage.

Threat Intelligence is normally used to enrich the process of security assessment, providing proof on the enforcement of security controls required to be secure and compliant. As threat intelligence technology evolves, they have become more instrumental to security audit, providing valuable context to the process. During this session we will explore examples based on real world data where contextual threat intelligence can be applied directly to data security requirements to prioritize the assessment process and accelerate the measure to risk.
During the presentation, you will learn the following:

  • What Cyber Threat Intelligence (CTI) is and why is it important for cybersecurity
  • How to use CTI to prioritize system security gaps and enhance security posture.
  • How to examine your Digital Footprint in order to help predict targeted threat patterns.
  • Understanding of how to use CTI findings to accelerating risk assessment.

Enjoy a catch up with speakers, sponsors & peers and join our post-event entertainment with mind-reader Ashley Green! 

Ashley’s performances have been seen around the world. He has performed on American TV and is a member of The Magic Circle.  His strange intuitive ability enabled him to predict lottery draws, the 2018 World Cup and the fire at the Notre-Dame Cathedral. His style and persona is unlike anything you have experienced before. He has an incredible ability to connect with everyone he meets!

Delegates booked so far


Community Area


Home Workouts


spaghetti Bolognese