Menu Close

Programme – BST Time Zone

2021_website_header_oct_w

Sarah Armstrong-Smith is Chief Security Advisor in Microsoft’s Cybersecurity Solutions Area. She principally works with customers across Europe to help them evolve their cybersecurity strategy to support digital transformation and cloud adoption, to build stronger defences against cyberattacks.  

Sarah has had a long and impactful career in business continuity, disaster recovery, data protection and privacy, and crisis management. This enables her to operate holistically to understand the cybersecurity landscape and how this can be proactively enabled to deliver effective resilience.

Sarah is passionate about empowering and supporting women in STEM, which has earned her the accolade of being named one of the most influential and inspiring women in UK Tech

In the race for digital success, cloud and cybersecurity are often positioned as keen adversaries – one battling to accelerate digital innovation, the other battling to control these agile environments.

Rather than the source of tension and mistrust, what if cloud could actually be an opportunity to transform security?

Join us as we discuss:

• How security and networking must adapt for cloud

• The opportunity cloud offers to transform security

• Strategies for avoiding silos and friction in the pursuit of agility

DDoS attacks have dominated the charts in terms of frequency, sophistication and geo-distribution over the past year. Ransom DDoS attacks — that, unlike ransomware attacks, do not even require the hacker to access an organization’s internal systems before it can be carried out — are also surging lately. While there are no signs of DDoS attacks going away anytime soon, how do organizations ensure that their Internet assets are protected against threats of any size or kind?

In this session, you’ll learn about:

• Key Q2 2021 DDoS attack trends

• Ransom DDoS threats — and what you can do if you are affected; and

• Steps organizations can take to make the impact of DDoS attacks a thing of the past.

 

At IKEA we have strong company culture and values. We work with togetherness, simplicity, finding new ways and taking and delegating responsibility, as some of our values. How does this reflect on our security culture and enable that we work with Security by Design? How do we bring the best in our people and enable complex digital projects to embrace the activities that needs to be done to ensure that our digital products are secure and compliant? Heidi will give some insights in how they work with the topic and what has been the success factors in their information security and data privacy journey to support the business during a digital transformation, and what are the focus areas and challenges right now.

Basically it boils down to taking responsible ownership over the risks, and it covers all co-workers: “If not me – who?”

Heidi has over 20 + years of experience and passion within information security and has worked both as a consultant as well as in global companies as Tetra Pak and currently at IKEA. She has been leading and implementing information security programs for the whole value chain, from the product design, industry, supply chain to customer meeting. Her special interest is to enable the business to simplify the ways of working, to create a risk aware security culture and most of all to bring people together and enable the talent to grow. She has extra passion for building new capabilities and at her free time she owns a music management company, where she enjoys to enable the bands to grow.

 

Securing your devices can be challenging, especially when some of your employees are working remotely. All endpoints, both on- and off-network, must be patched and secured on an ongoing basis.

Join us for a hands on presentation where we will provide live training on these critical processes:

• Performing a security assessment

• Setting up a secure VPN for remote workers to access applications

• Developing a Bring Your Own Device (BYOD) policy that specifies security requirements

• Automating software patch management and vulnerability management

Please take time to visit our sponsors, and interact live with speakers and staff members within their booth.

Everyone is moving to the cloud, faster than planned. Most organizations have their sights on adopting a multi and/or hybrid cloud strategy this year. Yet, 75% of cloud security breaches are expected to result from inadequate management of identities, access, and privileges by 2023 [Gartner].

So how do you protect your growing multi cloud infrastructure? AWS alone currently offers some 258 services and involves 9,286 total permissions. Remote work is adding to identities and permissions explosion — increasing access risk. Securing and governing access is further compounded by the fact that each public cloud has its own way of managing permissions and privileges.

Join Ermetic’s Or Priel, VP Product Management, for a better understanding of managing identities, permissions and privileges in AWS and Azure. We will explore: AWS IAM roles and policies and Azure RBAC Strategies for enforcing least privilege with confidence Governing access and protecting sensitive resources Mitigating multi cloud risk using automation and analytics

When service techs and support personnel get the call to work on a client network, they need up-to-date information about the network environment — the kind of information gathered by the Network Detective Data Collectors. They also need ready access to the management plan, and all service notes including passwords, special procedures associated with the client, and links to related assets. This session will show you how to collect the data you need quickly and accurately.

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.

 

Enhance your knowledge and understanding of Dark Web protection and get to the top of the game with this presentation guide to human-proofing your dark web defences. Ensure every team member is ‘bought-in’ and able to defend themselves.

The presentation will cover:

• Identifying where team defences are weak and building a rectification plan

• How to manage group wide defence and training

• Why avoiding the “prairie dog effect” is critical to ultimate protection

 

Rachel Wilson spent the first 15 years of her career at the National Security Agency (NSA). Over the course of her NSA career, she held several key senior executive-level leadership positions.

Between 2008 and 2010, she ran NSA’s counterterrorism operations and led a global enterprise in detecting and disrupting terrorist plotting against the United States and its allies.

Between 2010 and 2012, Rachel served as NSA’s Chief of Operations in the UK working out of the US Embassy in London. In this role, she worked with UK intelligence services to counter terrorist and cyber threats to the 2012 Olympics.

Returning to the US in 2012, Rachel spent nearly five years leading NSA’s cyber exploitation operations within NSA’s Tailored Access Operations. In this capacity, she led the planning and execution of thousands of cyber exploitation operations against a wide array of foreign intelligence, military, and cyber targets and served as the committing official for many of NSA’s highest risk and most important intelligence-gathering activities.

In April of 2017, Rachel Wilson became the first Head of Cybersecurity for Morgan Stanley Wealth Management and Investment Technology. Rachel Wilson is a Managing Director and Head of Cybersecurity for Morgan Stanley Wealth Management. She is responsible for protecting the cybersecurity of Wealth Management, Investment Management and Prime Brokerage systems, and the integrity and confidentiality of Firm and client data. Additionally, Rachel advises the leadership of Wealth Management, Investment Management and Prime Brokerage on cybersecurity issues, including secure code development standards, secure network architecture, vendor relationships, advanced persistent threat (APT) detection and mobile security. She also leads field and client education and communication on cyber risk, threats and mitigations. She and her team drive innovation for new cybersecurity and authentication technology.

Rachel was recognized by Morgan Stanley Wealth Management as part of the 2019 MAKERS Class, a program that honours women who serve as ground breakers, innovators and advocates. She was also named one of the Top Women in WealthTech 2020 by ThinkAdvisor.

In her private capacity, Rachel advises individuals, corporations and institutions on cybersecurity best practices and strategies. She serves on the Advisory Board of WATSCO Inc (NYSE: WSO) and the CISO Advisory Board of Amgen Inc (NASDAQ: AMGN).

Rachel Wilson is a sought after speaker for technology, financial, and professional forums and has recently keynoted the Barron’s Top 100, the National Association of Plan Advisors (NAPA) 401k Annual summit, the Portfolio Management Institute (PMI) Annual Conference, the Association of Professional Investment Consultants (APIC) Annual Conference, and the National Association of Stock Plan Professionals Annual Conference. Rachel is a leading thinker on protecting children and teenagers from cyber threats and loves educating young people and their parents on how to be safe citizens on the internet. Rachel holds a BA from Wellesley College and an MA from the University of Chicago. Rachel and her husband live in New York City with their two children.

Many organizations struggle with digital transformation, hybrid workforces and cloud computing, particularly when implementing a framework to meet their compliance requirements. In this session, we will discuss a framework and operational approach to support you to move your business forward, while delivering quality services and balancing cost and risk. We will also talk about the approach to trusting a brand while applying a “Zero Trust Technical Architecture and Zero Trust Operating Model”

Mistakes are part and parcel of human nature but they don’t have to be costly and time draining. This session addresses the common issue of mistake rectification and shows MSPs how they can cover themselves against loss of information, time, revenue and reputation with IT Glue.

The webinar will cover:

  • Ensure compliance and access 30 days of documentation activity logs
  • Identify the exact cause of documentation mistakes
  • Rectify mistakes with deletion recovery and access to previous versions

Please take time to visit our sponsors, and interact live with speakers and staff members within their booth.

During this session, we will discuss:  o How to align business SLA’s to the recovery process o Prove to auditors and management that DR testing is taking place o How to leverage your DR infrastructure for test and development

No woman is ever going to tell you it’s going to be easy working in a male dominated industry especially as women are expected to prove their worth in ways that men are not. Nonetheless, building a successful career, whilst being happy and authentic, is entirely within your grasp. Having access to as many shortcuts as possible and being aware of the numerous perils that will line your path will make it easier. Join best-selling author, award-winning entrepreneur and 23-year cybersecurity veteran Jane Frankland to discover her top 10 insights for success along with the tripwires and boobie traps you need to look out for.

Key takeaways include:

  • Understanding the rules of business and how they differ for women.
  • Discovering the main challenges women in male dominated industries face and how to overcome them.
  • Gaining 10 insights that will empower you and enable you to advance as far and as fast as you want without having to become something you’re not – a man.
  • Recognising the tripwires and boobie traps that will stand in your way as you progress

Jane Frankland is an award-winning leader, best-selling author, speaker and women’s change agent. Having spent over 23-years in cybersecurity, she has become one of the most celebrated female influencers in the world and been named as a UNESCO trailblazing woman in tech. Having cut her teeth in tech by building her own global penetration testing company, she has also worked as an executive for some of the world’s most well-known consultancies whilst contributing to leading industry accreditations, schemes and forums. Believing the world will only be safer, happier and more prosperous with more women in male dominated industries, for the last 10-years, Jane has been scaling KnewStart, where, she follows her passion of positively influencing women and businesses who value them. Jane is well known as an awards judge, executive advisor, consultant, trainer, mentor, author and mother. She regularly shares her thought leadership in keynotes and the media, for example the BBC, The Guardian, The Times, The Financial Times and Forbes. Her Movement, which follows on from her best selling book, IN Security, has a community of over 1,000 members and in the past 2-years, Jane has enabled more than 205 women to receive her women’s scholarships. Jane is currently writing her third book, and has just launched her unifying women in security platform, The Source. You can find out more at https://jane-frankland.com

Days
Hours
Minutes
Seconds
0
Delegates booked so far

Sponsors

Community Area

Books

Home Workouts

Recipe

spaghetti Bolognese
Days
Hours
Minutes
Seconds