Imago Techmedia Ltd is registered in England and Wales under Company No. 04865455. VAT No. GB 843 8456 01
Registered Office: Bedford House, Fulham Green, 69-79 Fulham High Street, London, SW6 3JW, United Kingdom
Business Address: Imago Techmedia, 2C Bedford House, Fulham Green, 69-79 Fulham High Street, London, SW6 3JW, United Kingdom
Imago Techmedia is a subsidiary of Clarion Events Limited
Protect. Detect. Mitigate.
Cyber Security X
SECURING THE DIGITAL ENTERPRISE
Cyber Security X at IP EXPO Europe offers invaluable security insight for both IT managers and security specialists. Hear from the experts how you can build stronger defences against cyber-attacks, and recover more quickly if your systems are breached.
Global Security Advocate
Dave has almost two decades of industry experience. He has extensive experience in IT operations and management. Currently, Dave is a Global Security Advocate for Duo Security. He is the founder of the security site Liquidmatrix Security Digest and co-host of the Liquidmatrix podcast. Dave writes a column for CSO Online and Forbes.
Vice President, Global Services
Graham Cluley is an award-winning security blogger, researcher, podcaster, and public speaker. He has been a well-known figure in the computer security industry since the early 1990s when he worked as a programmer, writing the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows.
Since then he has been employed in senior roles by companies such as Sophos and McAfee.
Graham Cluley has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats.
Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011.
Red Goat Cyber Security LLP
Lisa began her career working in anti-piracy intelligence off the coast of Somalia before moving into Counter-terrorism intelligence for a UK Government agency. Lisa researched the process of online radicalisation by terrorist groups. This included studying how social media algorithms could be exploited for radicalising British nationals as well as looking at the lengthy and risky social engineering process undertaken by terrorist recruiters.
Lisa then moved into one of the UK Police Cyber-Crime Units where she got to know the attackers’ mind sets and methodologies well. The unit dealt with serious cyber-crime cases working closely with international law enforcement agencies such as the FBI. Victim companies ranged from small to multi-national organisations and almost all the cases involved social engineering.
Lisa left in 2017 to start her own company, Red Goat Cyber Security LLP, with the goal of reflecting the techniques and methodologies actually being employed by hackers. They provide GCHQ certified social engineering awareness training for staff and wargaming cyber-attack exercises to help organisations prepare for an attack.
Lisa Forte frequently writes for business publications and appears as a guest on many business podcasts. Lisa is an experienced cybercrime keynote speaker having spoken in major conferences around the world.
Director of Threat Hunting
Max is a cyber security expert with over eight years’ experience in the field specializing in network monitoring and offensive security. At Darktrace, Max works with strategic customers to help them investigate and respond to threats as well as overseeing the cyber security analyst team in the Cambridge UK headquarters. Prior to his current role, Max led the Threat and Vulnerability Management department for Hewlett-Packard in Central Europe. He was a member of the German Chaos Computer Club, working as a white hat hacker in penetration testing and red teaming engagements. Max holds a MSc from the University of Duisburg-Essen and a BSc from the Cooperative State University Stuttgart in International Business Information Systems.
Director of Technology
Dave Palmer is the Director of Technology at Darktrace, overseeing the mathematics and engineering teams and project strategies. With over ten years of experience at the forefront of government intelligence operations, Palmer has worked across UK intelligence agencies GCHQ & MI5, where he delivered mission-critical infrastructure services, including the replacement and security of entire global networks, the development of operational internet capabilities and the management of critical disaster recovery incidents. He holds a first-class degree in Computer Science and Software Engineering from the University of Birmingham.
Welcome to Cyber Security X
As cyber criminals get organised, it can be a constant struggle to protect your brand, your customers, and your data. At Cyber Security X, we cover the top enterprise security solutions, from perimeter firewalls and anti-virus technologies, to threat intelligence solutions. Visit us to find out how you can close your security loopholes and stay safe.
In the new world of organised cybercrime and the dark net, it’s not a question of if you’ll be hacked, but when. At Cyber Security X, we bring you all the latest security solutions that can help you detect any untoward activity on your network in real time. That way, you can react faster to protect your assets and customers, and meet regulatory requirements for managing and reporting security breaches.
Cyber attacks are a fact of life for most organisations; it’s how you prepare yourself that counts. At Cyber Security X, we help you build an effective strategy for preventing cyber attacks, ensuring that they never put your critical systems or data at risk.
When it comes to mitigating cyber security risks, knowledge is power. At Cyber Security X, we showcase all the latest threat intelligence solutions that can help you identify untoward activity on your network, and predict future threats based on industry wide security trends and data.
Pen Test, White Hat, Ethical and Red Team are terms you will hear at Cyber Security X as we explore the state of the art in hacking, reverse engineering and social engineering techniques. Check out our Cyber Hack a showcase of how the bad guys will attack you – learn the very latest from the best in the world – lets pawn the bad guys!!
DevSecOps melds security into the DevOps function based on the concept that security is everyone’s responsibility so inserts security into everything we do - our jobs, tools, and processes. Get the most out of today’s advancements and distribute security decisions, tools, processes at speed and scale across your business.
Your Registration will grant you access to all co-located events, keynote speakers and seminar sessions.Register