3 - 4 OCTOBER 2018 / EXCEL LONDON
Register Now
IP EXPOCyber SecurityDeveloperAI and AnalyticsIoTBlockchain

Protect. Detect. Mitigate.

Cyber Security X

Register now
Cyber Security X

SECURING THE DIGITAL ENTERPRISE

Cyber Security X at IP EXPO Europe offers invaluable security insight for both IT managers and security specialists. Hear from the experts how you can build stronger defences against cyber-attacks, and recover more quickly if your systems are breached.

2018 Speakers

Dave Lewis
Dave Lewis

Advisory CISO - Global

Duo Security

View Speaker

Dave Lewis

Dave has almost two decades of industry experience. He has extensive experience in IT operations and management. Currently, Dave is a Global Security Advocate for Duo Security. He is the founder of the security site Liquidmatrix Security Digest and co-host of the Liquidmatrix podcast. Dave writes a column for CSO Online and Forbes.

Siân John
Siân John

Chief Security Advisor EMEA

Microsoft

View Speaker

Siân John

Siân John MBE is Chief Security Advisor for EMEA in the Cybersecurity Solutions Group at Microsoft. Siân has worked in cyber security since 1997, and has worked at the Houses of Parliament, Ubizen and Symantec before joining Microsoft.

Siân leads the EMEA security advisors who work with Microsoft’s customers to help them to develop their cyber security strategy, security best practices and to understand how Microsoft’s technology and services can help support digital transformation and cloud services. Siân directly engages with Microsoft’s largest customers in the UK and Ireland.

She was awarded an MBE in the Queens New Years Honours List for 2018 for services to Cybersecurity. She holds the CiSSP, CISM, SABSA and CIPT certifications. Siân is Chair of both the techUK CyberSecurity Management committee and the Digital Economy Advisory Board for the UK Research Councils.

Graham Cluley
Graham Cluley

Security Analyst

View Speaker

Graham Cluley

Graham Cluley is an award-winning security blogger, researcher, podcaster, and public speaker. He has been a well-known figure in the computer security industry since the early 1990s when he worked as a programmer, writing the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows.

Since then he has been employed in senior roles by companies such as Sophos and McAfee.

Graham Cluley has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats.

Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011.

Lisa Forte
Lisa Forte

Partner

Red Goat Cyber Security LLP

View Speaker

Lisa Forte

Lisa began her career working in anti-piracy intelligence off the coast of Somalia before moving into Counter-terrorism intelligence for a UK Government agency.  Lisa researched the process of online radicalisation by terrorist groups. This included studying how social media algorithms could be exploited for radicalising British nationals as well as looking at the lengthy and risky social engineering process undertaken by terrorist recruiters.
 
Lisa then moved into one of the UK Police Cyber-Crime Units where she got to know the attackers’ mind sets and methodologies well.  The unit dealt with serious cyber-crime cases working closely with international law enforcement agencies such as the FBI. Victim companies ranged from small to multi-national organisations and almost all the cases involved social engineering.
 
Lisa left in 2017 to start her own company, Red Goat Cyber Security LLP, with the goal of reflecting the techniques and methodologies actually being employed by hackers. They provide GCHQ certified social engineering awareness training for staff and wargaming cyber-attack exercises to help organisations prepare for an attack.
 
Lisa Forte frequently writes for business publications and appears as a guest on many business podcasts.  Lisa is an experienced cybercrime keynote speaker having spoken in major conferences around the world.

Scott Helme
Scott Helme

Security Researcher

View Speaker

Scott Helme

Scott Helme is a hacker, researcher and builder of things. He founded https://securityheaders.com and https://report-uri.com. He’s also a Pluralsight author, BBC hacker in residence, award winning entrepreneur and snowboarder!

Brian Honan
Brian Honan

View Speaker

Brian Honan

Brian Honan is a recognised internationally as an expert on cybersecurity. He has acted as a special advisor to Europol's Cybercrime Centre (EC3), I founder of Ireland's first CERT, and sits on the advisory board for several innovative security companies. Brian is the author of several books and regularly contributes to various publications. For his contribution to the cybersecurity industry Brian has been awarded the "SC Magazine Information Security Person of the Year" and was also inducted into the Infosecurity Hall of Fame.

Welcome to Cyber Security X

  • Protection

    As cyber criminals get organised, it can be a constant struggle to protect your brand, your customers, and your data. At Cyber Security X, we cover the top enterprise security solutions, from perimeter firewalls and anti-virus technologies, to threat intelligence solutions. Visit us to find out how you can close your security loopholes and stay safe.

    Detection

    In the new world of organised cybercrime and the dark net, it’s not a question of if you’ll be hacked, but when. At Cyber Security X, we bring you all the latest security solutions that can help you detect any untoward activity on your network in real time. That way, you can react faster to protect your assets and customers, and meet regulatory requirements for managing and reporting security breaches.

    Mitigation

    Cyber attacks are a fact of life for most organisations; it’s how you prepare yourself that counts. At Cyber Security X, we help you build an effective strategy for preventing cyber attacks, ensuring that they never put your critical systems or data at risk.

    Intelligence

    When it comes to mitigating cyber security risks, knowledge is power. At Cyber Security X, we showcase all the latest threat intelligence solutions that can help you identify untoward activity on your network, and predict future threats based on industry wide security trends and data.

    Hacking

    Pen Test, White Hat, Ethical and Red Team are terms you will hear at Cyber Security X as we explore the state of the art in hacking, reverse engineering and social engineering techniques. Check out our Cyber Hack a showcase of how the bad guys will attack you – learn the very latest from the best in the world – lets pawn the bad guys!!

    DevSecOps

    DevSecOps melds security into the DevOps function based on the concept that security is everyone’s responsibility so inserts security into everything we do - our jobs, tools, and processes. Get the most out of today’s advancements and distribute security decisions, tools, processes at speed and scale across your business.

Register Today

Your Registration will grant you access to all co-located events, keynote speakers and seminar sessions.

Register
Top