9 - 10 OCTOBER 2019 / EXCEL LONDON
Register Interest
IP EXPOCyber SecurityDeveloperAI and AnalyticsIoTBlockchain

Seminars

Here is a list of all confirmed Seminars for 2018.

All |  Date:
3rd October
4th October 
Select a speaking company
Cyber Security Keynote 15
  • Wed 3rd Oct 11:00 - 11:30
  • Unbelievable tales of cyber attack Graham Cluley  |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 11:00 to 11:30

    Unbelievable tales of cyber attack

    Every day we read headlines of data breaches, hacks, and malware attacks. Often they're identikit newspaper stories where you could easily just change the names of the companies involved and the number of customer records they have had stolen from them.

    But every now and then something extraordinary happens. Like the companies who pretended to be hacked when they hadn't, or the attackers who went to extraordinary lengths to steal millions from their employers.

    In this presentation, computer security veteran Graham Cluley shares some unbelievable tales of cyber attack.

    Speaker

    Photo Speaker Name Profile
    Graham Cluley Graham Cluley View Profile
  • Wed 3rd Oct 11:40 - 12:10
  • What Threat Intelligence Teaches Us About Application Security Ray Pompon  |   F5 Labs  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 11:40 to 12:10

    What Threat Intelligence Teaches Us About Application Security

    Explore in-depth threat intelligence on how web applications are attacked. F5 Labs has spent the past year analyzing and combining data on web attacks from a variety of sources and partners.F5 Labs has looked at a year of data from WhiteHat Security, a 18 months of alerts from tens of thousands of honeypots, a decade of canned attack scripts from ExploitDB, hundreds of public breach records, DDoS attack trends from F5 as well as a global survey of thousands of security professionals. We’ll also explore newly discovered new attacks that could cripple the critical infrastructure of our first responders.

    Speaker

    Photo Speaker Name Profile
    Ray Pompon Ray Pompon View Profile
  • Wed 3rd Oct 12:20 - 12:50
  • The New Mafia: cyber gangs, vigilantes and what it means for businesses Helge Husemann  |   Malwarebytes   |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 12:20 to 12:50

    The New Mafia: cyber gangs, vigilantes and what it means for businesses

    Cybercriminals are the New Mafia of today’s world. Though care is taken to shroud their operations, their sophistication, execution, and malice are aligned with those historically practised by criminal organisations.

    Recent research underscored that one in 13 UK cyber professionals are perceived by their peers to be grey hats – New Mafia representatives ‘on the inside’. Companies find themselves fighting the good fight on multiple fronts.

    We must change the cybercrime narrative in order to shine a light into the darkest corners of the New Mafia's operations and show them for what they really are – miscreants. The fight back, he will argue, must begin today.

    Speaker

    Photo Speaker Name Profile
    Helge Husemann Helge Husemann View Profile
  • Wed 3rd Oct 13:00 - 13:30
  • Hacking a smart CCTV Camera Scott Helme  |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 13:00 to 13:30

    Hacking a smart CCTV Camera

    Scott and his team recently hacked a very popular smart camera. Targeted at homes and small businesses they could view the live, HD feed from anywhere in the world. It turned out that anyone else could too…

    Speaker

    Photo Speaker Name Profile
    Scott Helme Scott Helme View Profile
  • Wed 3rd Oct 13:40 - 14:10
  • Digital Transformation: Cure-all, Placebo or Poison Pill Patrick Grillo  |   Fortinet   |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 13:40 to 14:10

    Digital Transformation: Cure-all, Placebo or Poison Pill

    Are you really ready for Digital Transformation?  While the business benefits are clear, technology adoption, the escalating threat landscape and compliance to any number of standards and legal requirements are all challenges to any DX efforts. If your organization is moving into the Digital future, you need to make sure that your security infrastructure isn’t stuck in the past. This session will provide the insight towards a comprehensive and adaptive security architecture that can support your organization’s changing objectives and more importantly, evolve as the cyber threat challenge evolves as well.

    Speaker

    Photo Speaker Name Profile
    Patrick Grillo Patrick Grillo View Profile
  • Wed 3rd Oct 14:20 - 14:50
  • Leveraging AI for Dynamic & Surgical Autonomous Response for Cyber Defense Dave Palmer  |   Darktrace   |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 14:20 to 14:50

    Leveraging AI for Dynamic & Surgical Autonomous Response for Cyber Defense

    Proposing a new approach to cyber defence, which uses dynamic AI systems that can counter the activity of malicious threats. This new advanced AI technology can autonomously contain and monitor relevant threats, increasing confidence that a problem is emerging before automatically stopping the threat without interrupting normal business and employee activities.

    Speaker

    Photo Speaker Name Profile
    Dave Palmer Dave Palmer View Profile
  • Wed 3rd Oct 15:00 - 15:30
  • We take security seriously Javvad Malik   |   AlienVault  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 15:00 to 15:30

    We take security seriously

    "We take security seriously" four words that are so easy to say, but what does it mean in the real world?
    Are they just soothing words designed to pacify frustrated users in the aftermath of a breach? Or can these words mean something more?
    I spent months speaking to CISOs, security professionals and practitioners, as well as going undercover to speak to business owners which certainly rattled some cages.
    Thankfully, I dodged many bullets, all in the name of attempting to quantify the unquantifiable - what does it really mean to take security seriously?
    So, come along, find out what the professionals think, what the general landscape is, what steps businesses can take, and maybe a few hard-to-believe side stories.

    Speaker

    Photo Speaker Name Profile
    Javvad Malik Javvad Malik View Profile
  • Wed 3rd Oct 15:40 - 16:30
  • PANEL: Cyber Security - The Year Ahead Panel  |  Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 15:40 to 16:30

    Speakers

    Photo Speaker Name Profile
    David Atkinson David Atkinson View Profile
    Doug Howard Doug Howard View Profile
    Gary S. Miliefsky Gary S. Miliefsky View Profile
    Richard Kirk Richard Kirk View Profile
  • Thu 4th Oct 11:00 - 11:30
  • Lessons I learnt about Cybersecurity from my Dad Brian Honan   |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 11:00 to 11:30

    Lessons I learnt about Cybersecurity from my Dad

    At its heart many of the issues we face with cybersecurity relate to how users interact with the systems they use. Following a conversation with my father about how unsafe cars were when he was a young boy and how car safety has evolved over the subsequent decades, this talk will use that evolution of car safety to highlight how cybersecurity should evolve.

    Speaker

    Photo Speaker Name Profile
    Brian Honan Brian Honan View Profile
  • Thu 4th Oct 11:40 - 12:10
  • Zero Trust & The Flaming Sword of Justice Dave Lewis  |   Duo Security  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 11:40 to 12:10

    Zero Trust & The Flaming Sword of Justice

    Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues that are introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at front of mind defenders need to focus on proper network zone segmentation or, as it more popular term these days, zero trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter a stronger focus has to be placed on the strength of authentication, authorization and trust models for the users. 

    The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached it’s denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust but, verify.

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • Thu 4th Oct 12:20 - 12:50
  • Bot or human? Applying machine learning to combating the bot epidemic Laurent Gil   |   Oracle Dyn  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 12:20 to 12:50

    Bot or human? Applying machine learning to combating the bot epidemic

    Bots now make up over 50 percent of website traffic, and have become the primary source of malicious application attacks, from DDoS to sophisticated intrusions. In this session you'll learn what you need to know about bot traffic, different types of bots, and real-world applications of ML and AI to identify and defeat malicious bots.

    Speaker

    Photo Speaker Name Profile
    Laurent Gil Laurent Gil View Profile
  • Thu 4th Oct 13:00 - 13:30
  • Confessions of a Hacker – Under the Hoodie Samantha Humphries  |   Rapid7  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 13:00 to 13:30

    Confessions of a Hacker – Under the Hoodie

    In this revealing session discover the tools and techniques hackers use to defeat the expensive security safeguards used in many corporate environments today. Low tech and high tech methods will be presented in an effort to help attendees understand the true level of risk faced by their organizations and where the gaps may be in their defence perimeter.

    Speaker

    Photo Speaker Name Profile
    Samantha Humphries Samantha Humphries View Profile
  • Thu 4th Oct 13:40 - 14:10
  • Real cases of social engineering: hackers, competitors and insiders Lisa Forte  |   Red Goat Cyber Security LLP  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 13:40 to 14:10

    Real cases of social engineering: hackers, competitors and insiders

    Social engineering can range from a simple phishing email to a prolonged campaign to turn one of your employees into a malicious insider. Lisa will share some interesting cases she has worked on involving large organisations that have been attacked through social engineering by both malicious actors and competitors. She will detail how the process works, what to look out for when it comes to insider threats and how cyber organised crime groups are trading in fake social media profiles.

    Speaker

    Photo Speaker Name Profile
    Lisa Forte Lisa Forte View Profile
  • Thu 4th Oct 14:20 - 14:50
  • Harnessing the Law of Data Gravity – Cyber Defence for the Hybrid Cloud Siân John  |   Microsoft  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 14:20 to 14:50

    Harnessing the Law of Data Gravity – Cyber Defence for the Hybrid Cloud

    Digital transformation drives business critical workloads to the cloud, it’s also driving traditional cybersecurity operations managers a little nuts. Harnessing the law of data gravity is a promising path forward for cyber defence and response. This talk will propose a new model that replaces the old school SIEM enabling SOC teams to focus on intelligent automation and security decision making where context and integration from data gravity is most abundant. This session will outline how the law of data gravity can be applied to security and demonstrate some first steps toward a new SOC / cyber defence model for 2020 and beyond

    Speaker

    Photo Speaker Name Profile
    Siân John Siân John View Profile
  • Thu 4th Oct 15:00 - 15:30
  • Is your Board of Directors Cyber-Ready? Georgie Collins  |   Irwin Mitchell LLP  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 15:00 to 15:30

    Is your Board of Directors Cyber-Ready?

    A primary responsibility of every board of directors is to secure the future of the company.  The overwhelming number of cyber incidents has escalated the issue of cybersecurity to being on the shortlist of organisation’s risk portfolio and board’s crucial responsibilities.  Against a backdrop of increasing pressure from regulators and ongoing cyber-attacks, board directors have a critical role to play to ensure proper oversight of cyber risks for their companies. Directors need to understand and approach cybersecurity as an enterprise-wide risk management issue, not just an IT issue.

    Speaker

    Photo Speaker Name Profile
    Georgie Collins Georgie Collins View Profile
Top