November 15-17, 2016
London, England

Day 3

8:00 am - 9:45 am Networking Breakfast

9:00 am - 9:05 am Chairperson Opening Remarks

9:05 am - 9:50 am Panel: Transforming Approaches to the Advanced Threats Landscape

Anthony Smyth - Senior SE EMEA, Agari

From highly sophisticated cyber attacks to creative social engineering, the threat landscape evolves yet stays the same. This session will explore the evolution of advanced persistent threats and possible changes needed for security programs. The panel will discuss what threats organizations are seeing and what they are doing about it. Including how can next-generation security solutions address the growing challenge of identity deception, use of social engineering and loss of trust, where human training fails due to sophistication of cyber attacks.

In this interactive panel:
• Determining what data is being stolen and how it is being used
• Better informing threat intelligence and real-time defence with evolving threat player
• Challenge/impact of identity deception and loss of trust in business due to cyber fraud/attacks

Speaker: Anthony Smyth,  Senior SE, EMEA, Agari
Speaker: Wayne Routley,  CISO/ Group Security Architect, Lloyds Register
Speaker: David Carvalho, Group CISO, OCS Group
Speaker: Ramon Soler, CISO, Almirall
Moderator: John Popolizio, CSO, New York Life


img

Anthony Smyth

Senior SE EMEA
Agari

9:55 am - 10:25 am Business Meetings


10:25 am - 10:55 am Business Meetings

11:05 am - 11:35 am Business Meetings

All of the round tables will occur at the same time and each will be led by a security expert. Choose the round table topic of most interest and join the discussion. You will have the opportunity to switch to another round table, for two 30 minute sessions.

A. Effective security in the world of empowered users, cloud, mobile and BYOD– Speaker: Henry Seddon, VP EMEA, Duo Security



img

Henry Seddon

VP, EMEA
Duo Security

11:40 am - 12:40 pm Round Table B

All of the round tables will occur at the same time and each will be led by a security expert. Choose the round table topic of most interest and join the discussion. You will have the opportunity to switch to another round table, for two 30 minute sessions.

B.Ransomware- An Educated Response – Speaker: David Parkin, EMEA Sales Director, KnowBe4



12:45 pm - 1:50 pm Networking Lunch

The end user is often considered the weakest link in the security chain.   The User Awareness Project is a staff outreach initiative, which was created after a structured penetration test revealed the need for greater cyber awareness.
The program’s goal is to create a global community of staff from across the organization whose focus is to help raise awareness about information threats and to encourage and demonstrate information protection best practices.  The multi-lingual online program is suitable for all levels of users. In this session, discuss what is and is not working in user awareness program.
 

Big enterprises are witnessing major digital transformation in terms of upgrade and enhancements of IT & OT landscapes. Likewise securing the transformation journey across both these environments is witnessing unprecedented paradigm shifts in terms of the they were secured in the past and the way future demands. Newer domains like IOT, IT & OT amalgamations calls about for altogether new approach of securing these two domains and ensure enterprise leaps towards their business goals.

This session will cover how IT & OT security were dealt in the past, what all challenges the world has been recently in terms of threats, exploits and how big enterprises can deal with securing them going forward wherein the thin line between them is diminishing.

img

Dharmesh Rathod

CISO
Adani Group

2:35 pm - 3:05 pm Business Meetings

3:05 pm - 3:35 pm Business Meetings

3:40 pm - 4:00 pm The Bad Guys are Winning Outside the Firewall

Terry Bishop - Solutions Architect, RiskIQ EMEA

Enterprises are continuously growing their digital footprint, which is comprised of IT assets that reside outside the corporate network and include websites, mobile apps and social network properties. Attackers have noticed. Instead of direct attacks on heavily protected networks, they look for elements of the digital footprint that are easier to breach; unknown or forgotten web sites, internal servers mistakenly exposed to the public internet and servers running back level infrastructure with known vulnerabilities.
In response, security teams need to develop an effective external threat management programme as a core component of their overall security capability. This session will explore the issues surround public facing digital assets and how they can be addressed.


img

Terry Bishop

Solutions Architect
RiskIQ EMEA

This session will discuss trends in the current cybersecurity landscape. Look at current threats, recent attacks and vulnerabilities as well as how enterprises are responding. The dialogue will encompass emerging threats, as well as information on mitigating controls, security architecture and incident response plans. The balancing act between emerging technology, ease of use and the need for security will be discussed.
Impact of emerging technology on how we use and develop cyber security plans
Evaluating the who, why, what and how of being targeted
Navigating the human side of cyber security from Board Room communications to user awareness training

4:05 pm - 4:50 pm Workshop- Impact of Identity Deception and Loss of Trust Due to Cyber Attacks

5:00 pm - 5:05 pm Chairperson's Closing Remarks