ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity & Fraud Summit: London

October 20, 2020

Register Now

WELCOME / Summit Overview

With enterprises globally now supporting a 100% remote workforce and customer base, global organizations may be forever changed. Even the most forward-looking organizations face added risk in these extraordinary times. Layers of security are rendered useless if your new remote workforce, or vulnerabilities in their devices and networks, inadvertently give permission for threat actors to access your data.

Join ISMG’s network of local experts at our virtual summit to learn how to best adapt and balance productivity, accessibility and security. Registration is complimentary and CPE Credits will be available.

Details

Free Registration

20th October, 2020

Register Now

Registering For a Group?
Call + 1 (609)-356-1499

  • Event Gallery

Christopher Greany

Group Chief Security Office, Barclay’s

Polly Ralph

Barrister and Solicitor, UK Data Protection Strategy, Legal and Compliance Services, PwC

Michael Theis

Chief Engineer & Assistant Director for Research, National Insider Threat Center, CERT/SEI, Carnegie Mellon University

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe

Tom Field

SVP - Editorial, ISMG

Jeremy King

International Director, PCI Security Standards Council

Rafael Narezzi

CIO | MSc CyberSecurity, Computer Forensics and Counterterrorism

Prashant Pillai

Professor of Cyber Security / Director of Wolverhampton Cyber Research Institute at University of Wolverhampton

SPEAKERS / Featured London Speakers

Bobby Ford

VP, Global CISO, Unilever

Andy Bates

Executive Director, Global Cyber Alliance

Jeremy King

International Director, PCI Security Standards Council

Randy Trzeciak

Director, CERT Insider Threat Center, CMU

Jonathan Armstrong

Partner, Cordery

Mark Walmsley

CISO, Freshfields Law Firm

Mark Singer

Cyber and Tech E&O Claims Manager, Beazley

Ameya Talwalkar

Co-Founder and Chief Product Officer, Cequence Security

Chris Thomas

Managing Director EMEA, Emailage

Tom Smith

Solutions Architect, Veracode

Andrew Rose

Resident CISO - EMEA, Proofpoint

Fredrik Forslund

Vice President, Enterprise & Cloud Erasure Solutions, Blancco

Andrew Barnard

Senior Sales Engineer, Shape Security

Chris Goettl

Director of Product Management, Ivanti

Marika Dziuba

Technical Solution Specialist - EMEA, Intel

Jeff Kilford

UK Client Compute Group Director, Intel

Scott McAvoy

Cloud Security Competency Lead, IBM

Lee Harris

MSSP & Cloud Pak for Security Sales Leader, IBM EMEA

Sam Humphries

Security Strategist, Exabeam

Jasbir Singh Solanki

CEO - Homeland & Cyber Security, Mahindra Defence Systems Limited

Shelton Newsham

Cyber Protect Lead and Cyber Prevent Lead Regional Cyber Crime Unit

Simon Jackson

Director Systems Engineering, A10 Networks Inc

Kadir Levent

Chief Operating Officer, CyberClan,

Ed Lewis

Partner, Weightmans,

Winston Krone

Global Managing Director, Kivu,

Becky Pinkard

CISO, Aldermore Bank PLC

Andrew McGuigan

Security Engineer Manager, Global Accounts, Check Point Software Technologies

Nic Miller

Virtual CISO, Aedile Consulting

Call for Speakers is Now Open!

Interested in addressing ISMG’s global audience of cybersecurity, information security, fraud, risk and compliance professionals?

Click here to learn more!

Agenda / Session Times in BST



  • Tuesday, October 20th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
9:00 am -
9:30 am
9:00 am - 9:30 am

Registration & Exhibit Browsing

9:30 am -
10:00 am
9:30 am - 10:00 am

2021: The CISO's Odyssey

Speaker:
Bobby Ford, VP, Global CISO, Unilever

As global CISO of one of the world's oldest and largest consumer goods enterprises, Bobby Ford sees not only the accelerated journey cybersecurity leaders have experienced in 2020, but also where the trip may be headed in 2021. In this exclusive keynote interview, Ford discusses the challenges of the current year and the promise of the new one, with emphasis on:
  • The CISO's shift from security to business risk management
  • The challenge of prioritizing multiple needs with limited resources
  • How to rationalize the technology stack
10:00 am -
10:30 am
10:00 am - 10:30 am Track A

Payment Card Security: "The Year the Earth Stood Still"

Speaker:
Jeremy King, International Director, PCI Security Standards Council

Referencing a classic science fiction film, Jeremy King of the PCI Security Standards Council calls 2020 "The year the Earth stood still." And in this session, he details exactly what that means, with a look at:
  • The payment card security challenges created by quarantine;
  • New PCI SSC guidance for connectivity, malware and device security
  • Updates of two important PCI SSC standards - the Software security framework and the PCI DSS V4.0.
10:00 am - 10:30 am Track B

Is Ransomware Winning?

Speaker:
Chris Goettl, Director of Product Management, Ivanti

Ransomware is a prevalent cybersecurity threat. Threat actors are constantly changing tactics looking for new ways to force ransom payments. With each new emerging ransomware threat family, the size and scope of threats are more aggressive too. This has led to incredible increases in the average ransoms paid over the past eighteen months. In this session, we will look at recent ransomware trends, the critical changes to threat actor behaviors, and discuss the strategies and technologies organizations need to defend themselves against this evolving threat.
10:30 am -
11:00 am
10:30 am - 11:00 am Track A

2021: The Challenges and Opportunities

Speakers:
Andrew McGuigan, Security Engineer Manager, Global Accounts, Check Point Software Technologies
Becky Pinkard, CISO, Aldermore Bank PLC
Nic Miller, Virtual CISO, Aedile Consulting

2020 saw major challenges for the world, not least for the cybersecurity industry. So as organizations and societies recover from pandemic-battling postures, what strategic adjustments and controls must CISOs employ as we enter 2021, particularly at a time when resources may be limited and uncertainty looms? Join this exclusive panel for unique insight into:
  • Lessons learnt in 2020 and how these will impact 2021;
  • Challenges for 2021 and how to prepare for them;
  • Strategizing and budgeting for the year ahead.
10:30 am - 11:00 am Track B

The Importance of data in the Cyber Extortion World

Speakers:
Ed Lewis, Partner, Weightmans
Kadir Levent, Chief Operating Officer, CyberClan
Mark Singer, Cyber and Tech E&O Claims Manager, Beazley
Winston Krone, Global Managing Director, Kivu

A panel of IT forensic, legal and insurance experts will speak to the ever-present theme of data exfiltration threats in ransomware scenarios, how to protect against it, how to deal with it when it happens and the ensuing challenges.
11:00 am -
11:30 am
11:00 am - 11:30 am Track A

eCommerce, Fraud and Online Payments in a COVID-19 World

Speaker:
Chris Thomas, Managing Director EMEA, Emailage

This session will explore the results of our unique 500+ consumer survey on why attitudes to fraud have changed since the pandemic, how that's adding new operational risk, and the long-term impact on the eCommerce and Payments industry. Changing consumer behavior in eCommerce shows the pressing need for retailers to enhance the customer experience while reducing online payment fraud amidst COVID-19.

You will learn:

  • How changing consumer behavior has placed greater reliance on online payments since March 2020
  • Why consumers are more concerned about fraud
  • How eCommerce retailers can strike a delicate balance between risk appropriate friction and improve customer experience
  • Where complex checkout processes dramatically impact user acquisition and loyalty
11:00 am - 11:30 am Track B

Defending Your APIs Against Industrialized Cybercrime

Speaker:
Ameya Talwalkar, Co-Founder and Chief Product Officer, Cequence Security

With APIs pervasive across your organization, powering apps, and enabling digital transformation, you need to consider whether your existing infrastructure and security tools can identify security gaps before they become incidents and if they can withstand an industrialized attack. API coding errors and malicious bots are a significant cause of fraud and theft-related revenue losses, infrastructure overspending, poor customer experience, and brand damage.

In this talk, we'll explore several case studies of API attacks and techniques and discuss what's needed to protect your applications and your business from suffering damages.

Key takeaways

  • How attackers are evolving to bypass detection
  • How cybercriminals beat traditional approaches
  • How Machine Learning and AI can provide help detect and defend against malicious bots
  • Why an end-to-end API security strategy is imperative to making your apps less attractive to criminals
  • 11:00 am - 11:30 am Track C

    Cloud is Your Opportunity to get Security Right

    Speaker:
    Scott McAvoy, Cloud Security Competency Lead, IBM

    The global pandemic has accelerated digital transformation and cloud adoption for all organisations. This journey to cloud has created some challenges for the security teams, who already are overwhelmed with volumes of security events and suffering with the security data spread across multiple tools, clouds and IT environments. However, the journey to Cloud also represents an opportunity to get Security right. Join this session to hear the lessons on how to get Security right with an open and integrated Security approach.
    11:30 am -
    11:45 am
    11:30 am - 11:45 am Track A

    The Risky Business of Open Source Libraries and What to Do About It

    Speaker:
    Tom Smith, Solutions Architect, Veracode

    Veracode recently released its first State of Software Security: Open Source edition report to analyse data on open source libraries that could expose companies to data breach risk. We found that 71% of all applications contain flawed open source libraries, and that the majority of those flaws come from downstream dependencies that might escape the notice of developers. A single flaw in one library can cascade to all applications that leverage that code. Open source software has a surprising variety of flaws. An application's attack surface is not limited to its own code and the code of explicitly included libraries, because those libraries have their own dependencies. In reality, developers are introducing much more code, but if they are aware and apply fixes appropriately, they can reduce risk exposure.

    What you will come away with:

    • The prevalence of open source libraries in applications
    • The types of vulnerabilities most common in open source libraries
    • The best practices for addressing the security vulnerabilities in open source code
    11:30 am - 11:45 am Track B

    Zero Trust, Compliance And the TLS Blind Spot

    Speaker:
    Simon Jackson, Director Systems Engineering, A10 Networks Inc

    Modern cyberattacks are not limited to network intrusions from outside by hackers. "Internal threat actors" can often be found at the center of a complex mix of simple social engineering attacks and sophisticated, multi-staged infections and data breaches.

    The Zero Trust model, based on the simple principle of "trust nobody", defines rules which enhance the security of networks against modern cyberattacks, whether they are initiated from the outside or within. However, with most of the internet traffic being encrypted, it is becoming increasingly difficult to implement the Zero Trust model in an effective way.

    The session will cover:

    • The role of "internal threat actors" and TLS encryption in modern cyberattacks
    • How the Zero Trust model defines the future of cybersecurity
    • Why effective decryption is essential for a fool proof Zero Trust strategy
    11:30 am - 11:45 am Track C

    IBM Cloud Pak for Security: Connected Security Built for a Hybrid, Multi-cloud World

    Speaker:
    Lee Harris, MSSP & Cloud Pak for Security Sales Leader, IBM EMEA

    Join this session to learn about IBM Cloud Pak for Security, an open platform that helps you uncover hidden threats, make more informed risk-based decisions and prioritise your team's time. With IBM Cloud Pak for Security you can:
    • Gain Security insights: connect to your existing data sources to generate deeper insights; securely access IBM and third-party tools to search for threats across any cloud or on-premises location.
    • Respond faster to threats: quickly orchestrate actions and responses to those threats - all while leaving your data where it is.
    • Run it anywhere: Install and run the platform in any environment
    11:45 am -
    12:00 pm
    11:45 am - 12:00 pm

    Exhibit, Resource Center & Networking Break

    12:00 pm -
    12:30 pm
    12:00 pm - 12:30 pm Track A

    The UK's Current Cybersecurity Challenge

    Speaker:
    Andy Bates, Executive Director, Global Cyber Alliance

    Andy Bates, executive director of the Global Cyber Alliance, shares his insights on key cybersecurity and fraud challenges facing UK organizations in the year ahead, with an emphasis on:
    • Emerging threats
    • IoT vulnerabilities
    • How defenders and defenses must adapt
    12:00 pm - 12:30 pm Track B

    BEC Attacks: Detection and Response

    Speakers:
    Andrew Rose, Resident CISO - EMEA, Proofpoint
    Mark Walmsley, CISO, Freshfields Law Firm

    Business Email Compromise (BEC) attacks are increasingly used by attackers as a way of targeting organizations. According to Gartner, through to 2023, BEC attacks will continue to double each year to over $5 billion and lead to large financial losses for enterprises. How can CISOs respond to this ever increasing threat? Join this exclusive panel for unique insight into:
    • What a successful compromise of an organization's email system looks like
    • Strategies to detect and respond to BEC attacks
    • Why education and awareness training is still crucial and how to deliver it in a way that works.
    12:30 pm -
    12:45 pm
    12:30 pm - 12:45 pm Track A

    A Strong Finish: Disposing of Regulated Data Securely & Completely

    Speaker:
    Fredrik Forslund, Vice President, Enterprise & Cloud Erasure Solutions, Blancco

    According to EY, consumers, regulations, and business concerns are driving UK public and private sector industries to re-examine their data disposition processes, particularly for sensitive and personal information. We'll show how UK enterprises can ensure data security at data end-of-life, comply with data protection laws, and align data disposal policies with both the National Data Strategy and environmental goals.
    12:30 pm - 12:45 pm Track B

    Application Security to Defend your Business from Fraud & Abuse

    Speaker:
    Andrew Barnard, Senior Sales Engineer, Shape Security

    Web and mobile apps now represent the single most lucrative set of targets for cybercriminals - which means that application security has never been more important. Together, our combined F5 and Shape Security solutions deliver a comprehensive application security stack that marries best-in-class defences with the simplicity and ease of a single vendor.

    Attend this session to learn how F5 and Shape Security can help you achieve:

    • Detection and mitigation from vulnerability exploits to denial-of-service attacks
    • Better application performance and uptime
    • Measurable cost savings for hosting and bandwidth costs
    • Slashed losses due to fraud and abuse
    12:45 pm -
    1:15 pm
    12:45 pm - 1:15 pm Track A

    Modernizing Client PCs to Cope with Today's Security Challenges

    Speakers:
    Jeff Kilford, UK Client Compute Group Director, Intel
    Marika Dziuba, Technical Solution Specialist - EMEA, Intel

    Many businesses are implementing software security solutions. But as hackers get more sophisticated, threats are attacking the hardware layer. Hardware-based security features built-in to the hardware provide an important layer of protection for business devices, applications, and data. The Intel vPro® platform includes groundbreaking technologies that accelerate and scale security beyond software or human based approaches alone. It delivers hardware-enhanced security features designed to help protect the other layers of the computing stack. Intel® Hardware Shield
    12:45 pm - 1:15 pm Track B

    How to be a SOAR Winner

    Speaker:
    Sam Humphries, Security Strategist, Exabeam

    Security orchestration, automation, and response (a.k.a. SOAR) is the cool kid on the block in security right now. Implementing SOAR requires a both a strategic and a tactical approach, in order to avoid pitfalls and ensure ongoing success. The benefits of SOAR are many-fold - such as improving operational efficiency and accuracy, reducing risk, and deriving more value from your current security stack. Considering why, when, and how your organisation should embark on a SOAR initiative requires careful planning. Choosing the right tools and technologies, selecting the right processes, and implementing the right measurements are key to the success of many an initiative, and in the case of SOAR are absolutely vital. During this session you will learn:
  • The fundamentals of SOAR
  • How SOAR can help your organisation, in more ways than you might think
  • How to approach your SOAR initiative
  • What you should and shouldn't automate
  • How to measure SOAR success
  • 1:15 pm -
    1:30 pm
    1:15 pm - 1:30 pm

    Exhibit, Resource Center & Networking Break

    1:30 pm -
    2:00 pm
    1:30 pm - 2:00 pm Track A

    Legal and Compliance: Preparing for 2021

    Speakers:
    Jonathan Armstrong, Partner, Cordery
    Shelton Newsham, Cyber Protect Lead and Cyber Prevent Lead Regional Cyber Crime Unit

    The pandemic triggered a rise in cybersecurity incidents this year; many organizations were unprepared to securely support a mass remote workforce. As some offices are reopening and companies adopt a hybrid workplace model, what previously unidentified incidents will organizations find upon their return to the office and how can organizations improve their security postures in this landscape? Join this exclusive panel for unique insight into:

    • The unique security and privacy risks associated with the return to the office;
    • The need to revisit, review, and revise incident response plans;
    • Legal and compliance issues "to watch" in 2021.
    1:30 pm - 2:00 pm Track B

    Insider Threat: How to Mitigate the Heightened Risk

    Speaker:
    Randy Trzeciak, Director, CERT Insider Threat Center, CMU

    A remote workforce. Economic stress. Pandemic fatigue. These ingredients create a "perfect storm" for insider risk, whether through malicious acts or accident. What can you do to improve monitoring and mitigation of insider risk in these unique conditions?

    Randy Trzeciak, director of the CERT Insider Threat Center at Carnegie Mellon University, is one of the world's leading authorities on preventing, detecting, and responding to insider incidents. In this exclusive session, he details:

    • The latest research on insider incidents
    • Unique risks created within today's remote workforce
    • How to mitigate the risks posed by malicious and unintentional insider threats
    2:00 pm -
    2:30 pm
    2:00 pm - 2:30 pm

    CEO's Prognosis: Homeland Security and Cyber Defense in 2021

    Speaker:
    Jasbir Singh Solanki, CEO - Homeland & Cyber Security, Mahindra Defence Systems Limited

    Jasbir Solanki, CEO of the Homeland and Cyber Security division of Mahindra Defense System Limited, likes to call his group "The special services of cybersecurity." In this exclusive session, Solanki shares his unique perspective on what to expect in 2021, including:
    • Lasting impacts of COVID-19
    • Evolving threats to individuals and organizations
    • How CISOs should approach the second year of remote work, multi-cloud environments and defending an exponentially larger attack surface.
    2:30 pm -
    5:00 pm
    2:30 pm - 5:00 pm

    Exhibit Browsing & On-Demand Viewing

    View Schedule

    SPONSORS / Supporting Organizations

    A10 Networks
    Cequence Security
    Check Point
    Beazley Group
    Blancco
    emailage
    exabeam
    IBM
    Intel
    Ivanti
    LastPass
    Proofpoint
    Shape security
    Veracode

    Meet Our Speakers

    Step One: Admitting We Have a Cybersecurity Problem

    Reitinger of Global Cyber Alliance on Tackling Risk Management

    Is There Too Much Cybersecurity Technology?

    Former RSA Chair Coviello Says More Tech Won't Reduce Risk

    Cyberspace and the Growing Storm

    Tom Kellermann on How Nation State Actors Are Changing the Threat Landscape

    Getting Value From Managed Security Services Providers

    BlueScope Steel's Catherine Buhler Offers Real-World Insights

    Business-Driven Security: Protect What Matters Most

    RSA's Peter Beardmore on Tying Business Risk to Security Incidents

    LOCATION / Venue & Address

    Virtual Summit

    Register and attend online.

    Live presentations, speaker Q&A, and Expo Hall demos will all be held on our virtual platform.

    Register Today

    To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

    Register Now

    Registering For a Group?
    Call + 1 (609)-356-1499  or email at events@ismg.io

    Contact Us

    Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

    +1 (609) 356-1499
    events@ismg.io

    Join the Community

    Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

      • BankInfoSecurity
      • CUInfoSecurity
      • GovInfoSecurity
      • HealthcareInfoSecurity
      • InfoRiskToday
      • CareersInfoSecurity
      • DataBreachToday
      • CyberEd
      Home | Summits | Press Releases | Sponsorship
      © 2021 Information Security Media Group, Corp. |
      Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data