• Live Chat
ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Cybersecurity Summit: London

October 22, 2019

Register Now

WELCOME / Summit Overview

ISMG’s Global Summit Series will take place across four continents focusing on global security topics such as fraud and breach prevention and on many key industry verticals such as finance, government, retail, energy and healthcare.

All content will be driven by our global editorial team including executive editors from publications like DataBreachtoday, BankInfoSecurity, GovInfoSecurity and HealthcareInfoSecurity. These events will provide the opportunity to learn from industry influencers, earn CPE credits, meet with leading technology providers and be a part of the ISMG community of over 700,000 subscribers.

Details

etc Venues
133 Houndsditch
Liverpool Street
London, UK EC3A 7BX

22nd October, 2019

£475

Register Now

Registering For a Group?
Call + 1 (609)-356-1499

  • Event Gallery

Polly Ralph

Barrister and Solicitor, UK Data Protection Strategy, Legal and Compliance Services, PwC

Andy Bates

Executive Director, Global Cyber Alliance

Sarb Sembhi

CTO/CSO, Virtually Informed

Martin Overton

Ethical Hacker, Forensics & Malware SME

Alain Sanchez

Office of the CISO, Senior Evangelist, Fortinet

Teju Shyamsundar

Technical Manager, Product, Okta

Barry McMahon

Sr. Intl Product Manager (IAM), LastPass by LogMeIn

Sudeep Venkatesh

Chief Product Officer, Egress

SPEAKERS / Featured Speakers

Ameya Talwalkar

Co-Founder and Chief Product Officer, Cequence Security

Thom Langford

former CISO, founder, (TL)2

Sarb Sembhi

CTO/CSO, Virtually Informed

David Stubley

CEO, 7 Elements

Martin Overton

Ethical Hacker, Forensics & Malware SME

Mark Tibbs

Cyber Intelligence Director, MDR Cyber, MDR Cyber

Polly Ralph

Barrister and Solicitor, UK Data Protection Strategy, Legal and Compliance Services, PwC

Ran Shahor, Brigadier General (Ret.)

CEO & Founder, HolistiCyber

Tom Field

Senior Vice President, Editorial, ISMG

Chris Gilkes

Insider Threat Consultant and Director of Sales EMEA, Veriato

Andy Bates

Executive Director, Global Cyber Alliance

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe

Teju Shyamsundar

Technical Manager, Product, Okta

Philip McInerney

Detective Inspector SCO7, Organised Crime Command, Cyber Crime Unit, Metropolitan Police

Alain Sanchez

Office of the CISO, Senior Evangelist, Fortinet

Barry McMahon

Sr. Intl Product Marketing Manager (IAM), LastPass by LogMeIn

Sudeep Venkatesh

Chief Product Officer, Egress

Mark Singer

Cyber and Tech E&O Claims Manager, Beazley

Stephen Owen

CISO, Bourne Leisure Group

Dominic Hibberd

Cyber Security Manager, Darktrace

James Lloyd

Privacy Investigations & Disputes Lawyer, PwC

John Walker

Visiting Prof., Nottingham Trent University; Advisory Board, Research Centre in Cyber Security (KirCCS), University of Kent and Fmr Royal Air Force Security and Counter Intelligence

Schedule / Session Times

  • Tuesday, October 22nd

  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:00 am -
8:30 am
8:00 am - 8:30 am

Registration, Breakfast, & Networking

8:30 am -
8:45 am
8:30 am - 8:45 am

Opening Remarks

8:45 am -
9:15 am
8:45 am - 9:15 am

The UK's 2020 Cybersecurity Challenge

Speaker:
Andy Bates, Executive Director, Global Cyber Alliance

Andy Bates, executive director of the Global Cyber Alliance, shares his insights on key cybersecurity and fraud challenges facing UK organizations in the year ahead, with an emphasis on:

  • Emerging threats
  • IoT vulnerabilities
  • How defenders and defenses must adapt
9:15 am -
9:45 am
9:15 am - 9:45 am

Has GDPR Met its Goals?

Speaker:
Thom Langford, former CISO, founder, (TL)2

In an exclusive session, veteran CISO Thom Langford looks at what GDPR has influenced since its introduction, how this impacts security and privacy leaders across sectors, and where data protection regulation can go from here.

Langford is the founder of (TL)2 Security, a strategic Information security Consultancy. As Chief Information Security Officer of Publicis Groupe, he was responsible for all aspects of information security risk and compliance as well as managing the Groupe Information Security Programme.

Having successfully built security and IT programmes from the ground up, Langford brings an often opinionated and forward thinking view of security risk, both in assessments and management, but is able to do so with humour and pragmatism.

9:45 am -
9:55 am
9:45 am - 9:55 am

Tech Spotlight | Insider Threats … Are They the Hole in Your Security Strategy?

Speaker:
Chris Gilkes, Insider Threat Consultant and Director of Sales EMEA, Veriato

9:55 am -
10:25 am
9:55 am - 10:25 am

Digital transformation: Its Impact on Security & Privacy

Speaker:
Stephen Owen, CISO, Bourne Leisure Group

Stephen Owen of Bourne Leisure is embarking on his third digital transformation programme. In this session, he will share the CISO's perspective on the bear traps to avoid and lessons to be learned in orchestrating and analysis required by privacy, security and cloud architects teams working at a dynamic pace.

10:25 am -
10:50 am
10:25 am - 10:50 am

Exhibiting & Networking Break

10:50 am -
11:20 am
10:50 am - 11:20 am Track A

Pragmatic Zero Trust - Identity as the New Security Perimeter

Speaker:
Teju Shyamsundar, Technical Manager, Product, Okta

The shift to cloud has made perimeter-centric view of security obsolete and led to the creation of Zero Trust. With users accessing corporate resources across a variety of devices, platforms and clients, organizations are seeing an increase in phishing, password spray, brute force and other identity based attacks. Learn how you can achieve more powerful outcomes by combining cloud security with identity, network and endpoint security - achieve holistic protection by implementing the Zero Trust model across your enterprise.

10:50 am - 11:20 am Track B

Staying Ahead of Nation State Grade Cyber Attacks

Speaker:
Ran Shahor, Brigadier General (Ret.), CEO & Founder, HolistiCyber

Countries around the world are making significant investments in both cyber defense and cyber offense technologies. These sophisticated and advanced nation-state level attack capabilities are now being targeted to the private sector. In fact, these highly advanced mechanisms of cyber assault are continuously evolving and are available for sale in the Darknet, enabling hackers to become extremely powerful attackers. The question arises - How can organizations protect themselves in today's cyber reality? Good news is - It is possible.

In his presentation, Ran Shahor, IDF Brigadier General (Ret.) will discuss the solutions, the holistic approach and the secret sauce needed in order for organizations to be protected and stay ahead of the attackers.

11:25 am -
11:55 am
11:25 am - 11:55 am

Privacy Breach: When Everything Goes Wrong

Speakers:
James Lloyd, Privacy Investigations & Disputes Lawyer, PwC
Polly Ralph, Barrister and Solicitor, UK Data Protection Strategy, Legal and Compliance Services, PwC

In this session, we will hear from two data privacy lawyers, one of whom supports clients through data privacy litigation and regulatory intervention, and the other who helps clients remediate in the aftermath. They will take us through key considerations, both before and after a data privacy incident, to protect your position.

12:00 pm -
12:30 pm
12:00 pm - 12:30 pm Track A

Bulletproof Proxies: How Large Scale Attacks Hide in Plain Sight

Speaker:
Ameya Talwalkar, Co-Founder and Chief Product Officer, Cequence Security

Bulletproof Proxies have taken the concepts of anonymity and availability found in Bulletproof Hosting and extended them to the automated bot attack delivery infrastructure by using large networks of Residential Proxies that mask identity and location. Bulletproof Proxies allow bad actors to distribute their attacks across legitimate user locations making detection and prevention difficult. This session will cover the following topics:

  • The rise of Bulletproof Proxies - how they came to exist
  • The balancing act between legitimate and malicious use
  • Techniques used to mask their identity and location
  • Details on large scale attacks targeting financial services and retail sector
12:00 pm - 12:30 pm Track B

Making Email Safe Again: How to Empower Staff to Share Data Via Email

Speaker:
Sudeep Venkatesh, Chief Product Officer, Egress

People cause data breaches when using email for a multitude of reasons. They might be tired, rushing or using a mobile device. Or they might be moving to a new job and feel a sense of ownership that entitles them to remove data from their current employer's network.

Yet at as people communicate and collaborate digitally at unprecedented levels, employees will continue to rely on email as an easy mechanism to share information, including sensitive data.

Making email safe for employees to use requires a clear understanding of why breaches happen so that effective solutions can be implemented to mitigate risk. So far, so easy? In our experience, when it comes to insider data breaches, this can be a complex issue that's fraught with difficulties - particularly when trying to mitigate incidents caused by human error and people 'just trying to get their jobs done'.

12:30 pm -
1:15 pm
12:30 pm - 1:15 pm

Lunch

1:15 pm -
1:45 pm
1:15 pm - 1:45 pm

Cybersecurity at the Heart of the 4th Industrial Revolution

Speaker:
Alain Sanchez, Office of the CISO, Senior Evangelist, Fortinet

Over the next 10 years, digital transformation is expected to unlock an estimated $10 trillion of value for business and wider society. The 2019 edition of the World Economic Forum in Davos has clearly established security as a strategic contribution for unlocking that value, putting a safe digital transformation at the heart of three major drivers; Education, Ecosystem, and Technology. How can we, Cybersecurity Vendors, Enterprise CISOs, and Partners contribute to such challenge? What are the concrete initiatives, solutions and products that are available now to cash the benefits of the 4th Industrial Revolution.

1:50 pm -
2:20 pm
1:50 pm - 2:20 pm Track A

A New Era of Cyber Threats: The Shift to Self-Learning, Self-Defending Networks

Speaker:
Dominic Hibberd, Cyber Security Manager, Darktrace

In the face of advanced, never-seen-before, cyber-threats, how can organizations leverage immune system technologies to pre-empt emerging threats and reduce incident response time? In this session, Darktrace's Dominic Hibberd will draw upon real-world examples of subtle, unknown threats that routinely bypass traditional controls. Learn more about:

  • The risks of today's threat landscape;
  • How artificial intelligence and machine learning can protect the modern business - from enterprise and industrial to the new generation of IoT devices;
  • The value of autonomous response in defending against machine-speed attacks.
1:50 pm - 2:20 pm Track B

Modern Identity: Unifying Access & Authentication

Speaker:
Barry McMahon, Sr. Intl Product Marketing Manager (IAM), LastPass by LogMeIn

Identity management is no longer a simple flash of a badge at an entry desk. The layers of complexity in password management and SSO are all deterrents in the speed of authentication at the user level.

Hear insights from new research:

  • Business Departments presenting the highest risk exposure;
  • What are key challenges and priorities when managing identity;
  • Understand how identity risk can transfer from personal to business life.
2:25 pm -
2:55 pm
2:25 pm - 2:55 pm Track A

Cyber Insurance and Services to Confront, Manage, and Recover from Cyber Incidents

Speaker:
Mark Singer, Cyber and Tech E&O Claims Manager, Beazley

Risks associated with cyber security incidents and business interruption are major concerns for companies worldwide. Improperly managed, cyber security incidents like ransomware can bring companies to a standstill and the resulting financial losses can have a substantial impact. Using real life examples, learn how Beazley, the market-leading cyber security insurance carrier, successfully partners with clients to confront the technical threat associated with cyber security risks, manage the associated legal and regulatory exposure, and recover financially from a loss of resulting income with business interruption coverage.

2:25 pm - 2:55 pm Track B

Business Email Compromise: Protecting the Enterprise

Speaker:
David Stubley, CEO, 7 Elements

What does a successful compromise of an organisation's email system look like, and what can we do to protect ourselves? This talk will use real-life case studies from recent incidents to dissect the anatomy of a modern Business Email Compromise attack. Attend this session for expert insight on:

  • Current attack trends;
  • Mailbox manipulation and exfiltration of sensitive data;
  • Easy to implement mitigation strategies.
2:55 pm -
3:20 pm
2:55 pm - 3:20 pm

Exhibit & Networking Break

3:20 pm -
3:50 pm
3:20 pm - 3:50 pm Track A

What's Wrong with Awareness Training - and How to Fix it

Speaker:
Sarb Sembhi, CTO/CSO, Virtually Informed

Enterprises have endured decades of security policies, programmes, plans, metrics and awareness training ... and yet little has improved. CISOs still complain that people are failing at the cybersecurity basics. This session will explore issues in user awareness training and offer a different approach, including:

  • Why some of today's awareness programmes don't work;
  • How CISOs and vendors can influence change;
  • How to get started on a holistic approach to Digital Safety Skills.
3:20 pm - 3:50 pm Track B

Is Cyber Insurance Really Making You Cyber "Secure"?

Speaker:
Martin Overton, Ethical Hacker, Forensics & Malware SME

Veteran security leader Martin Overton tackles cyber insurance with a review of case studies that illustrate genuine benefits ... and subtle pitfalls that may result in no coverage for costly incidents. Overton has over 30 years of hands-on security experience, along with several years working for a major international insurer. Attend this session and learn:

  • Common pitfalls and genuine benefits that insurance policies have;
  • How to avoid a situation where you are not actually covered for a specific incident;
  • Ways the insurance industry can improve cyber coverage and services.
3:55 pm -
4:25 pm
3:55 pm - 4:25 pm Track A

Know Your Attacker: Lessons Learned from Cybercrime Takedowns and Investigations

Speaker:
Philip McInerney, Detective Inspector SCO7, Organised Crime Command, Cyber Crime Unit, Metropolitan Police

As threats and threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to have a clear picture of their potential attackers - whether they are nation-states, cybercrime gangs or lone actors.

Attend this session for first-hand insights from one of the City's top cybercrime experts, addressing:

  • Today's most prevalent cybercrime schemes - and why they are successful
  • Traits of the threat actors most commonly perpetrating these schemes
  • Lessons learned from actual crime investigations - and how you can put these to work to improve your own defenses.
3:55 pm - 4:25 pm Track B

Illegal Streaming - A Flood of Fraud

Speaker:
Mark Tibbs, Cyber Intelligence Director, MDR Cyber

Broadcasters invest billions of pounds in high-quality programming, but Illegal streaming is growing and global losses to piracy have been forecasted to reach over £35bn by 2022. Illegal streaming services are rife online. The operators behind these services share many of the same characteristics of early cybercriminals: They sell their services relatively openly using online platforms and marketing. There are even online communities which support sales of these services.

Mark Tibbs has worked in the field of cyber investigations and intelligence for nearly a decade before joining MDR Cyber, working within British law enforcement and a cyber threat intelligence start-up. This talk presents some of the findings from his research and recommendations about how to tackle this crime.

  • What is illegal streaming and why is it so prevalent?
  • How does the criminal economy look?
  • How can fraud be tackled using both technical and legal options?
4:30 pm -
5:00 pm
4:30 pm - 5:00 pm

Digital Climate Change: An Inconvenient Truth

Speaker:
John Walker, Visiting Prof., Nottingham Trent University; Advisory Board, Research Centre in Cyber Security (KirCCS), University of Kent and Fmr Royal Air Force Security and Counter Intelligence

In this exclusive session, renowned global cybersecurity expert John Walker offers a thought-provoking look at how we use digital assets and infrastructure even when we can see proof of the "Digital Icecap" melting. From the early conceptions of what was called 'IT security' to an era in which we have coined the phrases of cybersecurity and digital transformation, he will look at where we have come from - and where we may be going.

5:00 pm -
5:05 pm
5:00 pm - 5:05 pm

Closing Remarks

5:05 pm -
6:05 pm
5:05 pm - 6:05 pm

Cocktails & Networking

SPONSORS / Supporting Organizations

Cequence Security
Darktrace
Egress
Fortinet
HolistiCyber
Okta
Veriato
Zivver
LastPass
Beazley Group

Meet Our Speakers

CISO Thom Langford on Risk and Awareness

How to Gauge Your Organization's Risk Appetite and Improve Security Training

Step One: Admitting We Have a Cybersecurity Problem

Reitinger of Global Cyber Alliance on Tackling Risk Management

Is There Too Much Cybersecurity Technology?

Former RSA Chair Coviello Says More Tech Won't Reduce Risk

Cyberspace and the Growing Storm

Tom Kellermann on How Nation State Actors Are Changing the Threat Landscape

Getting Value From Managed Security Services Providers

BlueScope Steel's Catherine Buhler Offers Real-World Insights

Business-Driven Security: Protect What Matters Most

RSA's Peter Beardmore on Tying Business Risk to Security Incidents

LOCATION / Venue & Address

etc Venues
133 Houndsditch
Liverpool Street
London, UK EC3A 7BX

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Register Now

Registering For a Group?
Call + 1 (609)-356-1499  or email at events@ismg.io

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

  • BankInfoSecurity
  • CUInfoSecurity
  • GovInfoSecurity
  • HealthcareInfoSecurity
  • InfoRiskToday
  • CareersInfoSecurity
  • DataBreachToday
Home | Summits | Press Releases | Sponsorship
© 2019 Information Security Media Group, Corp.