Alex became the UKs Spy Chief, a position known as C in 2014. hbspt.cta._relativeUrls=true;hbspt.cta.load(2223611, '6b694435-109e-4183-83ae-22f82d9efbe2', {"useNewLoader":"true","region":"na1"}); London, United Kingdom + 44 20 3397 3414. If youre on the digital front lines and want to feel empowered by information, our Conference Programme is designed specifically for you - here to help you best defend your organisation, protect the data and privacy of individuals, and develop your career.

Connect with those who might just be the next industry leaders or the tech giants of tomorrow. RELX and the RE logo are trade marks of RELX Group plc, used under licence. Carefully crafted by your friends at

This complexity makes them an attractive target for determined criminals, politically motivated hackers and insider thr Why does cloud make us think differently about security? Cloud and containers are being adopted by a broad set of organizations as they try to maintain a competitive advantage. No! Round Table 4 - Is the complexity of your security architecture a threat to your business? Securing those env For 25 years, AppSec professionals have focused on vulnerabilities on all fronts with ever-evolving tools and processes.

Understand the key capabilities needed to enable the future of work, protect your data, and simplify operations.

The Log4shell vulnerability found in the Log4j logging framework has been recognized as one of the most critical vulnerabilities ever, open source or otherwise. If youre coming to Infosecurity Europe looking for something you havent seen before, this is the place. Ron Ghose, Head of Risk and Security - AB Agri Ltd. Cyber strategies: How to make working with third-parties safer, Paul Harragan, Associate Partner, Cybersecurity, UK&I Transaction Strategy and Execution - EY Parthenon, Richard Davis, Head of Cyber Security Strategy EMEA - Netskope, Henrik Kietzer, Head of IT Operations (Cyber Security and Infrastructure) - National Trust, Vladimir Krupnov, Threat Intelligence Lead - Revolut, Practical application: How to integrate ZTNA into the modern workplace, Gernot Hacker, Sales Engineer Manager EMEA/APAC - appgate, Master class: Predictive defence to get ahead of the attackers, Frances Ackroyd, Senior Cyber Human Factors Behavioural Scientist - Atkins, Zeki Turedi, Chief Technology Officer, EMEA - Crowdstrike, Fireside discussion: How to achieve bank grade cybersecurity, Milan Patel, Global Head of MSS - BlueVoyant, Jim Hart, Chief Information Security Officer - Pollinate International, The big debate: How to defend against ransomware and vicious infections, Frank Satterwhite, Principal Cyber Security Consultant - 1600 Cyber GmbH, Nick Ross, Security Engineer - Trend Micro, Stuart Seymour, Head of DBS Cyber Security Incident Response and Continuity - BAT, Don Gibson, Head of Cyber - Department For International Trade (DIT), Technical Talk: Your company through the eyes of 40,000 hackers, Inti De Ceukelaire, Head of Hackers - Intigriti NV, Risk mitigation: Operational technology cybersecurity risk you should be concerned, Nigel Stanley, Director of Cybersecurity - jacobs, Tech talk: Get familiar with XDR - Extended Detection & Response, Andy Lalaguna, Senior Solutions Architect - eSentire, Javvad Malik, Security Awareness Advocate - KnowBe4, Tech insights: Log4j vulnerability and the lessons they present for enterprise IT, Mohamed Hamid, Lead Infrastructure Engineer - Cabinet Office, Keynote address: Taking the right steps towards cyber security, Steven Furnell, Professor of Cyber Security - University of Nottingham, The BIG debate: Creating a security-first culture, John Scott, Head of Education, Cyber Security Division, Information Security - Bank of England, Jack Hayward, Head of Information Security - Wellcome Trust, Minimising risk from cyber threats: focus on reducing time to containment, Nick Dyer, Senior Systems Engineer - Artic Wolf, Case study: Company culture developing a trustworthy workforce, Philip Hodgins, Mott Macdonald - Group Information Security Principal. The current state of cyber security can almost feel like a state of total war - with malicious attackers continually seeking to extract value from their victims. If you are a CISO or equivalent from an end-user organisation with expertise to share, get in touch to discuss how you might be able to get involved. shareholder activism

However, each enterprise must design their own journey from their current state to their Nearly half of organisations may be throwing away money and competitive advantage because their C-suite isnt engaged enough in cybersecurity. Cloud. Our attendees are looking for actionable and inspirational insight from their peers on how to overcome information security challenges. This is very welcome, but far too many IoT technologies have prioritised innovation and speed over security. While our events always draw the industrys sharpest minds and most innovative thinkers, this is the place where, together, we celebrate the achievements and visions of internationally-recognised information security luminaries and practitioners. The Internet of Things promises to transform how the world works.

If you continue to use this site we will assume that you are happy with it. Zero Trust Network Access (ZTNA) is the new industry standard for secure access to anything, from anywhere, by anyone. cybersecurity cyber DLP and secure baseline configuration provides a programmatic app Join ThreatLocker Senior Solutions Engineer, Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. Discussing the impact of track and trace, lockdowns and View Under control: are Coronavirus restrictions a new reality for government surveillance? If you rely on multiple security tool Cyber-criminals have become thoughtful about ransomware attacks, taking time to maximise your organisations potential damage and their payoff. The panel will feature inspirational women at very different stages of their cybersecurity careers, willing to divulge their personal stories and share their own journeys, including the challenges, the triumphs and even the traumas. We teamed up withNotSoSecure, experts in penetration testing and cyber security, to provide ApsSec for Developers and Hacking and Securing Cloud Infrastructure training sessions during the event on20-21 June 2022. The cloud is, in many ways, the perfect technology to support a hybrid workplace, with staff connecting to enterprise systems as seamlessly from home as they do at the office.

After the United States, the UK is the second most popular country for InfoSec Events. IT security is often more an art than an exact science. If youd like to attend a cybersecurity conference in the United Kingdom and are not a British or EU citizen then you might benefit from a resource we created that explains the process on how to get a conference visa for the UK. Just look at the events of the past two years. The first one on Tuesday 21st will be taking a deep dive into SOC fundamentals, exploring innovative ways your security team can thrive in this challenging era.

But there are several challenges to overcome when securing network access for you For many years, organisations could only mount a defence against cyber security breaches after becoming aware they were infected - and this was often simply too late.

Also featured as part of our Discovery Zone, this is a space reserved for companies that are three years or younger.

Doesnt mean that the cy We all know that public cloud hyperscalers like AWS, Azure, and GCP enable you to deliver new products and capabilities at breakneck speeds. Today's cybercriminals are more confident than ever before, yet at the same time there is an acute shortage of security staff with the appropriate skills. Terms | Disclaimer | Privacy Policy | Cookie Policy, From industry experts sharing insights & trends relating to, Offering deep-dives into some of the industry's most advanced and, Head of Product Management & Innovation, Integrity360, Cyber Threat Response Manager, Integrity360, EMEA CTO, CISO, Executive Cyber Security Advisor, Vectra AI, Director of Sales Engineering, Forcepoint, Head of Solution Architecture, Integrity360, Head of Cyber Risk Advisory, Integrity360, challenges faced by cyber security professionals, On topics critical to your business in 2022, Head of Product Management, Strategy & Innovation, Nick Brownrigg, Head of Solution Architecture, Ellis Reed, Solution Architect Integrity360, Matt Cross, Regional Sales Director, Varonis, Patrick Wragg, Cyber Threat Response Manager Integrity360, Graeme McMillan, Senior Sales Engineer, Rapid7 UK. Chief Information Security Officers, Chief Information Officers, Chief Security Architects, Heads of Information Security, Chief Compliance Officers, Privacy Officers and Data Protection Specialists. You need to focus your scant resources to do what you can, protect your mental health and retain your personal life. If companies are installi As a security professional, you cant do everything. Modern security: How do you mitigate threats in a perimeter-less environment?

And many are still putting the right pieces in A multi cloud environment allows you to pick and choose the best technology for the job from different providers perhaps cheap storage from one cloud provider and the best apps from another.

Security and capacity planning are ever-present obstacles to running a well-tune Log4j, SolarWinds, Codecov, ua-parser-js; and this is just scratching the surface of the supply chain attack threat security leaders are being faced with. Machine learning: How ML can be applied to security data, Florian Doumenc, Security Engineer - google, Fireside chat: How to successfully rollout a security programme with strong developer adoption and buy in, Simon Maple, Field Chief Technology Officer - Snyk, Ashleigh Vincent, Product Security Engineer - Tide Platform Ltd, How an expired certificate can take down [insert your company name here], Unlocking The Business Value of SASE & SSE, Cloud-Native Runtime Security with Sysdig & Falco open source, Tom Llewelyn, Senior Sales Engineer - Sysdig, Best practice: Keeping pace with adversaries how security awareness testing and training can bolster your cyber defences, Moving to the Cloud Securely with DevSecOps, Vincent King, Head of DevSecOps for Cloud Transformation - Bank of England, Best practice: Why we need to get a handle on the Internet of Vulnerable Things (IoVT), Simon Newman, Head of Cyber and Business Services - Police Crime Prevention Initiatives, Tim Burnett, Security Architect - Costain Digital, Executive buy-in: Getting the board on board with cybersecurity, Nicolas Corrarello, EMEA Solution Engineering Director - Wiz, Tech talk: Riding the waves how to navigate the waters of cloud-native security, Tsaela Pinto, WhiteSource - Director of R&D, Normalizing AppSec Issues for Contextual Risk-Based Prioritization at Enterprise Scale, Moshe Zioni, VP Security Research - Apiiro, User case: Security at the heart of a cloud migration one law firms experience, Scott Storey, Security Architect - DLA Piper, Make your cloud security easy and intuitive with Check Point, Stuart Green, Cloud Security Architect - Check Point Evangelist, Roundtable 2 - Finding SASEs Holy Grail - The Business Value of Security Transformation, Roundtable 4 - How top security leaders are rethinking their software supply chain, Andres Guisado, Manager, EMEA - Aqua Security, Roundtable 1 - Protecting the crown jewels: A risk-led security approach to stop Ransomware, Roundtable 1 - How to optimize your DevSecOps journey, Roundtable 2 - Practical Steps to Automate your Digital Identities and Keep your Business Running. These disconnected efforts have led to wasted time and slow delivery. International Law and Global Security: Regulating an Illusion? These exclusive sessions will offer a in-depth discussion into the latest hot topics in the industry.



Sitemap 46