Arrival, registration & breakfast networking
INTRODUCTION FROM THE NETWORK GROUP & CHAIRPERSON
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Guy Morrell, CISO, The Francis Crick Institute
DCMS’s role in raising cyber resilience levels across the UK economy and society
- An overview of DCMS’s role in the National Cyber Strategy
- The Cyber Resilience team’s policy priorities
- Improving the governance of cyber
Jack Harrigan, Head of Cyber Accountability, Department of Digital, Culture, Media and Sport
Align & simplify your security strategy to make it fit for business purposes
- How simplifying your information security strategy can enable business sustainability
- How to go back & rectify decisions against encumbering legacies
- Engrain business goals into security measures & efficiencies
Tamlynn Deacon, Head of Information & Cyber Security, HBK – Hottinger Brüel & Kjær
Coffee break & networking
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
where & when can controls lack visibility & how to overcome this
- Comparing the respective agility of preventative & reactive security operations
- How, where & when can controls lack visibility & how to overcome this
- How can you prepare both preventative & reactive measures for optimal protection
Sunil John, Head of Information Security, Sainsbury’s Bank
Case Study: Real-time response in a ransomware attack & the aftermath
- The before: How do systems fail & what are your weakest points?
- The immediate: Optimal practices in the live experience of a ransomware attack
- The aftermath: What do you improve & how do you approach reducing risks after an incident occurs?
Sharad Sinha, Head – Cyber Security Operations, Oxford University Press
Coffee break & networking
Open Forum Think Tank
Vulnerability Management
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Panel Discussion: How to optimise resilience against security incidents & how to handle a breach
- Best practice in building resilience & continuous monitoring
- What level of cyber risk is acceptable?
- Repercussions & resolutions to cyber incidents
Dan Burns, Head of Information Security, Next
Mike Pitman, CISO, BSI Group
Graham Ingram, CISO, University of Oxford
Chairperson’s closing remarks
A reflection on today’s discussions, & thank you to our audience & speakers.
Morning registration & breakfast
Opening remarks from the chairperson
A welcome from the chairperson
Roundtable discussions
Join group discussions with your peers on some of the most challenging & significant topics of today — please confirm attendance prior to the session beginning. Each host will facilitate the discussion & give a short roundup of key findings during the wrap up session.
Gary Brailsford-Hart, Director of Information, City of London Police
Henrik Kiertzner, Head of IT Operations (Cyber Security & Infrastructure), National Trust
Graham Ingram, CISO, University of Oxford
Brian Lake, Head of Cyber Security, Marie Curie UK
Julie Osborne, Head of Cyber Security, Global Digital IT & Channels, Vodafone
Roundtable wrap-up by the chairperson
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee break & networking
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking lunch
How to reinforce & nurture IT & cyber security skills in your organisation
- Inspiring the next generation of security professionals: Recruitment & development of cyber security skills
- Making your IT team security-minded
- The future of the cyber security expert: What skills to watch
Guy Morrell, CISO, The Francis Crick Institute
Gap-plugging during cloud integration & how to navigate the risks
- Culture, transforming to “think secure” squads
- Risk Assessment, the importance of a strong Security Architecture team
- Prioritising risk, a machine learning model to prioritise your cloud security posture
- Detection, selecting the right MSSP and MDR for cloud
- DevSecOps, shifting-left to manage risk early
Richard Frost, Deputy CISO, esure Group