Researchers discover new way to create quantum states in conventional electronics
Quantum technology is usually considered too delicate to coexist with electronic devices
It's no surprise that cyber-attacks have risen to the top of the agenda for companies and nation-states. Over the last decade we've gone from password cracking to machine-learning, ransomware, and industrialised hacking. Cyber Security Live is the insight you need to develop a sharp focus on the strategies and tools needed to withstand the next wave of cyber-threats.
Keeping one step ahead of the attacker is essential to stay safe - your actions need to be preventative rather than reactive. You need to know who the opponent is, what they want, and how they're going to get it. Your cyber-security has to be an applied intelligence strategy: anticipate, adapt, defend.
But what will you do when the adversary has hidden themselves within your server? A well-designed bot using military grade technology to tirelessly probe your defences with endless patience. They're already in, a singular or multiple attack, watching and waiting for their chance. Do you really know where your vulnerabilities lie?
These threats are on a different scale, you've bought a human to a bot-fight. Attacks are unprecedented in both output and automation, cunningly stealthy and cleverly crafted. With our increasing reliance on automated detection and mitigation systems, are we becoming over-confident in automation? AI and APT scanners are only as good as the data they are fed and one error could prove fatal. Whether human or bot, all attackers will seek out the gap that you forgot.
In cyber-security hindsight is not a wonderful planning tool, if you're not prepared you're going to find yourself seriously hindered. Computing are hosting this event to:
Computing's Cyber Security Live will discuss all of these topics and more. The conference is an excellent opportunity to gain practical tips through sharing and reviewing peers mistakes and experiences.
Through a variety of expert key-notes, end-user case studies, and panel debates the event will cover the key issues surrounding cyber-security, how to implement the best solutions for your business, and how to raise and adopt cyber-security and risk management awareness within your personnel.
WHO SHOULD ATTEND
08.30 – 09.00
|
Registration |
|
09.00 – 09.05
|
Opening RemarksStuart Sumner, Editor Director, Computing, Delta & The Inquirer
|
|
09.05 – 09.20
|
Computing Research: Managing the inevitable: what happens when security is breached?
John Leonard, Research Director, Computing |
|
09.20 – 09.50
|
Morning Keynote: We’re not a bankWhen I came to the construction industry from a heavily regulated telecommunications and IT services company I was often confronted with the statement “We’re not a bank”, meaning we do not need the level of security of the financial industry, we’re a construction company. This reminded me that the golden rule of cyber security is that it must be risk based, appropriate and balanced within the context of the business goals and objectives. This presentation is about understanding the threat landscape that the construction industry exists in and looks at the cyber security challenges faced by a diverse and global construction group involved in everything from residential houses to Nuclear power stations, leading in digital construction, working in multiple countries with different cyber maturity levels, cultural requirements and language barriers. It’s about being realistic and pursuing a pragmatic approach to evolving a security posture appropriate to the risks, not trying to “boil the ocean”, and transforming the perception of cyber security from ‘blocker’ to ‘enabler’ to construction workers and civil engineers. Ian Hill, Global Director of Cyber Security, Royal BAM Group |
|
09.50 –10.20 |
Presentation: How will YOU detect and respond to a data breach?In the next two years, your company is likely to be the victim of a data breach. How can you be ready to respond successfully, decreasing the impact of the attack? And what have other organisations done to be as prepared as possible? During this session we will explore Incident Response, the need for breach readiness from the boardroom down, and how this all relates to a 23 tonne truck. Mike Spradbery, Senior Technical Leader, IBM Security UK & Ireland |
|
10.20 – 11.00
|
Panel discussion: Who owns cyber-security in your organisation?
Andjela Djukanovic, Technology Risk Assistant Manager, KPMG
|
Workshop: You are the victim of a cyber attack, so what now? Effective management in a crisis.You are a member of an incident response team and you have 30 mins to decide how you are going to respond to a cyber attack. Good luck (you'll need it). Places are limited, to secure your place please contact Evert Lombaert at: Evert.Lombaert@incisivemedia.com Craig Roberts, European Solution Architect Resilient, IBM Security |
11.00 – 11.25
|
Morning break, networking and visit to exhibition area |
|
11.25 – 11.45
|
A New Era of Cyber Threats: The Shift to Self Learning, Self Defending Networks
Kit Kirby, Cyber Security Manager, Darktrace |
|
11.45 – 12.05
|
Continuous Compliance in the Coded Enterprise
Jeff Mery, VP Global Solutions Architects, CHEF |
|
12.05 – 12.25
|
Third-Party Risk Management: Overcoming Today's Most Common Security & Privacy Challenges
Alan MacGillivray, Privacy Consultant, OneTrust |
|
12.30 – 13.30
|
Lunch break, networking and visit to exhibition area |
|
13.30 – 14.10
|
Ex-Hacker Keynote: Malicious software developmentsA look into recent major malicious software attacks for the lessons learned; looking at how recent malicious software spreads and how this might develop in the future. Holly will aim to link malicious software propagation techniques to those techniques used by penetration testers to allow security teams to focus their efforts. Holly Grace Williams, Technical Director, Secarma |
|
14.10 – 14.50
|
Panel discussion: Making security an integral part of digital transformation
Jonathan Freedman, Head of Technology & Security, Howard Kennedy
|
|
14.50 – 15.10
|
Afternoon break, networking and visit to exhibition area |
|
15.10 – 15.35
|
Guest Speaker: Can employees ever become the strongest link in cybersecurity?We often hear employees described as the ‘weakest link’ in security - but what if we listened to them instead, and tried to understand why security policies are violated or phishing links clicked? In this talk, Prof. Joinson will discuss how people’s security (mis)behaviour can be understood, how it can be changed, and why we need to rethink how cybersecurity is managed within organisations Professor Adam Joinson, the University of Bath |
|
15.35 – 16.15
|
Panel discussion: Securing the future - should the focus shift from defending to containing attacks?
Lorenzo Grillo, Managing Director, Alvarez & Marsal
|
|
16.15 – 16.45
|
Closing Keynote: Overview of Cyber ThreatAn overview of the cyber threats, trends and highlights as observed by NCSC Senior representative, NCSC (confirmed) |
|
16.45 – 16.55 |
Closing remarksStuart Sumner, Editor Director, Computing, Delta & The Inquirer
|
|
16.55
|
Drink reception |
Global Director of Cyber Security
Royal BAM Group nv
Technical Director
Secarma
Quantum technology is usually considered too delicate to coexist with electronic devices
London Marriott Hotel Grosvenor Square Grosvenor Square, Mayfair, London W1K 6JP
Computing Cyber Security Live is free to attend for end-user IT professionals. If you are unsure about whether you qualify for this event, please contact rubie.romanay@incisivemedia.com
Senior Marketing Executive
Email: kristiyan.chovanski@incisivemedia.com
Tel: +44 (0)20 7484 9907