Programme List - Computing Cyber Security Live 2019


08.30 – 09.00


09.00 – 09.05

Opening Remarks

Stuart Sumner, Editorial Director, Computing and The Inquirer

09.05 – 09.25

Computing Research:

John Leonard, Technology Analyst, Incisive Media

09.25 – 09.55

Morning Keynote: The fast-changing cyber threat landscape

  • Defending against automated and relentless bot attacks, detecting phishing attempts and “living off the land” attack
  • The vulnerabilities of your devices, old software and architecture
  • Visualising your attacker and anticipating future threats

09.55 – 10.40

Panel discussion: Who owns cyber-security in your organisation?

  • How to juggle sitting on the board, leading the security team and being responsible for the organisation’s security?
  • What is the scope of the SOC team’s responsibility?
  • How to create a security culture within the organisation and should staff be held accountable?

10.40 – 11.10

Morning break, networking and visit to exhibition area

11.10 – 11.30

How AI-based tools can tighten security

  • Defending against cyber-threats using AI and Machine learning, painting a picture of “normal” and detecting when things go wrong.
  • Detecting vulnerabilities in unseen parts of your network.
  • Using automation to prioritise the security team’s resources and lowering risk

11.30 – 11.50

Using automation to enhance security and keep up to date.

  • Digitally transforming the enterprise using automation without compromising security
  • Securing cloud assets and third-party services with continuous audits
  • Automating compliance


11.50 – 12.10

Fast-tracking compliance with GDPR

  • What do regulation and recent enforcement mean for your business and is there a business case for complying with regulation?
  • Could GDPR breaches be used to extort your business?
  • How could automation be used to ensure compliance?

12.10 – 12.30

Training staff and creating an effective organisational security culture

  • Understanding how your staff think about cybersecurity
  • Training staff effectively and keeping awareness high
  • Securing remote devices, both work and personal

12.30 – 13.30

Lunch break, networking and visit to exhibition area

13.30 – 14.10

Ex-Hacker Keynote: TBA

14.10 – 14.55

Panel discussion: Making security an integral part of digital transformation

  • How to go through digital transformation without compromising your security?
  • How to make sure service providers have covered all their (and your) bases?
  • How to make sure your apps and software are up to date and don’t clash?

14.55 – 15.15

Afternoon break, networking and visit to exhibition area


15.15 – 15.40

Incident response - how to manage security breaches?

  • Reducing detection and reaction time
  • Creating your incident response protocol
  • Damage control - containing the impact on the brand and business.

15.40 – 16.25

Panel discussion: Securing the future - should the focus shift from defending to containing attacks?

  • Would perimeter defence and staff training be enough to secure your organisation?
  • Could new defence approaches and solutions - “Zero trust”, reverting to old tech – provide the required security?
  • Should attacks be accepted as business as usual? How could they be detected earlier and defended against with greater efficiency?

16.25 – 16.30

Closing remarks

Stuart Sumner, Editorial Director, Computing and the Inquirer

16.30 – 17.30

Drinks reception