Getting Value from Cybersecurity Automation by Uleska
March 29 / 11:00 am – 11:45 am
As software development becomes more and more automated, how can security to keep up, scale and add value to the organisation?
SIGN IN / REGISTER TO RESERVE YOUR PLACEPractical Steps to Mitigate Your SaaS Supply Chain Risk by Ampliphae
March 29 / 12:00 pm – 12:45 pm
Many organisations are now adopting cloud-delivered software-as-a-service applications as part of their supply chain. The benefits of this move are clear, but the risks are not so obvious.
SIGN IN / REGISTER TO RESERVE YOUR PLACESecure behaviour change – it’s time for security awareness to adapt by Think Cyber
March 29 / 2:00 pm – 2:45 pm
The shift to working from home and the technology transformation required has impacted organisations all over the world. And this comes with significant cybersecurity implications. But current approaches to securing the human user are outdated, infrequent, complex and are also often boring or patronising.
SIGN IN / REGISTER TO RESERVE YOUR PLACEBridging the Gap: developing the latest technologies to grow the UK’s cyber ecosystem by Lloyds Banking Group
March 30 / 10:15 am – 11:00 am
As one of the largest financial institutions in the UK, Lloyds Banking Group is responsible for securing personal data for millions of customers. The organisation regularly collaborates with cyber scaleups to ensure its security practices remain at the forefront of industry innovation.
SIGN IN / REGISTER TO RESERVE YOUR PLACEWorking from home is here to stay – is your CyberSecurity up to the job? by CyberHive
March 30 / 11:00 am – 11:45 am
Recent global events have driven a shift in working patterns, with working from home becoming the norm rather than an exceptional situation. In this workshop, CyberHive will discuss some of the ground rules for securing a remote workforce.
SIGN IN / REGISTER TO RESERVE YOUR PLACEA global cyber ecosystem – the role of resilient supply chains by The CyberFish
March 30 / 1:00 pm – 1:45 pm
Cyber resilience is essential to any organisation’s security and productivity, but is often done in name only. CyberFish builds real resilience by practicing scenarios, assessing responses and proposing improvements to processes and technologies or behaviour.
SIGN IN / REGISTER TO RESERVE YOUR PLACECloud delivered security – why it’s the only path forward for securing hybrid infrastructure by Acreto
March 30 / 2:00 pm – 2:45 pm
Today’s hybrid infrastructure is driven by the rapid shift from on-premise applications to SaaS and cloud environments. Interconnecting and securing these new environments has proven to be complex and expensive and it requires a large number of security products.
SIGN IN / REGISTER TO RESERVE YOUR PLACELive Demo | Remote Working is here to stay. Cybersecurity for Files: the use of metadata by Storage Made Easy
March 31 / 10:00 am – 10:45 am
CISOs and CIOs have to contend with data compliance, data breaches and ransomware attacks. And with more and more people working from home, their jobs are only getting harder. Through an interactive workshop, Storage Made Easy will review this situation and deliver a demo.
SIGN IN / REGISTER TO RESERVE YOUR PLACEBuilding trust to succeed in a post-pandemic world by Dell Technologies
March 31 / 12:00 pm – 12:45 pm
The pandemic has accelerated the adoption of technology and many organisations have transformed their digital operations to continue to function and grow. How can organisations build greater trust and consumer confidence? Join Liz Green and Des O’Connor, UK Cyber Resilience leads at Dell Technologies, to explore.
SIGN IN / REGISTER TO RESERVE YOUR PLACEDefending against a live ransomware attack by Cyberbit
March 31 / 1:00 pm – 2:00 pm
Join Tony Rowan, a Cyberbit master trainer and security architect, as he completes a simulation of a ransomware attack using real malware and ransomware to encrypt files across a complete network.
SIGN IN / REGISTER TO RESERVE YOUR PLACEStaring into the Black Box – The Do’s and Don’ts of building AI cybersecurity platforms at scale by Verified Visitors
March 31 / 2:00 pm – 2:45 pm
VerifiedVisitors will look at the fundamentals of applying machine learning to your cybersecurity framework. How can you measure algorithm performance, assess labelled data and unlabelled data separation, testing and cross validation in a performant machine learning pipeline to deliver demonstrable customer benefits? Join us to find out.
SIGN IN / REGISTER TO RESERVE YOUR PLACE