Workshops



Getting Value from Cybersecurity Automation by Uleska

March 29 / 11:00 am – 11:45 am

As software development becomes more and more automated, how can security to keep up, scale and add value to the organisation?

SIGN IN / REGISTER TO RESERVE YOUR PLACE
Value from Cyber Security

Practical Steps to Mitigate Your SaaS Supply Chain Risk by Ampliphae

March 29 / 12:00 pm – 12:45 pm

Many organisations are now adopting cloud-delivered software-as-a-service applications as part of their supply chain. The benefits of this move are clear, but the risks are not so obvious.

SIGN IN / REGISTER TO RESERVE YOUR PLACE
Ampliphae

Secure behaviour change – it’s time for security awareness to adapt by Think Cyber

March 29 / 2:00 pm – 2:45 pm

The shift to working from home and the technology transformation required has impacted organisations all over the world. And this comes with significant cybersecurity implications. But current approaches to securing the human user are outdated, infrequent, complex and are also often boring or patronising.

SIGN IN / REGISTER TO RESERVE YOUR PLACE
ThingCyber

Bridging the Gap: developing the latest technologies to grow the UK’s cyber ecosystem by Lloyds Banking Group

March 30 / 10:15 am – 11:00 am

As one of the largest financial institutions in the UK, Lloyds Banking Group is responsible for securing personal data for millions of customers. The organisation regularly collaborates with cyber scaleups to ensure its security practices remain at the forefront of industry innovation.

SIGN IN / REGISTER TO RESERVE YOUR PLACE
UK cyber ecosystem

Working from home is here to stay – is your CyberSecurity up to the job? by CyberHive

March 30 / 11:00 am – 11:45 am

Recent global events have driven a shift in working patterns, with working from home becoming the norm rather than an exceptional situation. In this workshop, CyberHive will discuss some of the ground rules for securing a remote workforce.

SIGN IN / REGISTER TO RESERVE YOUR PLACE
Cyberhive

A global cyber ecosystem – the role of resilient supply chains by The CyberFish

March 30 / 1:00 pm – 1:45 pm

Cyber resilience is essential to any organisation’s security and productivity, but is often done in name only. CyberFish builds real resilience by practicing scenarios, assessing responses and proposing improvements to processes and technologies or behaviour.

SIGN IN / REGISTER TO RESERVE YOUR PLACE
The Cyberfish

Cloud delivered security – why it’s the only path forward for securing hybrid infrastructure by Acreto

March 30 / 2:00 pm – 2:45 pm

Today’s hybrid infrastructure is driven by the rapid shift from on-premise applications to SaaS and cloud environments. Interconnecting and securing these new environments has proven to be complex and expensive and it requires a large number of security products.

SIGN IN / REGISTER TO RESERVE YOUR PLACE
Acreto Security

Live Demo | Remote Working is here to stay. Cybersecurity for Files: the use of metadata by Storage Made Easy

March 31 / 10:00 am – 10:45 am

CISOs and CIOs have to contend with data compliance, data breaches and ransomware attacks. And with more and more people working from home, their jobs are only getting harder. Through an interactive workshop, Storage Made Easy will review this situation and deliver a demo.

SIGN IN / REGISTER TO RESERVE YOUR PLACE
Storage Made Easy

Building trust to succeed in a post-pandemic world by Dell Technologies

March 31 / 12:00 pm – 12:45 pm

The pandemic has accelerated the adoption of technology and many organisations have transformed their digital operations to continue to function and grow. How can organisations build greater trust and consumer confidence? Join Liz Green and Des O’Connor, UK Cyber Resilience leads at Dell Technologies, to explore.

SIGN IN / REGISTER TO RESERVE YOUR PLACE
post-pandemic

Defending against a live ransomware attack by Cyberbit

March 31 / 1:00 pm – 2:00 pm

Join Tony Rowan, a Cyberbit master trainer and security architect, as he completes a simulation of a ransomware attack using real malware and ransomware to encrypt files across a complete network.

SIGN IN / REGISTER TO RESERVE YOUR PLACE
Ransomware Attack

Staring into the Black Box – The Do’s and Don’ts of building AI cybersecurity platforms at scale by Verified Visitors

March 31 / 2:00 pm – 2:45 pm

VerifiedVisitors will look at the fundamentals of applying machine learning to your cybersecurity framework. How can you measure algorithm performance, assess labelled data and unlabelled data separation, testing and cross validation in a performant machine learning pipeline to deliver demonstrable customer benefits? Join us to find out.

SIGN IN / REGISTER TO RESERVE YOUR PLACE
VerifiedVisitors