Cyber Security Theatre - sponsored by Lloyds Bank
Join Cyber Security Experts in the Lloyds Bank Cyber Security Theatre where both days will welcome industry experts who can help to make sure that you know everything needed to minimise the threat of a cyber attack or data breach.
Wednesday 21st March
Thursday 22nd March
Colin Tankard - Digital Pathways Ltd
The seminar will discuss the challenges of using multiple encryption strategies, the issues involving encryption in the cloud and then give practical advice and solutions to fixing the problem and building a secure and compliant environment. A key area to be presented will be the concept of Bring Your Own Encryption (BOYE) and how this can enable any size organisation to control their own encryption keys.
Peter Bassill - Hedgehog Security
We explore the five most common causes of breaches, how they occurred and what happened in the moments following. From this we will take away, how attackers will target you, what to look for and how to react to an attack
Andrew Hollister - LogRhythm
By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, according to Gartner Research. The earlier you detect and mitigate a threat, the less the ultimate cost to your business. By implementing an effective end-to-end threat management process that focuses on reducing detection and response times, you will have the ability to prevent high-impact security incidents, such as major data breaches. The process, known as Threat Lifecycle Management (TLM) can help you improve the efficiency of your security operations.
Nicky Meekings & Scott Riley - Microsoft & GCI
Office 365 and Windows 10 have some of the most powerful security, mobility and communication features built-in. However many firms still run old versions and then compensate with additional tools causing headaches for their users. This session explores the freedom and simplicity that enables users to work from anywhere whilst automatically protecting and classifying data to keep your firm secure. Or at least it would, if you turned it on.
Joel Windels - Wandera
Join this talk to find out more about the biggest trends in the mobile threat landscape, including mobile phishing, cryptojacking, and next gen malware.
John Lyons - Cyber Essentials Direct Ltd
For the Business world today – the threat from the Internet is huge – and getting ever greater. In the war against Cybercrime it’s become all about survival. This session outlines the key factors we need to consider if we are to better protect our businesses against the devastating impact of cyber-attack, and demonstrates the importance of having in place a robust, universally adopted Cyber Security Strategy to underpin our business operations.