Free Seminar Theatres

 

Tuesday 27th March

Time Topic
10:00
Using AI to address resource constraints in web security
Advanced web-application security using artificial intelligence to detect and classify attack data
Stuart Laidlaw, CEO, Cyberlytic
10:20
Build resiliency into your security
In the realm of cyber attacks, the prepared survive; the resilient thrive. Let us help you establish security that goes beyond protecting your business to become your competitive edge. As publisher of the annual Verizon Data Breach Investigations Report, we use our experience and threat intelligence to help organizations improve their network security, compliance, incident response and more. Start becoming more resilient today.
Verizon
10:40
The future of defence against advanced attackers: how deception technologies will keep your critical assets secured 
Ofer Israeli , Chief Executive Officer and Founder, Illusive Networks 
11:00
Tackling the Risks of Open Source Security: 5 Things You Need to Know
Open Source has become the key building block for application development in today's market, where companies are under constant pressure to accelerate time to market. The increasing adoption of open source components, however, has introduced new security challenges that most teams are not prepared to mitigate in their current posture. 
In this session, we will present 5 approaches and best practices that security teams should implement in order to enable their developers to harness the power of open source without slowing them down or compromising on security.
David Habusha , VP Product, WhiteSource
11:20
Commoditising security through APIs
Ensuring consistency of security across devices and networks in an organisation's IT infrastructure remains a major challenge with the widespread use of BYOD and cloud technologies. APIs can enable security as a service for greater consistency and reliability of security across the organisation's infrastructure. SQR will share their insights on how organisations can better manage their risk exposure while developing products faster with security by default.
Nithin Thomas , CEO, SQR Systems
11:40
Do you know your customer from a fraudster?
How can enterprises recognise their customers and detect imposters by analysing their online behaviour?
Donal Carville, CEO, Circadian
12:00
The perimeter is dead, long live the perimeter
Last year's WannaCry outbreak initially spread via internet-exposed SMB ports, proving that perimeter security is very much alive and kicking. Find out some of the alarming and common mistakes companies make on their most exposed systems, discovered by Intruder's unique approach to continuous perimeter security.
Chris Wallis , Founder, Intruder 
12:20
Deception - probably the best value tool in your defense arsenal
Attackers have always had the edge over defenders. Deception is a way to change that.
Simo Kohonen , Founder and CEO, Aves Netsec   
13:00
Hackerproof file sharing & team chat designed for business.
Cybercrime costs the global economy $375-$575Billion/year. ClearChat is a tool that helps mitigate these costs & risks for businesses.
Andy Johnson , Co-Founder and CPO, HighSide
13:20
The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks
Charles Appleton , Senior Cyber Security Manager, Darktrace 
13:40
Protecting the endpoint with web isolation​ 
Is your IT fit for purpose? 
Henry Harrison , CTO, Garrison   
14:00
Cyber security ratings: how external independent ratings are driving information security benchmarking and vendor risk management 
Cyber Security Ratings are transforming how organisations evaluate cyber risk and security performance by employing the outside-in model used by credit rating agencies.
These ratings are helping organisations answer questions on the prioritization and effectiveness of their cyber security investments, making comparisons with their peers and gaining insight into the risks suppliers, 4th parties, subsidiaries and acquisitions are adding.
  James Warriner, EMEA Channel Manager, BitSight
14:20
Streamlining data encryption to give your business a competitive edge
Today’s evolving threats have made cybersecurity a business concern as well as an IT issue. At the same time, prioritizing risks and correcting the system configuration problems require greater security acumen than ever before. Partnering with cybersecurity experts can be the fastest way to achieve your data protection goals, while freeing your IT staff to return to other mission-critical projects.
HelpSystems 
14:40
Streamlining data encryption to give your business a competitive edge 
Today’s evolving threats have made cybersecurity a business concern as well as an IT issue. At the same time, prioritizing risks and correcting the system configuration problems require greater security acumen than ever before. Partnering with cybersecurity experts can be the fastest way to achieve your data protection goals, while freeing your IT staff to return to other mission-critical projects.
HelpSystems​ 
 
 
 
 

 

Wednesday 28th March

Time Topic
10:00
Making Endpoints Safe Again
Our offensive techniques detect known malicious behaviors, stop them before they do any damage to the endpoint.
Hen Lamay , CEO, Deceptive Bytes
10:30
Comply or die; or why GDPR is one of the best things that have happened yet
GDPR is portrayed as a threatening, insurmountable and unwelcome burden for businesses. In this talk we demonstrate the contrary. For those who are ready and willing GDPR is probably one of the greatest business opportunities of this century. We will show not only how to get ready as fast as possible, but also how businesses can increase revenue by more than 15%.  
Thomas Seidling , Head of Relationships, CyberSmart 
11:00
Anonymisation. Sharing data securely by maximising privacy and utility in your data.
How to implement anonymisation and how it can be used as a tool to contribute to GDPR compliance
Harry Keen , Founder, Anon AI
11:30
How to empower your clients to protect themselves online
The security industry has been getting it all wrong when it comes to enabling people to protect themselves online. We keep trying to train people when in fact over 60% of us would rather just be told what to do! Most individuals simply don’t care enough or don’t have the time to learn about cyber security. Find out how the world’s first Personal Cyber Score is changing the way people protect themselves by simply telling them what to do. 
Andrew Martin , Founder and CEO, DynaRisk 
12:00
An AI Engine​
The Galaxkey Data Protection – Artificial Intelligence Engine is a versatile platform that helps customers to quickly and continuously identify, classify, protect and manage data on-premise and in the cloud. So that you and your company have the assurance that your data is classified and protected.
Ricky Magalhaes, Galexkey​ 
12:30
For the love of community
- The value of the Information Security volunteering community for professionals
- The value of the Information Security volunteering community for the general public
- The value of the Information Security volunteering community for the profession and industry
- Active Information Security volunteering initiatives
James Packer , President - ISC2 London Chapter, ISC2 London Chapter
13:00
Train through gamification
How to engage your in-house talent to fight an evolving threat landscape
James Hadley , CEO, Immersive Labs
 
 
 
 
 
 
   
 

Cyber Security Congress

TO SPONSOR / EXHIBIT

Harry Fox
+44 (0)207 092 1222
Harry.Fox@terrapinn.com

TO SPEAK

Jennifer Clark
t/ +44 (0)207 092 1220
jennifer.clark@terrapinn.com

TO REGISTER

Tayyab Abbasi
+44 (0)207 092 1210
tayyab.abbasi@terrapinn.com


 

The Cyber Security Congress is two events: A world-class conference where business leaders from around the world meet; and, a unique cyber security and information technology exhibition. To visit the exhibition is free. There is, naturally, a registration fee to attend the conference.