Day 1 - 24 November 2020


Registration Opens


Cyber Security Solutions: Chair’s Welcome & Opening Comments


Presentation: How Hackers Attack

  • How you and your organisation can be exploited into helping hackers into your systems.
  • Learn how to detect social engineering & manipulation. 
  • Hear from a real-life hacker on how their process works and how they ply their trade. 


Senior Representative, Bitglass



Associated Talks:

10:45AM - Day 1

View Presentation: Cloud Access Security Brokers – How to Protect your Cloud Data

View Full Info

Presentation: Cloud Access Security Brokers – How to Protect your Cloud Data

  • How CASBs can help increase confidence about your organizations’ cloud service  
  • Governing usage, securing data and protecting against threats 
. Senior Representative, Bitglass, Bitglass, .


Presentation: Software as a Service – Fuelling a Competitive Security Advantage?

  • From Google to Facebook: Defining SaaS 
  • How is it shaping the way we work, play and connect? 
  • Exploring the ways SaaS is making your daily life more secure 


Presentation: Zero Trust: Balancing Resilience and User Experience

  • How can Zero Trust architecture address today’s security challenges of a mobile workforce and data in the cloud? 
  • How can you exert control and reduce your attack surface? 
  • Protecting user identity, devices and applications 


Presentation: The Top Cloud Security Challenges for 2020

  • How does cloud architecture vs. Traditional networks pose different problems for security teams? 
  • How can you easily assess your overall cloud security status? 
  • Top tips for ensuring regulatory compliance 


Panel: Using the Cloud Securely

  • How to choose the best cloud strategy for your business 
  • Public, Private or Hybrid: How architecture impacts security 
  • Addressing the risks of the Cloud as a big data centre  
  • What impact does cloud security have on consumers? 


Networking Break


Presentation: Open Source – Friend or Foe?

  • With security budgets as tight as ever, is it safe to take advantage of the many open source tools available? 
  • What should we consider when evaluating the benefits?  
  • Considering the development team, user community & documentation 
  • Examples of the most useful open source projects 


Senior Representative, Synack



Associated Talks:

02:05PM - Day 1

View Presentation: Using Hackers to Beat Hackers – Innovation with Synack

View Full Info

Presentation: Using Hackers to Beat Hackers – Innovation with Synack

Talk information to follow…

. Senior Representative, Synack, Synack, .


Presentation: Time to Grow Up – How Mature is your Organisation?

  • Why being aware of your security maturity is important 
  • Is security really a part of your culture or are you just paying lip service?  
  • How to optimise your security program to align with industry best practices. 


Presentation: Remote Working – a Blessing or a Curse?

  • Closing the gap between desktop and mobile security can be a horrendous task for security teams How can you ensure devices are protected without invading privacy? 
  • Is isolation good for security? 
  • How can you ensure your email security is up to scratch? 


Presentation: Are You Breach Ready?

  • Do you have plans in place to respond and recover from a breach? 
  • How to equip your board  
  • Ensuring you have the correct crisis support 


Presentation: Driving Progress in a Digital World – Reducing Risk in Your Supply Chain

  • Effective risk management allows organisations to take full advantage of new opportunities. How can you ensure you can trust your partners?  
  • How to insure against future risk  
  • Ensuring collaboration is your best protection 


Presentation: Is Your Data a Tough Nut to Crack?

  • Locating and prioritising your data – encrypting at rest and in transit 
  • Choosing the best key management solution 
  • The role of emerging technologies – blockchain & quantum computing 


Data Masking


Kubernetes & Container Security


Blockchain for Data Protection


Panel: The Role of Emerging Technology in Security

  • The biggest advancements in cyber security tech and what can we expect from the next 5 years? 
  • What is the impact of increased use of Artificial Intelligence, Machine Learning and Deep Learning? 
  • What role will technologies like blockchain, behavioural analytics and biometrics have in securing our future identities and combating fraud? 


Session Close

Networking Party | 6pm-10pm | Strandzuid, RAI

An evening of networking on Tuesday 25th November from 6pm. Access for Ultimate, Gold &Expo Plus holders in addition to speakers, sponsors, press & exhibitors. Taking place at Strandzuid, RAI. Join us for drinks & networking

Day 2 - 25 November 2020


Registration Opens


Cyber Security Solutions Day 2: Chair’s Welcome & Opening Remarks


Piotr Jozefczyk

Cyber Security Manager

Santander Bank Polska

Associated Talks:

10:45AM - Day 2

View Presentation: Cyber Crime: Detection, Prevention and Recovery

View Full Info

Presentation: Cyber Crime: Detection, Prevention and Recovery

  • What is cybercrime and how is it different from public perception?  
  • How can you protect yourself? 
  • Recent examples of organizations falling foul to online criminals 
. Piotr Jozefczyk, Cyber Security Manager, Santander Bank Polska


Presentation: Multiply Your Impact: Managed Services

  • Defining managed services 
  • Top 10 benefits of using managed services 
  • Best practices for selecting a provider 


Presentation: Under the Microscope with Network Forensics

  • What is network forensics? 
  • Evaluating ‘catch-it-as-you-can’ and ‘stop, look and listen’ systems 
  • How real time analytics can influence better decision making 


Presentation: From Developer to Deployment: How to Streamline Application Security Testing

  • How can security solutions help you integrate security into your DevOps environment? 
  • Breaking through traditional testing processes and tools 
  • Building secure high-quality software faster 


Panel: Secure Scalability: DevSecOps for the Agile Business

  • How to make your security agile – updating Appsec for a DevOps world 
  • Defining application security – cloud, mobile and web 
  • Discussing common development vulnerabilities and how to secure your data against them 
  • Best practices to ensure your processes run smoothly 


Networking Break


Presentation: Bug Bounty Programs: The Devil You Know?

  • What role can white and grey hat hackers play in developing secure systems? 
  • Benefits and challenges – getting senior level buy in and best practices when considering a hack 
  • Examples of organisations doing this successfully 


Presentation: The 2020 Threat Landscape

  • A deep dive into predictions for the 2020 threat landscape 
  • Key actions you can take to protect yourself as an organisation 
  • Top resources to support your efforts 


Presentation: SIEM for the Future

  • How implementing a Security Information & Event Management system can protect your organization  
  • Solving problems with your SIEM data 
  • Using SIEM for compliance & capacity management projects 


Go phish! Don’t get Hacked by Email

  • Can you completely safeguard employee communication? 
  • Protection at the email perimeter, inside the network and beyond the perimeter 
  • The latest updates in phishing techniques 


Panel: Detect & Protect: Navigating Network Vulnerability

  • The basics – discovery, reporting, prioritization & response 
  • How vulnerability management fits into risk and governance policies 
  • The importance of continuous vulnerability management 


Cyber Security Solutions: Chair’s Closing Remarks


Session Close