Programme @

ECS uk

Enterprise Cyber Security

27 September 2022

London

Programme @ ECS uk

Session One

enterprise cybersecurity in a hyper-disruptive, major-event driven world

  • New and emerging dominant cyber threats to business today
  • Cybersecurity: Build trust, visibility, and resilience
  • Big game hunters adopt data extortion methods
  • eCrime Enablers as the sinister innovator we need to disrupt
  • Embracing diversity, neurodiversity and neurodivergence in a cyber environment
  • CISO Talk: security in the age of the virtual enterprise

09:00 (BST)

Conference Chair's Opening Address

09:05 (BST)

New and emerging dominant cyber threats to business today

Year on year, protecting organisations from cyberattacks seems to only intensify in difficulty.

The last 18 months proved no different as millions of workers retreated to makeshift offices causing a feeding frenzy amongst bad actors as the enterprise went virtual only.

As we slowly but surely return to normal, with a hybrid working environment being the most common denominator amongst large scales enterprises, now is the time to re-calibrate our approach to cybersecurity, understand what threats have increased, and best defend sensitive data and networks.

We address:

  • The rise and rise of ransomware
  • The popularisation of social engineering attacks
  • Advances in targeted intrusion methods

09:20 (BST)

Cybersecurity: Build trust, visibility, and resilience

Today’s network-dependent organisation faces an array of challenges and threats. Information and its critical role manifest in many different ways and formats and are subject to countless outlets for distribution and sharing. Organisations find themselves balancing several factors.

We address, how to manage and protect information within the confines of an organisation’s best interest, overcome the layering of previously consistent organisational boundaries in the shift to greater virtualisation, and address not only risks on the edges of the next technological advance but also within the core fundamentals of IT management.

09:35 (BST)

Big game hunters adopt data extortion methods

Data extortion is a tried-and-true tactic, and even the act of combining data extortion with a ransomware operation is not new to 2021.

What marks a departure from previous BGH operations is the accelerated adoption of the data extortion technique and the introduction of dedicated leak sites (DLSs) associated with specific ransomware families.

These approaches were adopted by at least 23 ransomware operators in 2021.

In this session, we look at the growing popularity of BGH adopting new ransomware variants, the recipients of such attacks, and what can be done to arrest the disruption it causes to day-to-day business operations.

09:50 (BST)

eCrime Enablers as the sinister innovator we need to disrupt

Enablers are a pivotal part of the eCrime ecosystem, providing criminal actors with capabilities they may otherwise not have access to.

These actors run malware-as-a-service operations, specialize in delivery mechanisms, or exploit networks in order to sell initial access to other criminal actors.

We look at the eCrime ecosystem, how adversaries work with, and even purchase from, other actors in order to enhance their own campaigns, maximise profitability and increase the possibility of their success.

10:05 (BST)

Embracing diversity, neurodiversity and neurodivergence in a cyber environment

Addressing the skills gap and strengthening your own security team means bringing in different minds and perspectives — and that starts with embracing neurodiversity.

To even have a chance at closing the cybersecurity skills gap, we need people with a variety of different abilities and thought processes. But did you know that there’s an untapped potential in individuals who are neurodivergent?

We address, the value in having a team made up of different operating models, how vital neurodiverse individuals can be to the cybersecurity industry, and the inherent traits in neurodiverse individuals that makes them uniquely suited for working in cybersecurity.

10:20 (BST)

Questions to the Panel of Speakers

10:35 (BST)

Refreshment Break Served in the Exhibition Area

11:05 (BST)

Panel Discussion and Audience Q&A

CISO Talk: security in the age of the virtual enterprise

Coronavirus has forever altered the culture of work completely, whilst introducing many challenges. Some of the challenges are well-known, and some are new to us; however, the extent and pace of these challenges is still ongoing and has left many organisations and security professionals in a state of flux.

It is the role of the CISO to ensure that the business and its workforce maintains a positive cybersecurity aware culture, whether that be as a fully virtual enterprise, a hybrid model of working or an attempt at a return to pre-pandemic ways of working.

Join us as we explore the key priorities of the CISO in the post-pandemic cybersecurity ecosystem.

11:35 (BST)

Questions to the Panel of Speakers & Delegates move to the Seminar Rooms

11:50 (BST)

Seminar Sessions

12:30 (BST)

Networking Lunch Served in the Exhibition Area

Session Two

aligning new and emerging tech with your current tools, technologies and processes

  • Moving project security from checklist compliance to real business value generation
  • Security and privacy as digital transformation enablers
  • The power of disinformation in a cyber enabled world
  • Mitigate cyber risk and accelerate security insights
  • Responding to cyber security crises: the human factors
  • CTI: Challenging the Implementation of Cyber Threat Intelligence programs at any organization
  • Operationalising MITRE ATT&CK Framework

13:30 (BST)

Conference Chair’s Afternoon Address

13:35 (BST)

Moving project security from checklist compliance to real business value generation

When development and implementation projects look at security, the call far too often goes in the direction of ‘’What do I need to do to get this into production?“.

This leads to the projects just checking off their security list at best, or having the projects come to a grinding halt just pre-release at worst.

This session will show how to employ a Business-Led Unified Enterprise Security (BLUES) approach to clearly focus on the business objectives of a project, leading to greater acceptance by business leaders of Security by Design principles and the cybersecurity team as a business-enabling partner.

  • Ensuring that the cyber security approach is aligned with the business objectives that a project is aiming to achieve
  • Identifying threats and opportunities towards the business goals from a cyber security perspective
  • Defining cyber security objectives and measures for the projects
  • Assisting in implementation and ongoing operation of the measures in order to ensure business success

13:50 (BST)

Security and privacy as digital transformation enablers

Digital transformation is carried out through the due process. By integrating cybersecurity into this process, you can make sure that your business successfully digitizes business operations.

Security and privacy form a part of the trusted relationships of a modern extended enterprise. By closely linking cybersecurity and privacy as you digitally transform your company, you will reduce the risk of a cyber-attack, de-risk your organization’s data processing operations, and protect your reputation and brand.

We address, how you can successfully leverage your digital transformation and improve digital trust.

14:20 (BST)

The power of disinformation in a cyber enabled world

Well-executed disinformation initiatives, whether conducted by bad actors, business adversaries, or hostile nation-states, have the potential to lead to misinformed business-critical decision making, a misperception of security capabilities, and irreparable reputational harm.

In the age of hyper-disinformation, the need to combat false news is more apparent than ever.

Join us as we discuss the role that big data analytics and defensive AI can play in the fight back against this assault on truth and trust.

14:20 (BST)

Questions to the Panel of Speakers

14:35 (BST)

Afternoon Networking and Refreshments served in the Exhibition Area

15:05 (BST)

Mitigate cyber risk and accelerate security insights

All data is security-relevant and defending against threats involves every department in a company. With cyber threats and bad actors constantly evolving, it is imperative for everyone in an organization to come together to identify and protect critical data.

Deciding where to start when it comes to business risk is a daunting task. This is where a risk mitigation plan comes into play.

We address:

  • How to prioritize risks with the least amount of impact on an organization
  • The real-world cost and impact of a breach
  • How the right platform can help your organization develop a risk mitigation plan

15:35 (BST)

Afternoon Networking and Refreshments served in the Exhibition Area

16:05 (BST)

Responding to cyber security crises: the human factors

Most IR plans are technology-centric and address issues like malware detection, data theft, and service outages. However, any significant cyber-attack can affect an organization across functions in multiple ways, so the plan should also encompass areas such as HR, finance, customer service, employee communications, legal, insurance, public relations, regulators, suppliers, partners, local authorities, and other outside entities.

We address, how to establish a holistic, comprehensive IR plan which you can execute with confidence as well as revisit and amend in line with organisational, adversarial, and technological changes.

16:20 (BST)

CTI: Challenging the Implementation of Cyber Threat Intelligence programs at any organization

In this presentation, we will discuss trial/error, what works and what hasn’t when it comes to developing and driving a successful Cyber Threat Intelligence program.

Areas to cover:

  • You have no CTI program, where do you even begin?
  • Do you really need all of those paid vendor intelligence tools?
  • How do you scope intelligence collection and communication? Establishing Priority Intelligence Requirements
  • CTI for Incident Response, SecOps, Red Team, Third-Party Risk, and more

16:35 (BST)

Operationalising MITRE ATT&CK Framework

MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

Many enterprises use the ATT&CK knowledge base as a foundation for the development of specific threat models for cyber adversary behaviour, reflecting on the various phases of an adversary’s attack lifecycle and the platforms they are known to target.

We address, how you can operationalise MITRE ATT&CK within your organisation.

Topics covered include:

  • MITRE ATT&CK Overview
  • Contextualising MITRE ATT&CK within the Enterprise
  • Demonstrating the Use of MITRE ATT&CK in action

16:50 (BST)

Questions to the Panel of Speakers

00:00 (BST)

Closing Remarks from the Conference Chair

17:05 (BST)

Conference Closes

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Hybrid Working Fuels Business Fears
Over 8 in 10 UK businesses are saying that hybrid working greatly increases their data breach risk, with over a fifth being unprepared for one when it would occur. Speed of response has been labelled as the main concern, and with business owners looking at 43% of their workforces to be hybrid working in the...
China the Focus for Cyber Sabotage
The UK and allies, including the US and Canada, have released recent statements accusing the Chinese government of “systematic cyber-sabotage”, believing that state-sponsored hackers were behind an early 2021 attack that compromised around the figure of 400,000 worldwide servers and leaving them open and exposed to cybercriminals. Tied to Beijing In the UK alone, more...
The ransomware that shows up everywhere but the headlines
The most reported ransomware strain of 2021 so far – accounting for around 71% of the total – is not a headline grabbing, multi-million-dollar ransom threat targeting a large enterprise, but a file-encrypting virus called DJVU or STOP ransomware that targets home users and has more than 290 variations. It’s important to keep things in perspective and to remember...