Programme @

ECS uk

Enterprise Cyber Security

27 September 2022

Guoman Tower Hotel, London

Programme @ ECS uk

Session One

enterprise cybersecurity in a hyper-disruptive, major-event driven world

  • New and emerging dominant cyber threats to business today
  • Cybersecurity: Build trust, visibility, and resilience
  • Big game hunters adopt data extortion methods
  • eCrime Enablers as the sinister innovator we need to disrupt
  • Embracing diversity, neurodiversity and neurodivergence in a cyber environment
  • CISO Talk: security in the age of the virtual enterprise

09:00 (BST)

Conference Chair's Opening Address

09:05 (BST)

New and emerging dominant cyber threats to business today

Edward Tucker
Senior Director Cyber Security, The Workshop - Inventors of Play
view profile

Edward Tucker, Senior Director Cyber Security, The Workshop – Inventors of Play

Year on year, protecting organisations from cyberattacks seems to only intensify in difficulty.

The last 18 months proved no different as millions of workers retreated to makeshift offices causing a feeding frenzy amongst bad actors as the enterprise went virtual only.

As we slowly but surely return to normal, with a hybrid working environment being the most common denominator amongst large scales enterprises, now is the time to re-calibrate our approach to cybersecurity, understand what threats have increased, and best defend sensitive data and networks.

We address:

  • The rise and rise of ransomware
  • The popularisation of social engineering attacks
  • Advances in targeted intrusion methods

09:20 (BST)

Cybersecurity: Build trust, visibility, and resilience

Today’s network-dependent organisation faces an array of challenges and threats. Information and its critical role manifest in many different ways and formats and are subject to countless outlets for distribution and sharing. Organisations find themselves balancing several factors.

We address, how to manage and protect information within the confines of an organisation’s best interest, overcome the layering of previously consistent organisational boundaries in the shift to greater virtualisation, and address not only risks on the edges of the next technological advance but also within the core fundamentals of IT management.

09:35 (BST)

Big game hunters adopt data extortion methods

David Mansilla
Head of Cyber Risk & Compliance, Vodafone
view profile

David Mansilla, Head of Cyber Risk & Compliance, Vodafone

Data extortion is a tried-and-true tactic, and even the act of combining data extortion with a ransomware operation is not new to 2021.

What marks a departure from previous BGH operations is the accelerated adoption of the data extortion technique and the introduction of dedicated leak sites (DLSs) associated with specific ransomware families.

These approaches were adopted by at least 23 ransomware operators in 2021.

In this session, we look at the growing popularity of BGH adopting new ransomware variants, the recipients of such attacks, and what can be done to arrest the disruption it causes to day-to-day business operations.

09:50 (BST)

eCrime Enablers as the sinister innovator we need to disrupt

Enablers are a pivotal part of the eCrime ecosystem, providing criminal actors with capabilities they may otherwise not have access to.

These actors run malware-as-a-service operations, specialize in delivery mechanisms, or exploit networks in order to sell initial access to other criminal actors.

We look at the eCrime ecosystem, and how adversaries work with and even purchase from, other actors in order to enhance their own campaigns, maximise profitability and increase the possibility of their success.

10:05 (BST)

Building Diverse Security Teams: Different Points of View to Complex Problems

Einat Segal
Cyber Security Operations Manager, Clarion Housing Group
view profile

Einat Segal, Cyber Security Operations Manager, Clarion Housing Group

With the growing demand for security talent, recruiting and building a good security team is a tremendous challenge. We want to bring people in to support already stretched teams and to fit in culturally with us and our organisations. Is it difficult to find people because they aren’t there, or is it because we’ve narrowed our own perception?

• Building good security means solving many complex problems that need to be looked at from different angles. Just as we layer our solutions to mitigate as many risks as possible, we need to apply the same to our teams.

• A strong security team needs to have diverse skillsets and different modes of thought and that also means diverse backgrounds.

• Not all people are given equal opportunities in life. Recruiting requirements should stop being limited to backgrounds that will only open doors to a small subset of people.

• The real change should start with us. We must take time and learn to listen to people different from us, choosing a creative and proactive approach towards developing and growing our security teams.

10:20 (BST)

Questions to the Panel of Speakers

10:35 (BST)

Refreshment Break Served in the Exhibition Area

11:05 (BST)

Panel Discussion and Audience Q&A

CISO Talk: security in the age of the virtual enterprise

Coronavirus has forever altered the culture of work completely, whilst introducing many challenges. Some of the challenges are well-known, and some are new to us; however, the extent and pace of these challenges is still ongoing and has left many organisations and security professionals in a state of flux.

It is the role of the CISO to ensure that the business and its workforce maintains a positive cybersecurity aware culture, whether that be as a fully virtual enterprise, a hybrid model of working or an attempt at a return to pre-pandemic ways of working.

Join us as we explore the key priorities of the CISO in the post-pandemic cybersecurity ecosystem.

11:35 (BST)

Questions to the Panel of Speakers & Delegates move to the Seminar Rooms

11:50 (BST)

Seminar Sessions

12:30 (BST)

Networking Lunch Served in the Exhibition Area

Session Two

aligning new and emerging tech with your current tools, technologies and processes

  • Moving project security from checklist compliance to real business value generation
  • Security and privacy as digital transformation enablers
  • The power of disinformation in a cyber enabled world
  • Mitigate cyber risk and accelerate security insights
  • Responding to cyber security crises: the human factors
  • CTI: Challenging the Implementation of Cyber Threat Intelligence programs at any organization
  • Operationalising MITRE ATT&CK Framework

13:30 (BST)

Conference Chair’s Afternoon Address

13:35 (BST)

Moving project security from checklist compliance to real business value generation

Gaus Rajnovic
Cyber Security Manager, Panasonic
view profile

Gaus Rajnovic, Cyber Security Manager, Panasonic

When the development and implementation projects look at security, the call far too often goes in the direction of ‘’What do I need to do to get this into production?“.

This leads to the projects just checking off their security list at best, or having the projects come to a grinding halt just pre-release at worst.

This session will show how to employ a Business-Led Unified Enterprise Security (BLUES) approach to clearly focus on the business objectives of a project, leading to greater acceptance by business leaders of Security by Design principles and the cybersecurity team as a business-enabling partner.

  • Ensuring that the cyber security approach is aligned with the business objectives that a project is aiming to achieve
  • Identifying threats and opportunities towards the business goals from a cyber security perspective
  • Defining cyber security objectives and measures for the projects
  • Assisting in the implementation and ongoing operation of the measures in order to ensure business success

13:50 (BST)

Security and privacy as digital transformation enablers

Digital transformation is carried out through the due process. By integrating cybersecurity into this process, you can make sure that your business successfully digitizes business operations.

Security and privacy form a part of the trusted relationships of a modern extended enterprise. By closely linking cybersecurity and privacy as you digitally transform your company, you will reduce the risk of a cyber-attack, de-risk your organization’s data processing operations, and protect your reputation and brand.

We address, how you can successfully leverage your digital transformation and improve digital trust.

14:20 (BST)

The power of disinformation in a cyber enabled world

Well-executed disinformation initiatives, whether conducted by bad actors, business adversaries, or hostile nation-states, have the potential to lead to misinformed business-critical decision making, a misperception of security capabilities, and irreparable reputational harm.

In the age of hyper-disinformation, the need to combat false news is more apparent than ever.

Join us as we discuss the role that big data analytics and defensive AI can play in the fight back against this assault on truth and trust.

14:20 (BST)

Questions to the Panel of Speakers

14:35 (BST)

Afternoon Networking and Refreshments served in the Exhibition Area

15:05 (BST)

Mitigate cyber risk and accelerate security insights

All data is security-relevant and defending against threats involves every department in a company. With cyber threats and bad actors constantly evolving, it is imperative for everyone in an organization to come together to identify and protect critical data.

Deciding where to start when it comes to business risk is a daunting task. This is where a risk mitigation plan comes into play.

We address:

  • How to prioritize risks with the least amount of impact on an organization
  • The real-world cost and impact of a breach
  • How the right platform can help your organization develop a risk mitigation plan

15:35 (BST)

Afternoon Networking and Refreshments served in the Exhibition Area

16:05 (BST)

Responding to cyber security crises: the human factors

Most IR plans are technology-centric and address issues like malware detection, data theft, and service outages. However, any significant cyber-attack can affect an organization across functions in multiple ways, so the plan should also encompass areas such as HR, finance, customer service, employee communications, legal, insurance, public relations, regulators, suppliers, partners, local authorities, and other outside entities.

We address, how to establish a holistic, comprehensive IR plan which you can execute with confidence as well as revisit and amend in line with organisational, adversarial, and technological changes.

16:20 (BST)

CTI: Challenging the Implementation of Cyber Threat Intelligence programs at any organization

In this presentation, we will discuss trial/error, what works and what hasn’t when it comes to developing and driving a successful Cyber Threat Intelligence program.

Areas to cover:

  • You have no CTI program, where do you even begin?
  • Do you really need all of those paid vendor intelligence tools?
  • How do you scope intelligence collection and communication? Establishing Priority Intelligence Requirements
  • CTI for Incident Response, SecOps, Red Team, Third-Party Risk, and more

16:35 (BST)

Operationalising MITRE ATT&CK Framework

MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

Many enterprises use the ATT&CK knowledge base as a foundation for the development of specific threat models for cyber adversary behaviour, reflecting on the various phases of an adversary’s attack lifecycle and the platforms they are known to target.

We address, how you can operationalise MITRE ATT&CK within your organisation.

Topics covered include:

  • MITRE ATT&CK Overview
  • Contextualising MITRE ATT&CK within the Enterprise
  • Demonstrating the Use of MITRE ATT&CK in action

16:50 (BST)

Questions to the Panel of Speakers

00:00 (BST)

Closing Remarks from the Conference Chair

17:05 (BST)

Conference Closes

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

 Cyber Security Funding Continues to Skyrocket
Among the biggest record cash injections during and following the global pandemic, cybersecurity startups have been among the highest – including Beyond Identity securing $100m Series C funding. Beyond Identity Beyond Identity’s rise has seen the total invested into the startup reach a total of £205m, with Evolution Equity Partners leading the round on the...
UK Concern Over Russian Cyber-Attacks
Companies in the UK have been urged to vastly improve their digital security processes amid concerns of a swath of potential Russian cyber-attacks that are circling the ongoing political crisis in Ukraine. Updated Guidelines The NCSC (National Cyber Security Centre), part of the GCHQ intelligence agency, has recently updated its guidelines to inform firms that...
Hybrid Working Fuels Business Fears
Over 8 in 10 UK businesses are saying that hybrid working greatly increases their data breach risk, with over a fifth being unprepared for one when it would occur. Speed of response has been labelled as the main concern, and with business owners looking at 43% of their workforces to be hybrid working in the...