Enterprise Security & Risk Management 2020

VIRTUALCONFEX

3 November 2020

VIRTUALCONFEX

SOCIAL


LATEST TWEETS

Live Agenda

ESRM 2020 – VIRTUALCONFEX – The Live Virtual Summit will feature a mix of keynotes, panel discussions and covering the most IAM deployment issues so join us live if you can!

Be sure to check back as we enhance the agenda to ensure you have the most up-to-date information.  We look forward to your participation in ESRM 2020 VIRTUALCONFEX.

Registered users can view the keynote, watch recorded sessions, and access other valuable content on-demand. Participants can also connect with peers and experts to ask questions, share insights, and get the most from the leaders in the industry

All sessions will be available on-demand after, so you won’t miss anything.  Session times are subject to change.

12 Noon day prior to event
Virtual Site opens
  • Set up your networking profile
  • Set appointments
  • Familiarise yourself with event layout and select which sessions you wish to view

Live Stream On Demand

08:00
Virtual Summit opens for networking
  • Browse stands
  • Set appointments
  • Watch online demos in networking area
ONLINE SESSION ONE

ONLINE SESSION ONE

Live Stream On Demand

09:15
Conference Chair’s Opening Address

David Terrar, Director and Chair, Cloud Industry Forum

david terrar speaker
View Profile

09:25
The Role of Zero Trust in the New Normal

Ollie Sheridan, CISSP Gigamon Principal Engineer, Security (EMEA), Gigamon


View Profile

  • The ‘New Normal’ is providing Zero Trust the opportunity to prove its value, as businesses adjust their practices and processes to cope with the changing landscape.
  • Our survey revealed that 87% of those who had started on their Zero Trust journey reported that adopting the framework has improved their productivity.
  • What’s more, the current economic climate has significantly changed working practices, creating new challenges and an increase in security threats – something 84% decision makers reported – and Zero Trust is now being viewed as a strategic approach to help alleviate this additional burden.
  • 97% of respondents who had adopted or considered adopting Zero Trust stated that the framework has or could help their business as it deals with the current global situation. 
09:40
Neurological Insights of Human Technology Habits

Denise Beardon, Head of Information Security Engagement, Pinsent Masons 


View Profile

Hannah Tufts, Cyber Security Awareness Specialist, Pinsent Masons 

Hannah Tufts speaker ERSM 2020
View Profile

For too long phishing simulation programmes have focused on the minutiae of ‘lookout for poor spelling, hover over that link’ rather than addressing the fundamental reasons behind why someone clicks on a link.

By engaging partners and employees in an empathetic way and exploring neuroscientific insights into habits and behaviours, Pinsent Masons have introduced a new approach to their phishing simulation using positive reinforcement.

In this presentation we explore:

  • Why awareness should focus on good security-related behaviour
  • Educating through empathy
  • Why phishing emails trigger our happy (neuro) hormones
  • The importance of building confidence
10:00
State of 2020 DDoS threat landscape

Omer Yoachimik, DDoS Product Manager, Cloudflare


View Profile

Learn about the evolving DDoS threat landscape from Cloudflare’s vantage point, as the product team shares 2020 DDoS trends and observations. Omer Yoachimik, DDoS Product Manager at Cloudflare will showcase how Cloudflare is uniquely positioned to help protect you from DDoS attacks and cyber threats, helping businesses to manage the implications of the current crisis on their infrastructure.

10:15
Questions to the Panel of Speakers
10:30
SESSIONS BREAK FOR NETWORKING
  • Browse stands
  • Set/Attend appointments
  • Watch online demos in networking area
online session two

ONLINE SESSION TWO

Live Stream On Demand

10:45
Introduction to the session

David Terrar, Director and Chair, Cloud Industry Forum

david terrar speaker
View Profile

10:50
Mimicking Human Intuition: The Cyber AI Analyst

Mike Beck, Global CISO,Darktrace


View Profile

For over three years, Darktrace experts investigated whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and this challenge took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms.

During this presentation, Darktrace’s Director of Threat Hunting, Mike Beck, will outline the capabilities this world-first technology, the Cyber AI Analyst, and discuss how automated investigation and triage is helping to uplift and augment human teams across the globe. He will also demonstrate how an APT using a zero-day was caught weeks before public attribution using cyber AI analyst technology.

11:05
Managing Data Risks: Lessons from Using International Open Data Sets

Carina Kabajunga, Head of ICT, The Commonwealth Secretariat


View Profile

Many organisations use open data to inform their activities and to make business and policy decisions. While such data are convenient, freely available, the methodology and data quality checks used to collate the data are not immediately available to the End User.

Organisations using open data sets need to have internal risk management mechanisms embedded in their Data Governance practices in order to mitigate such risks.

11:20
The Benefits and Barriers of Implementing Zero Trust

Andrew Hollister, Senior Director LogRhythm Labs & Security


View Profile

The need to protect, defend and respond to threats — regardless of where the employee, data, systems and applications sit — is more apparent than ever as we continue to work from home.

The Zero Trust model helps verify at every step that only trusted identities have access to systems, networks and data they are entitled to.

In this session, Andrew Hollister, Senior Director LogRhythm Labs & Security Advisor to the CSO, will outline the full benefits of implementing a Zero Trust model and how this approach can enhance cyber resilience.

Join us to hear:

  • The considerations to be made before incorporating Zero Trust
  • The barriers and best practices to support a successful implementation
  • The business benefits of switching to a Zero Trust model
11:35
Questions to the Panel of Speakers
11:45
sessions break for networking
  • Browse stands
  • Set/Attend appointments
  • Watch online demos in networking area
online session three

ONLINE SESSION THREE

Live Stream On Demand

12:00
Introduction to the session

David Terrar, Director and Chair, Cloud Industry Forum

david terrar speaker
View Profile

12:05
RETHINKING YOUR APPROACH TO ENTERPRISE RISK MANAGEMENT

Manish Patel, Director of Corporate Risk, Dataminr


View Profile

To reduce the impact of an unfolding crisis, companies need a clear, accurate and early line of sight into emerging risks. Leaders can then act with confidence and seize opportunities to preserve brand reputation while driving operational excellence. To ascertain how real-time information can help companies gain advanced warning of an event and use that information to their advantage, Dataminr analysed 100 crises affecting global organisations between 2018-2019. Manish Patel, Director of Corporate Risk will discuss the resulting data and discuss:
• How long companies have, on average, to act from initial indication of a crisis until its peak
• How crises impact sectors such as energy, finance, manufacturing, retail and transport
• How WeWork uses real-time information to detect emerging threats and protect its people, property and reputation

12:20
GDPR and Compliance Practices within IAM

Norbert Eschle, Enterprise Data Architect, Direct Line Group


View Profile

The GDPR is a crucial driver within the IAM landscape. Enterprises are required to maintain high levels of compliance and data governance practices, transforming IAM into a critical aspect of their data and cybersecurity strategies.

We discuss:

  • The impact of GDPR and new compliance practices on global business strategies
  • Moving to the cloud, GDPR territorial scope and data sovereignty
  • Enforcing compliance based on the business need for data
12:35
Future SOC: Leading Supermarket Retail Group, SIEM Consolidation and Enhancements

James Astley, Solutions Director, Somerford Associates


View Profile

Phil Soane, Senior Channel Development – AWS Marketplace


View Profile

This session will discuss:

  • Simple and effective procurement of bespoke license subscription and deployment and education services
  • Migration and consolidation of SIEM tools into a single SaaS solution across 4 markets helping to reduce cost and improving operations within a hybrid Security Operations Centre
  • Implementation of SaaS specificTarget Operating Model and SIEM use-case tuning
  • Simplification and repeatability of incident response processes with documented Standard Operating Procedures.
  • Enhanced correlation of events across multiple markets to provide the Security Operations Centre with greater visibility of security events and improve response and future automation capability
12:50
Questions to the panel of speakers
13:00
Sessions break for networking
  • Browse stands
  • Set/Attend appointments
  • Watch online demos in networking area
online session four

ONLINE SESSION FOUR

Live Stream On Demand

13:30
Introduction to the session

David Terrar, Director and Chair, Cloud Industry Forum

david terrar speaker
View Profile

13:35
The Perceptions of Cybersecurity Careers

Chris Green, Head of Communications EMEA, (ISC)² 


View Profile

In the face of unprecedented change, disruption and uncertainty in the business world, sectors and people can be perceived in a variety of ways. With cybersecurity being pivotal to the current business climate, we were keen to understand the wider perception of cybersecurity professionals, their job roles and the industry as a whole. This included understanding how desirable cybersecurity is as a career option (and why), the pros and cons of being a professional in the space, along with what is needed to make cyber a more positive and desirable area of work.

13:50
Cybersecurity to Support Digital Transformation

Sandy Silk, Director, Information Security Education & Consulting, Harvard University

speaker-image
View Profile

Prior to the pandemic, Digital Transformation was a strategic move to support revenue growth, and now it is a tactical necessity to maintain the status quo.

Your cybersecurity team must transform how they think about the risk to successfully support needed changes in how your organization uses technology and data. If they do not, your business will have to choose between missing key opportunities or circumventing security reviews entirely.

Make sure your security team provides the right level of service to your organization, as a trusted advisor helping the business achieve its needed outcomes.

  • Align IT and cybersecurity professionals with business objectives and risk tolerance
  • Standardize and automate repeatable processes
  • Analyse and shift or stop low-value work by your team
14:05
Things Are Only Secure Until They Are Not. Distributed Ledgers Secure Things Again

Jon Geater, Co-Founder & CTO, Jitsuin

View Profile

Digital transformation is fuelled by data from an increasing number of Connected Things which expand the scope, scale and speed of change faced by enterprises. IT/OT convergence compounds the challenge to track and trace risks introduced through technology supply chains. Spreadsheets have reached their limits and won’t help real-time decisions that have critical impacts on operations.

Distributed Ledger Technology helps teams track and trace accountability, automate remediations and create permanent records of when who did what to report continuous compliance. Now you can measure the top agenda item of CEOs for the next five years: Trust. This enables:

  • Resiliency in operations
  • Faster, better business decisions
  • New business models
  • Success in digital transformation with connected things

Are you ready to move fast and fix things?

14:20
Questions to the panel of speakers
14:30
sessions break for networking
  • Browse stands
  • Set/Attend appointments
  • Watch online demos in networking area
ONLINE Session Five

ONLINE SESSION FIVE

Seminars – delegates can choose to attend 2 sessions ‘live ‘

All sessions will be available on demand shortly after they conclude

14:45
Seminars A - D
15:30
sessions break for networking
Online session six

ONLINE SESSION SIX

Seminars – delegates can choose to attend 2 sessions ‘live ‘

All sessions will be available on demand shortly after they conclude

15:45
Seminar sessions E-H
16:30
Sessions break for networking
17:00
ONLINE event closes

THE PLATFORM WILL REMAIN OPEN FOR 1 MONTH TO VIEW ALL SESSIONS ON DEMAND

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

THE VIRTUAL PLATFORM IS NOW OPEN


We are pleased to inform you the Virtual Platform is now open at https://whitehallmedia.6connex.eu/event/esrm/login

You must have registered for the event first before you can access the platform

If you are a delegate register here

If you are an exhibitor register here