9 May 2019
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre-selection is required – delegates will be able to select which session they attend onsite.
Victoria Suite ( Main Plenary)
UK Parliament – Changing Ways of Working Using Efficiency and Automation
Yochana Henderson, Identity and Security Manager, UK Parliament Digital Service
Cherry O’Donnell, Product Service Owner – Identity and Access Management, UK Parliament Digital Service
Host: Paul Walker, Technical Director, One Identity
Join this interactive session where UK Parliament Digital Service will share how they use automation to be more efficient and secure in a public sector regulated environment.
How Building Privilege into Interconnected Systems and the Cloud Safeguards Digital Transformation
David Higgins EMEA Technical Director, CyberArk
The evolution of how services are provided to citizens means modern government relies on increasingly complex and interconnected public sector IT systems. These world class digital services will be underpinned by open, cloud-based architectures and greater use of automation, systems that rely on privilege to interact with one another. This transition necessitates a different approach to security, where access to critical assets, applications, services and assets is controlled by a privileged access security platform to prevent attacks at the core of digital transformation.
Zero Trust – Change the Way You Think
Ian Perry, Government Technical Consultant, Zscaler
Inherent trust is at the root of many omnipresent issues facing information security.
The adoption of Zero Trust is improving business agility through identity-driven security in government.
With the ongoing need for 3rd party access and cloud migration, how can you define and accelerate your Zero Trust Model?
Join us to understand how Government agencies are rethinking the Zero Trust Model amidst increased scrutiny and risk.
Data-Centric Security – Fundamental for Threat Detection in 2019 and Beyond
Matt Lock, Director of System Engineers, Varonis (UK) Ltd
Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decades ago (e.g., SQL injection and ransomware). Focusing on a strong perimeter to keep the bad guys out is not working. Now that attackers routinely use stolen credentials or low-tech phishing techniques to enter, and now that data is no longer kept within a perimeter, this outside-in approach is no longer practical.
In this session, you’ll learn why organisations are failing at early breach detection and how data-centric security can overcome common threat detection pitfalls to reduce false positives, accelerate investigations, and stop more attacks more quickly.
Takeaways: 1. Learn why it is essential to identify and locate where your sensitive data is, who has access to it, and where it is over-exposed. 2. Learn why securing your perimeter alone won’t protect you. 3. Understand where your risks lie and the steps you need to take in order to protect your organisation from a data breach. 4. Contextual security analytics is the future – hear how Varonis’ unified data security platform is engineered from the ground up to protect your data from insider threats and cyberattacks.
Artificial Intelligence – Hype vs Reality
Rik Ferguson, Vice President Security Research, Trend Micro
Don’t be fooled by clever marketing, but equally don’t underestimate the value of AI.
Like almost everything, AI is on an evolutionary path and is hitting milestones at unpresented rates.
Its application to identify online threats or automate human tasks, is very varied. Where are we in the evolutionary journey of AI adoption into cyber security practices? And, is AI itself a risk we need to be preparing for?
iboss – Cloud Based Web Security Designed to Support Compliance, Malware Defense and Data Loss Prevention
David McKissick, Solutions Engineer, iboss
As applications move to the cloud and the traditional network perimeter erodes, the need for cloud-based Internet security increases.
Join us to hear how your users will always be protected with the iboss cloud, regardless of device or location, to ensure all Internet traffic is secured for compliance, web filtering, malware defense and data loss at all times. The iboss cloud can secure user Internet access regardless of location, but has the unique ability to do so while adhering to regulations such as GDPR.
Vendor Risk Management: Overcoming Today’s Most Common Security & Privacy Challenges
Tom Hallet, Solutions Engineer, OneTrust
Managing third-party vendor risk before, during and after onboarding is a continuous effort under global privacy laws and security regulations. While outsourcing operations to vendors can alleviate business challenges, managing the associated risk with manual tools like spreadsheets is complex and time consuming. To streamline this process, organizations must put procedures in place to secure sufficient vendor guarantees and effectively work together during an audit, incident – or much more. In this session, we’ll breakdown a six-step approach for automating third-party vendor risk management and explore helpful tips and real-world practical advice to automate third-party privacy and security risk programs.
- Review the drivers and challenges organizations face when managing third-party vendor risk
- Identify priorities before, during and after vendor procurement
- Takeaway a six-step approach for automating the third-party vendor risk lifecycle