Programme @

GOVSEC uk

VIRTUALCONFEX

18 May 2021

Brought to you by Whitehall Media

Programme @ GOVSEC uk

Session one

Strategy, Governance and Threat Detection

  • A new cold war: the geo-politics of cyber security
  • What is your talent strategy? Addressing the skills gap
  • Cognitive diversity: tackling algorithmic biases
  • Remote working: supporting security control and user access
  • AI-led deception: deep fakes
  • Endpoint security: working with suppliers
  • User vulnerabilities: cloud-initiated attacks

09:15

Conference Chair's Opening Address

Dr Gilad Rosner
Founder, IoT Privacy Forum
view profile

Dr Gilad Rosner, Founder: IoT Privacy Forum; Expert in Public Policy of IoT & Identity Management; Privacy and Technology Policy Researcher

09:25

A new cold war? mapping the digital divide between east and west

Gai Brodtmann
Member - Australian Strategic Policy Institute Council and National Security College Futures Council - Former Opposition Assistant Minister for Cyber Security and Defence
view profile

Gai Brodtmann GAICD, Australian Strategic Policy Institute Council and National Security College Futures Council – Former Opposition Assistant Minister for Cyber Security and Defence  

In our opening address, we look at the global cybersecurity landscape, how it is changing, the struggles within and the options for the UK approach to this evolving environment.

We explore Australia’s response to this challenging landscape and the lessons for other liberal democracies.

We examine how far we are willing to go to protect and preserve our sovereignty, national identity and freedoms.

What values are we prepared to fight for? And what price are we prepared to pay?

09:45

Threat Visibility In A Pandemic World

Lee Carass
Sales Engineer Manager UK&I, Trend Micro
view profile

Lee Carass, Sales Engineer Manager UK&I, Trend Micro

  • The unprecedented events of the last year have propelled government digital transformation, paving the way for new challenges – and opportunities – whilst adapting to the ‘new normal’.
  • The same for the cybercriminals; we detected 62 billion cyber threats in 2020 – a 20% growth.
  • Gain insights on how to maintain visibility in such times of uncertainty, whilst managing information siloes and siloed teams, new ways of working, a drastically changing threat landscape.
  • Explore the essential role that metrics play in reliable risk management and prioritisation, and methods to manage the skills gap whilst doing more with less.

10:00

Technology & Security strategy vs Culture

Mohibi Hussain
Security and Strategy Architect, University of Cambridge
view profile

Mohibi Hussain, Security and Strategy Architect, University of Cambridge

Culture eats strategy for breakfast” is a famous quote from legendary management consultant and writer Peter Drucker. It is evident that he didn’t mean that strategy is less significant than culture, but that the transformation of culture and its alignment with strategy was the only path to ensure organisational success.

We discuss:

• What is the correlation between organisational culture, vision, mission statement, and strategy?

• What are the essential practical steps required to align culture with technology strategy?

• How to encourage and embrace positive strategic change in organisational culture?

 

10:15

Questions to the Panel of Speakers

10:30

Refreshment Break Served in the Exhibition Area

Session two

People, Place and Technology

10:45

Conference Chair

Dr Gilad Rosner
Founder, IoT Privacy Forum
view profile

The Conference Chairs Opening remarks

10:50

Endpoint security: consolidating your third-party risk management

Effia Nana, Cyber Assurance Manager, Home Office

Ensuring the integrity and security of outsourced IT models for national and local government bodies is of vital importance.

The public sector handles some of the most sensitive information imaginable. From concerns of national security, email exchanges between senior ranking officials, to the private details of a citizen’s health records being held to ransom.

We address:

  • Targeted breaches and data loss incidents
  • Increasing reliance on suppliers
  • Data management and infrastructure
  • Handling and processing sensitive data
  • Managing the volume and variety

11:05

Understanding the cyber skills gap: what is your talent strategy?

Jessica Figueras
Technology Strategist; Trustee, UK Cyber Security Council
view profile

Jessica Figueras, Technology Strategist; Trustee, UK Cyber Council

It is clear that the government sector has not yet managed to address the gap in security technology investment and organisational needs.

It’s not that there is a lack of a talent strategy, either in wider society or unrecognised within the sector, but rather a lack of an appropriate talent pool strategy.

The experience of IT recruitment in Government is the reoccurring dilemma of employees knowing they do not have the skills to complete a task, a lack of opportunity to upskill, and the need to get a specialist in without knowing what that specialist looks like.

We address, how best to approach talent recruitment.

11:20

Changing Cyber Landscapes: The Battle of Algorithms

Mariana Pereira
Director of Email Security Products, Darktrace
view profile

Mariana Pereira, Director of Email Security Products, Darktrace

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about:
·Paradigm shifts in the cyber landscape
·Advancements in offensive AI attack techniques
·The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
·Real-world examples of emerging threats that were stopped with Cyber AI

11:35

Questions to the Panel of Speakers and Delegates move to the Seminar Rooms

11:50

Networking Break

Take this opportunity to visit the virtual exhibition

Session three

Aligning technology with your needs, deploying where necessary, moving together as one

  • Matching identities: aligning your digital and real identity
  • Simplicity over complexity: adopting a lean technology environment
  • Analytics-driven security: supporting your security team
  • Vulnerability patching: securing long term solutions
  • Reducing data sharing risks: best-practice approach
  • Connecting with confidence: supporting greater IoT convergence

12:05

Conference Chair’s Afternoon Address

12:10

Universal Privilege Management – A Modern Approach to securing the Public Sector

Rose Bickerstaff
Head of Public Sector UKI, BeyondTrust
view profile

Rose Bickerstaff, Head of Public Sector UKI, BeyondTrust

Organisations across the UK Public Sector are managing a number of improvements across their entire IT environment in readiness for a cloud first strategy. In addition to this the ever evolving challenges of meeting the Cyber Essentials Plus guidelines balanced with limited resources mean that new approaches to securing both internal and external users is vital.

Join this session to learn what key steps you can follow to secure every user, session, and asset across your IT environment.

Rose will cover:

  • How to ensure you avoid dangerous gaps in protection
  • Essential steps to achieving rapid leaps in risk reduction
  • Keys to a frictionless Privilege Access Management solution that is invisible to end users

12:25

Digital Identity for all – is it really possible?

Cheryl Stevens
Digital Director, Shared Channels Experience, Department for Work and Pensions
view profile

Cheryl Stevens MBE, Digital Director, Shared Channels Experience, Department for Work and Pensions

Digital Identity in the modern world can create a barrier to access for some of the most vulnerable in society. The question is, how do we create solutions that protect citizens and services whilst removing those barriers.

• How COVID-19 accelerated and influenced DWP direction for identity
• DWP serves 18m customers across the entire demographic spectrum
• Context-driven, proportionate solutions are key
• Hear how DWP are striking that balance and leading the way

12:40

SailPoint Case Study

Steve Allcock
UKI Director, Public Sector, SailPoint
view profile
Jason Corbishley
CISO, Police Digital Service
view profile
Kurt Frary
Deputy Director of Information Management & Technology / CTO, Norfolk County Council
view profile

Steve Allcock, UKI Director, Public Sector, SailPoint
Jason Corbishley, CISO, Police Digital Service
Kurt Frary, Deputy Director of Information Management & Technology /CTO, Norfolk County Council

12:55

Questions to the Panel of Speakers

13:10

Break

Take this opportunity to visit the virtual exhibition

Session Four

13:45

Seminar Sessions

14:30

Networking Break

Please take this time to visit the virtual exhibition

Session Five

14:45

Seminar Sessions

15:30

Networking Break

Please take this time to visit the virtual exhibition

Session Six

15:45

Conference Chairs Welcome

Dr Gilad Rosner
Founder, IoT Privacy Forum
view profile

Welcome back to this session

15:50

Understanding the cyber skills gap: what is your talent strategy?

Jessica Figueras
Technology Strategist; Trustee, UK Cyber Security Council
view profile

Jessica Figueras, Technology Strategist; Trustee, UK Cyber Security Council

It is clear that the government sector has not yet managed to address the gap in security technology investment and organisational needs.

It’s not that there is a lack of a talent, either in wider society or unrecognised within the sector, but rather a lack of an appropriate talent pool strategy.

The experience of IT recruitment in Government is the reoccurring dilemma of employees knowing they do not have the skills to complete a task, a lack of opportunity to upskill, and the need to get a specialist in without knowing what that specialist looks like.

We address, how best to approach talent recruitment.

16:05

Using a SIEM platform for more than just security

Mohamed Hamid
Lead Infrastructure Engineer, Government Digital Service
view profile

Mohamed Hamid, Lead Infrastructure Engineer, Government Digital Service

Mohamed is a Lead Infrastructure Engineer working in the Cabinet Office.

The talk will showcase how the Cabinet Office has used a Security Information management (SIEM) tool to better understand the threats and workings of the IT infrastructure.

This includes:

• Catching popular tools that may have been used for potential malware
• Using infrastructure logs to plan a safe return to office

16:20

Vulnerability patching: securing long term solutions

Outdated operating systems and software are the most common attack vector that highly increase your organisation’s attack surface.

In 2019 alone, 60% of breaches happened as a consequence of unpatched vulnerabilities.

Keeping your organisation safe while using disjoined patch management software can be challenging.

We address, how a unified platform handles software updates and removes the burden of management, regardless of the number of endpoints you need to manage.

16:35

Questions to the Panel of Speakers

16:50

Closing Remarks from the Conference Chair

17:00

Conference Closes

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Youtube, TikTok and Instagram Exposed in 223 Million Account Data Breach
In data breach news, this month saw a database of almost 235 million social media profiles exposed on the internet from such recognisable platforms as Youtube, Instagram and TikTok. The research undertaken has identified that information breached could open users up to phishing and impersonation scamming as well as unwarranted email usage. On August 1st,...
UK Charity Breaches via Ransomware
In recent data breach news, UK charities are continuing being hit hard with targeted attacks as a result of the Blackbaud ransomware attack earlier this year. In the last few weeks, Mines Advisory Group (MAG), a non-profit based in Manchester involved in clearances of landmines in war-torn countries had to inform their donors that a...
Remote is the new normal: Enable workers, not hackers
April 27, 2020  |  SailPoint  |  Happenings, Identity Working Hackers never sleep, and during this time of uncertainty, there’s no playbook or blueprint to arm against them. The world has changed, and so has your business. The rapid transition to remote working presents major challenges for IT and employees. Globally, 70% of professionals work remotely...