Government IT Security Conference 2020


23 September 2020




Live Agenda

Comprised of live-streamed keynotes, seminar discussions and networking opportunities, GOVSEC 2020 VIRTUALCONFEX delivers direct access to the latest cybersecurity experts.

At GOVSEC 2020 – VIRTUALCONFEX, we will objectively explore the cybersecurity challenges in the digital age and discuss effective means of mitigating the same through security, vigilance and resilience.

This Cybersecurity conference will host leading cybers security heads from various industry verticals to improvise, adapt and overcome.

The event will feature speakers presenting case studies and the best practices on cybersecurity challenges and the strategy for cyber risk management.

You will also have access to the resource material post the online event.

All sessions will be available on-demand after, so you won’t miss anything.  Session times are subject to change.

12 Noon day prior to event
Virtual Site opens
  • Set up your networking profile
  • Set appointments
  • Familiarise yourself with event layout and select which sessions you wish to view

Live Stream On Demand

Virtual Summit opens for networking
  • Browse stands
  • Set appointments
  • Watch online demos in networking area

Conference Chair’s Opening Address
Your code, their Cloud, who’s problem?

Bharat Mistry, Principal Security Strategist, Trend Micro







The UK public sector is striding forward with Cloud adoption which is many cases is driven by a desire to deliver better pubic services and user experience.

Modern Cloud environments support application delivery, however as applications are rolled out to meet these innovation mandates, new vulnerabilities can be introduced from the underlying code.

In this session we will explain why Cloud Security strategies should extend to inspecting code level risks and vulnerabilities, not only in the deployed environment, but throughout the application development lifecycle.

Are people the problem? Behavioural challenges for information governance and how to overcome them

Jonathan Craven, Head of Information Governance / Data Protection, North West London NHS Foundation

Jonathan Craven speaker

At a time when increasing numbers of digital solutions are being offered for information governance and data protection problems, are we losing sight of the fact that the single biggest variable in compliance is the staff? However, rather than simply labelling any one variable as “the problem”.

This presentation will briefly look at what the issues are and how we may begin to address them, including:

  • What factors are influencing people to comply – or not – with information governance and data protection best practices?
  • How can we promote positive behavioural change?
  • How can technological solutions best support change?
A Zero Trust approach enabled by Identity Governance

Hans-Robert Vermeulen, EMEA Cloud Platform Director, SailPoint

Zero trust is a regular topic of conversation for most CISO’s in the public sector today. At its core, zero trust focuses on the principle of maintaining diligent access control for all users of network and systems resources. In itself, that sounds like nothing new, but with it comes a renewed focus understanding and managing that access at a much finer level of detail.

In today’s world of constant breach and threat, a Zero Trust approach to secure your IT landscape makes a lot of sense. But in order to give Zero Trust any chance of success, Identity Governance has to become a critical core competency. In this session, SailPoint will show how the Zero Trust and Identity Governance provide the much needed security we are all after and how public sector organisations can achieve the best results with today’s technology.

Questions to the Panel
Sessions break for networking
  • Browse stands
  • Set appointments
  • Watch online demos in networking area

Welcome Back from the Conference Chair
Falling Through the Cracks – Why Contracted Security Services Rarely Provide the Expected Assurance

Greg van der Gaast, Head of Information Security, University of Salford

From small individual vendors to massive MSPs, time and time again we see a failure to deliver the expected security services and we usually find out too late. Worse still, it’s often difficult to demonstrate any negligence or liability on the part of the provider. Further adding insult to injury, in many cases, businesses are then having to pay extra to get the coverage they thought they had already had.

Let’s review some spectacular contracting failures, why they happen, and what we can do to prevent them.

Changing Cyber Landscapes: Battle of the Algorithms

Louise Kilner, Account Director, Darktrace







Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about:
• Paradigm shifts in the cyber landscape
• Advancements in offensive AI attack techniques
• The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
• Real-world examples of emerging threats that were stopped with Cyber AI


Back To Basics: How to Avoid High Profile Cyber Attacks

Andrew Gogarty, Chief Security Evangelist, Secon Cyber

Everyone thinks they know what mistakes to avoid to prevent cyber attacks, but we’re still seeing high profile breaches every day. For example, people know how crucial email security is and yet over 90% of threats still enter organisations through an email.

In this talk, Andrew Gogarty, Chief Security Evangelist from Secon Cyber, will walk you through the basics of cyber security best practice and what methods are crucial for ensuring visibility and control of what happens in your organisation. Gogarty will highlight what bad practices are helping attacks happen, what actions organisations can take to stop them and how to reach cyber security maturity. He will use real life examples from multiple sectors to illustrate how organisations can ultilise the solutions they’ve already invested in to build a robust cyber security strategy and avoid becoming the next high profile breach.

questions to the panel of speakers
sessions break for networking
  • Browse stands
  • Set appointments
  • Watch online demos in networking area
online session three

Welcome Back from the Conference Chair
The Mobility Pivot – Threat & Response in a Cloud-enabled front line workforce

Adam Gwinnett, Head of Strategy, Enterprise Architecture & Cyber Security, Metropolitan Police Service

adam gwinnett speaker

The growth of mobility in workforce’s, moving access to sensitive and critical systems out of offices and to the front line, continues to dominate workforce planning and law enforcement is no different.

In response to this, we are seeing a steady increase in mobile targeting threats to exploit these platforms, both for consumers and for enterprise customers.

What are you doing to enable and protect your assets in an increasingly mobile world?

  • Law enforcement front line mobility is a key trend
  • Mobile targeted threats, trends and use cases
  • Defensive measures & deployment considerations
How a Cloud-First Workforce Supports Your Organization's Preparedness

Helen Hosein, Chrome Enterprise Browser Customer Engineer, Google







Given today’s landscape, businesses must expect the unexpected to succeed. Enabling your workforce to work from the cloud largely impacts your organization’s ability to be agile in times of change.

72% of ITDMs agreed pre-pandemic that giving workers access to business apps any time, any place, from any device is now business-critical (Forrester). With recent events, it’s clear that that number is now much higher.

Join us to dive into how an empowered cloud workforce helps keep your organization future-proof.

How local government is building cyber resilience

Mary Umoh, Head of Information Security, London Borough of Tower Hamlets

Mary Umoh Speaker

The Information and Cybersecurity journey in the Local Authority has been painfully long, starting from being an obscure, outright invisible and isolated tick-box exercise, with no appreciable business benefits to becoming pivotal to innovation, business and service improvements. Having previously been looked upon as a blocker to progress, but now the vehicle to effective digital transformation, increased productivity, confidence in building trusts amongst partners and providing a seamless service across borders.

The journey so far:

  • Working in silos; no clear definition of what is expected
  • A more structured approach sponsored by the Central Government
  • We must collaborate if we are to survive
  • Zero Tolerance Approach
  • Digital Transformation and opportunities
  • The shift from being a blocker to becoming an enabler
  • Board level responsibility for Cyber Security
  • Genuine Risk-Based Approach
Questions to the Panel of speakers
Sessions Break for Networking
Session Four Seminars

Delegates can choose to attend one of the Seminars in this session LIVE – then the remainder on demand post event.

CLICK HERE  to view the seminars

sessions break for networking
  • Browse stands
  • Set appointments
  • Watch online demos in networking area
online session five

Welcome Back from the Conference Chair
How To Ensure Uncompromising Safety and Integrity in the Cloud

Alan Back, Director, UKCloud

The UK’s public services are a genuine national asset that need to be protected and nurtured to ensure that they are delivered securely and effectively. How do government departments ensure that their most secure and sensitive systems are protected whilst never compromising availability and integrity? Years of austerity and tight cost control have resulted in \’make do\’ actions and older infrastructure, which compromises the overall security, resilience and scalability of your IT. In this talk, Alan Back, Director at UKCloud will walk you through how to overcome these challenges with an affordable and actionable digital strategy.

Big Data, Dark Data Privacy, Security, Integrity, and Survivability issues

Dariusz Glowinski, Senior Network Security Engineer, Home Office

The main ‘Big Data’ issues of today are those of privacy, integrity, and availability. Big data is a relatively new phenomenon which has risen to prominence over the past 10-15 years. As with many things, the drivers for developing Big Data technologies outweighed a considered appreciation of the challenges that Big Data brings with it. One such challenge is the sheer volume of the data collected against the expected usability of that data, also known as Dark Data.

  • The resurgence of Homomorphic Data Encryption in co-located data warehouses
  • Attribute-Based Encryption (ABE) as a possible method for User Access Control (UAC) to specific, needs-based, Big Data elements, for security/compliance purposes
  • Big data survivability: Software Behaviour Encryption (SBE) vs Storage Dynamic Encryption (SDE) for cyber-security and cyber-resilience in the cloud
A Leader’s Guide on How to Integrate Sustainability In IT

Mattie Yeta, Sustainability Lead – Service Strategy, Defra







This session will explore:
• Global sustainable development challenges, global trends, and compliance
• How can technology save the world?
• Opportunities to collaborate nationally and globally, on sustainable ICT

Questions to the Panel of Speakers
Event Closes

Site will remain active until the 14th October (3 weeks from event date)

Please note:
Whitehall Media reserve the right to change the programme without prior notice.