19 September 2018
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.
A New Age of Behavioural Analytics: Rapid Threat Detection and Automated Response
Andy Skrei, Senior Solutions Architect, Exabeam
Detecting insider threats quickly whether from ransomware, an external attacker with stolen credentials, or from an employee, remains a challenge for many organisations. However new advances in the area of behaviour analytics and intelligent automation are now rapidly accelerating the detection, investigation and response to threats – far outpacing legacy systems.
This session includes a demonstration covering:
- User behaviours – the difference between too much data and the right data
- Pinpointing the real attacker and reducing false positives
- How to automate incident investigation and response to increase productivity and minimize human errors.
Security Best Practice – Walking the Walk vs. Talking The Talk
Mark Sparshott, Senior Director, Tanium
90-99.9% of the time attackers use Old Day exploits to break into an organisation and then legitimate systems tools to reach and steal data.
So how is this still happening in an age when security best practice is well known and baked into all large organisations policies, standards & playbooks?
It’s because most organisations know what to do but can’t find a way to Walk the Walk in their large, distributed, amorphous and complex IT estate.
Join Tanium to hear the Top 5 Lessons Learned from helping 100+ of the world’s largest organisations see how their security controls actually fared in reality and see a live demonstration of Tanium being used to perform elements of a Hygiene Assessment on 1000+ machines in seconds.
How to use Artificial Intelligence to Reduce Risk by Getting Ahead of the Game
Dr. Anton Grashion, Senior Director Product Marketing, Field Marketing EMEA, Cylance
We will discuss how we are utilising Artificial Intelligence and machine learning in terms of risk reduction. We will discuss how this approach differs from other methods and do a live demonstration of how we can alleviate risks from unknown, freshly minted malware.
The Enterprise Cyber Risk Chain
Joel Sweeney – Director – Xpertex
Dr Marcus Naraidoo – Director – Xpertex
The majority of organisations form a part of a supply chain. Each member faces a range of cyber and information security risks and threats. Collectively, the boundaries that connect members form the Enterprise Cyber Risk Chain. Few organisations understand the consequences associated with such enterprise connectivity. Do you understand yours?
Whilst some major organisations toward the heads of supply chains may be able to invest in cutting edge capabilities, such as Artificial Intelligence based technologies, to seek to manage their Enterprise Cyber Risk Chain, others may lack the investment, scale and technical know-how to deploy such tools and services.
Equally, any organisation in the supply chain may be uncomfortable with technologies that learn from breaches and incidents, instead preferring to aim to reduce breaches and incidents to as near zero as possible.
The Seminar will:
- Expose the scope of the Enterprise Cyber Risk Chain, explaining the issues that exist at the B2B boundaries and how weaknesses further along the supply chain can percolate dangerously to other far-flung members.
- Discuss how the reliance on standards across the supply chain provide no guarantee of cyber and information security risk prevention, and we will illustrate the consequences with brief case studies.
- Conclude by looking at how contractually flowing down risk management fails to substantially address the matter by, at best, creating a false sense of security.
The Psychology of Ransomware
Niall Sheffield, SentinelOne, Inside Solutions Engineer
The prevalence of ransomware is an artifact of the current state of cyber security. In this talk, learn the various recognised mechanisms that ransomware creators use to illicit compliance, payment and even sympathy from the people they infect. Using this knowledge, you will be able to better educate yourselves and your users about how to stay calm when under cyber-attack, and how to gauge your next steps.
Reducing Network Complexity Challenges for Securing IoT & Cloud Environments to achieve GDPR Compliance
Nilesh Mapara, Solutions Architect, Lumeta Corporation
With expansion into the cloud and supporting IP-Enabled mobile and IoT/ICS infrastructure, security and network teams are learning that increasing network complexity has exposed them to a greater attack surface. While ransomware attacks have had a severe impact on both the reputation and financials of many well-known companies, additional requirements imposed by GDPR compliance is putting significant pressure on IT organizations.
At this session, Lumeta will show you how to eliminate 100% of your blind spots as we find 40% more of your network, cloud and endpoint infrastructure and monitor in REAL-TIME to detect threats across an expanding attack surface.
Finding malicious activity quickly: a win for the CFO and GDPR
Ward Spangenberg, Senior Director, Cyber adAPT
We face more challenges than ever as the digital revolution changes the nature of ‘perimeters’ for our connected organisations. Detecting breaches now needs greater reach, and greater intelligence than ever. Join this session to gain first hand insight into securing globally-connected networks.
Ward has been on the front lines of cybersecurity with positions at Uber, Cyber adAPT, Metordigi, and HackerOne.
The Machine Fights Back: AI and the Future of Cyber Defence
Andrew Tsonchev, Director of Cyber Analysis, Darktrace
In this session, we will discuss:
- How new machine learning and AI algorithms are automating advanced cyber defence
- Why automated defences augment human security teams
- How to navigate the challenges of implementing AI in a business environment
- Real-world examples of unknown threats detected and responded to by Enterprise Immune System technology