The Internet of Things promises to transform how the world works. Our attendees are looking for actionable and inspirational insight from their peers on how to overcome information security challenges. He served in this role for six years, from 2014-2020 and in 2019 became the longest-serving MI6 Chief in 50 years. We will show how to use Falco to tap into Linux system calls, the Kubernetes au We have to embrace the future, we have to take advantage of all the latest advances, seismic shifts are taking place and we need to ride that wave to a secure future. Taking place on the 1-2 December 2022, the Cyber Security & Cloud Expo event is co-located with IoT (Co-Locating 5G), AI & Big Data, Blockchain, Edge Computing and Digital Transformation Week, so you can explore the future of these convergent technologies under one roof. It is far more than simply understanding the shared responsibility model and operating in someone elses data centre. Cloud and containers are being adopted by a broad set of organizations as they try to maintain a competitive advantage. The cloud is, in many ways, the perfect technology to support a hybrid workplace, with staff connecting to enterprise systems as seamlessly from home as they do at the office. This is where youll find organisations new this year. This session is aimed at any organisation at the beginning of its Zero Trust journey. Chief Information Security Officers, Chief Information Officers, Chief Security Architects, Heads of Information Security, Chief Compliance Officers, Privacy Officers and Data Protection Specialists. Exact COVID-19 measures will be communicated to all attendees closer to the event in line with governmental guidelines at that time. Securing those env For 25 years, AppSec professionals have focused on vulnerabilities on all fronts with ever-evolving tools and processes. Using cloud-based resources safely moving sensitive workloads out View ON-DEMAND PANEL: Get out of my cloud! Cloud technologies can bring great advantages from cost savings, to resilience, but these benefits can come at a cost if we aren't careful. The headlines and ever-increasing data breach numbers are all the evidence needed to confirm that current security ecosystems are failing to protect modern organisations. We are also fans of the mini-conferences DEF CON event in London known as the DC4420 Conference Series. These disconnected efforts have led to wasted time and slow delivery. Carefully crafted by your friends at But the emergence of predictive a Join us to learn how Pollinate, an innovative UK cloud-based business partnered with BlueVoyant to achieve a bank-grade cyber defence ecosystem, efficiently and economically. In this challeng Like most large organizations, this UK Council, representing over one million people, is no stranger to ransomware attacks and they realized they needed to improve their defensive capabilities. Were showcasing the most innovative and important developments in the solutions market, with a focus on collaboration and supporting the security community. No! So, youre sold on the idea of Zero Trust. GB 232 4004 20 Tax ID No: 13960 00581, DCMS's Most Innovative Cyber SME competition, ExCeL London, One Western Gateway, Royal Victoria Dock, London E16 1XL, Support our Net Zero Carbon Events Pledge, Novel Coronavirus: Click here to find out how it affects our events. Although IT remains an integral part of a strategy to defend against cyber-attacks, cybersecurity is no longer an IT issue. Learn about the latest security research, develop technical know-how, and test your cyber security skills. Theres no doubt that the UK continues to pioneer groundbreaking InfoSec research and one of the best ways to experience that is by attending Cyber events. Ever more organisations are adopting a multi cloud approach, allowing staff to use apps and services from many different providers. Rebooting an outdated security strategy- how far should you View LIVE PANEL: Women in TechEx Strengthening your security posture, View Enterprise Security: Chairpersons Welcome. Despite large investments in cyber security, breaches are still occurring, and the number of ransomware attacks are growing exponentially. Although the conference doors have been closed, the offices were empty and for the most of us, working from home. Intigriti is a European community of40,000 ethical hackers that help secure hundreds of organizations on a daily basis. DLP and secure baseline configuration provides a programmatic app Join ThreatLocker Senior Solutions Engineer, Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. But how can companies simplify security without introducing more risk? If you do, then wed encourage you to use our filter on this page which will help you search for events by niche, date, as well as geographical region or city. DAY 2 | Accelerating Digital Transformation, Cyber Security & Cloud Congress North America, Cyber security and Cloud Congress North America. Discuss and debate: how do your future proof your security teams? In this session we map out how you can start your journey to a cloud native, cloud fir With IT teams more stretched than ever, it is becoming increasingly challenging to monitor security data and identify suspicious activities. Zero Trust is becoming the de facto security model for organisations that are operating in the cloud. The pa Where many might deliberately avoid the cloud there are some potentially huge benefits to using the cloud to secure traditional on-premise OT environments, even in the most critical of environments. If youre coming to Infosecurity Europe looking for something you havent seen before, this is the place. Security and capacity planning are ever-present obstacles to running a well-tune Log4j, SolarWinds, Codecov, ua-parser-js; and this is just scratching the surface of the supply chain attack threat security leaders are being faced with. This zone will be showcasing the winner and 13 runner-ups of the DCMS's Most Innovative Cyber SME competition. Round Table 2 - Global Risk Research: Is Low C-suite Engagement Imperilling Digital Investment? The events of the last two years have fundamentally changed the shape of workforces across many sectors, reshaping the traditional norms of how we work, shop, play, spend and even how we relax. Reviewing the current cyber crime surge during Covid crisis View Combatting the Coming Cyber Crime Wave. In practice, however, some aspects often tend to rece A security-first culture is one where everyone in your organisation shares responsibility for identifying threats and avoiding risky practices. Few organisations were prepared for what happened. This is very welcome, but far too many IoT technologies have prioritised innovation and speed over security. And many businesses risk being overwhe How do actual hackers look at your company? 2022 Integrity360, All rights reserved. Navigating the vendor landsca Nearly two years later we are all back at Cloud & Cyber Expo. Whilst we dont have any specific best UK conferences to attend in 2022 resource, wed certainly like to draw your attention to BSides London, Glasgow, and Leeds. So, if you cant make it this month then be sure to catch the friendly folk that attends next time! The complexity that security products introduce can sometimes create more challenges than they resolve. International Law and Global Security: Regulating an Illusion? But this is where new machine learning techniques can help. In this engaging and inspiring session well take a tour along the horizons of cloud cybersecurity technologies. Here youll find the most innovative technologies (and the sharpest minds behind them). Understand how businesses are enhanci Insider threats, supply chain attacks, and compromised credentials appear again and again in todays high-profile cyber-attacks. Book a free consultation with a security specialist to discuss your current concerns or security requirements. You might feel somewhat swamped when deciding on which conferences to attend this year. Panel discussion: Zero Trust How to get started? The National Cyber Security Centre and the more highbrow GCHQ rule the waves with InfoSec Progression and Protection in the UK and for that, we are all thankful! How do you deploy applications with effective conditional access? As more OT systems connect to your corporate network you have probably inherited OT risk whether you Organisations are using more devices, networks and clouds today than ever before. RELX and the RE logo are trade marks of RELX Group plc, used under licence. This session will look at IBM's approach to Extended Detection and Response and how it helps organisations mature their response to threats, avoid vendor lock-in and enable their SOC teams to gain wid What is the MITRE ATT&CK framework and why is important? Preventing a data breach, View Panel: Get out of my cloud! Machine learning: How ML can be applied to security data, Florian Doumenc, Security Engineer - google, Fireside chat: How to successfully rollout a security programme with strong developer adoption and buy in, Simon Maple, Field Chief Technology Officer - Snyk, Ashleigh Vincent, Product Security Engineer - Tide Platform Ltd, How an expired certificate can take down [insert your company name here], Unlocking The Business Value of SASE & SSE, Cloud-Native Runtime Security with Sysdig & Falco open source, Tom Llewelyn, Senior Sales Engineer - Sysdig, Best practice: Keeping pace with adversaries how security awareness testing and training can bolster your cyber defences, Moving to the Cloud Securely with DevSecOps, Vincent King, Head of DevSecOps for Cloud Transformation - Bank of England, Best practice: Why we need to get a handle on the Internet of Vulnerable Things (IoVT), Simon Newman, Head of Cyber and Business Services - Police Crime Prevention Initiatives, Tim Burnett, Security Architect - Costain Digital, Executive buy-in: Getting the board on board with cybersecurity, Nicolas Corrarello, EMEA Solution Engineering Director - Wiz, Tech talk: Riding the waves how to navigate the waters of cloud-native security, Tsaela Pinto, WhiteSource - Director of R&D, Normalizing AppSec Issues for Contextual Risk-Based Prioritization at Enterprise Scale, Moshe Zioni, VP Security Research - Apiiro, User case: Security at the heart of a cloud migration one law firms experience, Scott Storey, Security Architect - DLA Piper, Make your cloud security easy and intuitive with Check Point, Stuart Green, Cloud Security Architect - Check Point Evangelist, Roundtable 2 - Finding SASEs Holy Grail - The Business Value of Security Transformation, Roundtable 4 - How top security leaders are rethinking their software supply chain, Andres Guisado, Manager, EMEA - Aqua Security, Roundtable 1 - Protecting the crown jewels: A risk-led security approach to stop Ransomware, Roundtable 1 - How to optimize your DevSecOps journey, Roundtable 2 - Practical Steps to Automate your Digital Identities and Keep your Business Running. But fostering a culture of trust and transparency is easier said than done. Its time for the securit More organisations are using complex, multi-cloud environments than ever before. Sir Alex Younger is the Former Chief (C) of the Secret Intelligence Service, also known as MI6. If youd like to attend a cybersecurity conference in the United Kingdom and are not a British or EU citizen then you might benefit from a resource we created that explains the process on how to get a conference visa for the UK. The extent to which our economy and way of Looking at key insights, what is the current View VIRTUAL PRESENTATION: Mitigating Risk and Building Resilience in the Age of Ransomware. If youre a top decision-maker in your organisation and want to define your visit as productive, efficient, and wholly informative; the Leaders Programme is for you. As well as hosting top solution providers from around the world and their innovative products, the 2022 event will deliver a jam-packed conference programme over three days of learning, networking and exploring. And this is making traditional security methods seem increasingly anachronistic. Ron Ghose, Head of Risk and Security - AB Agri Ltd. Cyber strategies: How to make working with third-parties safer, Paul Harragan, Associate Partner, Cybersecurity, UK&I Transaction Strategy and Execution - EY Parthenon, Richard Davis, Head of Cyber Security Strategy EMEA - Netskope, Henrik Kietzer, Head of IT Operations (Cyber Security and Infrastructure) - National Trust, Vladimir Krupnov, Threat Intelligence Lead - Revolut, Practical application: How to integrate ZTNA into the modern workplace, Gernot Hacker, Sales Engineer Manager EMEA/APAC - appgate, Master class: Predictive defence to get ahead of the attackers, Frances Ackroyd, Senior Cyber Human Factors Behavioural Scientist - Atkins, Zeki Turedi, Chief Technology Officer, EMEA - Crowdstrike, Fireside discussion: How to achieve bank grade cybersecurity, Milan Patel, Global Head of MSS - BlueVoyant, Jim Hart, Chief Information Security Officer - Pollinate International, The big debate: How to defend against ransomware and vicious infections, Frank Satterwhite, Principal Cyber Security Consultant - 1600 Cyber GmbH, Nick Ross, Security Engineer - Trend Micro, Stuart Seymour, Head of DBS Cyber Security Incident Response and Continuity - BAT, Don Gibson, Head of Cyber - Department For International Trade (DIT), Technical Talk: Your company through the eyes of 40,000 hackers, Inti De Ceukelaire, Head of Hackers - Intigriti NV, Risk mitigation: Operational technology cybersecurity risk you should be concerned, Nigel Stanley, Director of Cybersecurity - jacobs, Tech talk: Get familiar with XDR - Extended Detection & Response, Andy Lalaguna, Senior Solutions Architect - eSentire, Javvad Malik, Security Awareness Advocate - KnowBe4, Tech insights: Log4j vulnerability and the lessons they present for enterprise IT, Mohamed Hamid, Lead Infrastructure Engineer - Cabinet Office, Keynote address: Taking the right steps towards cyber security, Steven Furnell, Professor of Cyber Security - University of Nottingham, The BIG debate: Creating a security-first culture, John Scott, Head of Education, Cyber Security Division, Information Security - Bank of England, Jack Hayward, Head of Information Security - Wellcome Trust, Minimising risk from cyber threats: focus on reducing time to containment, Nick Dyer, Senior Systems Engineer - Artic Wolf, Case study: Company culture developing a trustworthy workforce, Philip Hodgins, Mott Macdonald - Group Information Security Principal. Whilst it is true that most Cybersecurity Conferences in the UK are held in London weve noticed that there are plenty of other events in Manchester, Birmingham, and other prominent cities they are all streamed in below automatically. And many are still putting the right pieces in A multi cloud environment allows you to pick and choose the best technology for the job from different providers perhaps cheap storage from one cloud provider and the best apps from another. Infosecurity Europe, RX, and Reed Exhibitions are trade marks of Reed Exhibitions Limited and its affiliates. Making Developer Experienc Over the past months, weve seen the Web at its best: enhancing lives, enabling business, and connecting people in creative, positive ways globally. Wil Rockall, Cyber Security Partner - Deloitte, Jason Garbis, Appgate - Chief Product Officer, Business strategy: Adapting Zero Trust to Cloud with SSE, Neil Thacker, Chief Information Security Officer, EMEA - Netskope, Best policy: A guide to implementing Zero Trust and reducing overall risk, Tim Holman, Chief Executive Officer - 2|SEC Consulting, Martin Ingram, Product Owner, Identity and Access Management - Royal Bank of Scotland, Milad Aslaner, Senior Director, Cyber Defense Strategy & Public Affairs - SentinelOne, Mark Osborne, Chief Information Secutiry Officer - Jaja Finance, The Consumerisation of identity: How to protect the digital self, Paul Holland, CEO & Founder - Beyond Encryption, With security depth, comes complexity and pain, Lee Harris, Threat Management Sales Leader - IBM UKI, Security strategies: Building a state-of-the art security operations centre using MITRE ATT&CK, Marius Poskus, Cloud Security Engineer/Architect - Dominos UK. Discussing the impact of track and trace, lockdowns and View Under control: are Coronavirus restrictions a new reality for government surveillance? Cloud. Connect with those who might just be the next industry leaders or the tech giants of tomorrow. What Does Application Security Look Like in a Post Log4j World? You need to focus your scant resources to do what you can, protect your mental health and retain your personal life. This session will guide you through the k Everyone wants to be famous, and in a world of selfies and social media, the internet provides the perfect platform to facilitate that. Security programmes have undergone major changes in recent years, to adapt to the changes that Agile development, DevOps pipelines and faster deployments brins. Find out how to be a part of this! Were monitoring government guidance in the UK and will work with the venue to adapt our plans as necessary to ensure the safety and health of our attendees, speakers and our staff isn't compromised by their attendance. Theres no doubt that the UK is a major epicenter of Global Cybersecurity. More details to be confirmed soon! If you continue to use this site we will assume that you are happy with it. But there are several challenges to overcome when securing network access for you For many years, organisations could only mount a defence against cyber security breaches after becoming aware they were infected - and this was often simply too late. Doesnt mean that the cy We all know that public cloud hyperscalers like AWS, Azure, and GCP enable you to deliver new products and capabilities at breakneck speeds. Round Table 4 - Is the complexity of your security architecture a threat to your business? This complexity makes them an attractive target for determined criminals, politically motivated hackers and insider thr Why does cloud make us think differently about security? Expect immersive, hands-on learning activities, with a mix of 60-minute, in-depth round-table discussions. Daniel ONeill, Director Global MDR Security - Bitdefender, Case Study: How A UK Council Moved Their Network Defence to the Cloud to better deter ransomware and saved money in the process, Ed Jackowiak, President And Chief Executive Officer - Cyglass, Skills and Talent: The State of the Cybersecurity Workforce in 2022, Chris Green, Head of Communications - EMEA - (ISC)2, Phil Tonkin, Senior Director of Strategy - Dragos Threat Operations Centre, Two years behind closed doors A review of the cyber activity seen during a global pandemic, Rountable 4 - Innovating at the speed of cloud without compromising on security, risk and compliance, Marcelo Negro, Global Cloud Security Evangelist - Orca Security, Roundtable 1 - Zero Trust: Mapping your Journey, Roundtable 2 - How To Use AI to Strengthen Your Cybersecurity, Keith Poyser, Regional Director UK & Ireland - SentinelOne. These exclusive sessions will offer a in-depth discussion into the latest hot topics in the industry. Just look at the events of the past two years. Zero Trust Network Access (ZTNA) is the new industry standard for secure access to anything, from anywhere, by anyone. If companies are installi As a security professional, you cant do everything. Terms | Disclaimer | Privacy Policy | Cookie Policy, From industry experts sharing insights & trends relating to, Offering deep-dives into some of the industry's most advanced and, Head of Product Management & Innovation, Integrity360, Cyber Threat Response Manager, Integrity360, EMEA CTO, CISO, Executive Cyber Security Advisor, Vectra AI, Director of Sales Engineering, Forcepoint, Head of Solution Architecture, Integrity360, Head of Cyber Risk Advisory, Integrity360, challenges faced by cyber security professionals, On topics critical to your business in 2022, Head of Product Management, Strategy & Innovation, Nick Brownrigg, Head of Solution Architecture, Ellis Reed, Solution Architect Integrity360, Matt Cross, Regional Sales Director, Varonis, Patrick Wragg, Cyber Threat Response Manager Integrity360, Graeme McMillan, Senior Sales Engineer, Rapid7 UK. Think hackathons and escape rooms; Geek Street is anything but the ordinary PowerPoint presentation to meet your need for more technical interactive fun! With two in three mid-market organisations suffering an outage in 2021 and one in five paying a ransom, it's time to How do you manage diverse threats across multi-cloud infrastructure? Check out the Integrity360 Resource Library for useful eBooks, Videos, Upcoming Event details and more. 2012 - 2022 Concise AC, Cyber Events United Kingdom 2022 - 2023. However, despite years of well-publicised cybersecurity breaches, many C-su Cloud-native and serverless technologies are gaining traction as organisations increasingly recognise the value of containers and Kubernetes in application development environments. We use cookies to ensure that we give you the best experience to see InfoSec events in our directory. Presentation - Matt Tomlinson, Director, UK, Deryck Mitchelson, Field CISO, EMEA, Check Point, Presentation - Brian Martin, Head of Product Management, Strategy & Innovation, Presentation - Kilian Englert, Director of Field Engagement at Varonis, Presentation - Nick Brownrigg, Head of Solution Architecture, Presentation - Sir Alex Younger, Former MI6 Chief, Presentation: Khalid Khan, Director of Sales Engineering, Forcepoint. If you rely on multiple security tool Cyber-criminals have become thoughtful about ransomware attacks, taking time to maximise your organisations potential damage and their payoff. Ransomware: Are Organisations Overconfident yet Underprepared? Roundtable 1 - Finding SASEs Holy Grail - The Business Value of Security Transformation, Roundtable 3 - Managing Cyber Defense with Limited Staff, Roundtable 5 - Preparing for a ransomware attack how to formulate an action plan to mitigate risk, Alex Jinivizian, VP of Strategy & Corporate Development - eSentire. The first one on Tuesday 21st will be taking a deep dive into SOC fundamentals, exploring innovative ways your security team can thrive in this challenging era. Wed happily argue that Washington DC (Maryland) along with London and Israel are the three major drivers of Cybersecurity Resilience. Non-technical employees take an active role in protectin End Cyber Risk: Arctic Wolf are the worldwide leader in Security Operations, with over 3000 customers of all sizes trusting its security operations cloud and the Concierge Security Team to give 24/7 A trustworthy workforce is surely the Holy Grail for protecting your organisations data against theft and misuse. hbspt.cta._relativeUrls=true;hbspt.cta.load(2223611, '6b694435-109e-4183-83ae-22f82d9efbe2', {"useNewLoader":"true","region":"na1"}); London, United Kingdom + 44 20 3397 3414. 678540. Business activity: Activities of exhibition and fair organisers VAT No. This historic central London based venue on the River Thames is easily accessible by rail, tube, bus and river. If youre on the digital front lines and want to feel empowered by information, our Conference Programme is designed specifically for you - here to help you best defend your organisation, protect the data and privacy of individuals, and develop your career. The panel will feature inspirational women at very different stages of their cybersecurity careers, willing to divulge their personal stories and share their own journeys, including the challenges, the triumphs and even the traumas. In this sess Roundtable 3 - How FedEx DevSecOps journey implementing change within a large enterprise resulted in success, and what they learnt, Anthony Morgan, Technical Specialist Sr. - FedEx Express International, Paul Horton, Lead Solution Architect - Sonatype, Bold, New Tech Strategies in Times of Change, Sir Tim Berners-Lee, Inventor - World Wide Web, Master class: Adopting the Zero Trust security model, Fredrik Hult, Chief Information Security Officer, PagoNxt.tech - Grupo Santander. Modern security: How do you mitigate threats in a perimeter-less environment? The Log4shell vulnerability found in the Log4j logging framework has been recognized as one of the most critical vulnerabilities ever, open source or otherwise. This roundtable will explore in detail the practical steps your organisation can take to automate certificate lifecycles and avoid system downtime, lost revenue or even a poor reputation. Join like-minded senior professionals in an access-all-areas, networking haven. The UK Mid-Markets Cyber Security Code Red: Is Zero Trust the answer? IT security is often more an art than an exact science. In 2009, he became the head of counter-intelligence, during which he was involved in security for the London Olympics 2012. In this session, well present Falco (a CNCF project for runtime security) along with Sysdig Secure (a commercial tool). Use case: Crime and control in an age of cloud complexity, Robin Smith, Chief Information Security Officer - ASTON MARTIN LAGONDA. Were biased in our mentioning of DC4420 because its more of a London-based Hacker Conference, and thats what were into. Today's cybercriminals are more confident than ever before, yet at the same time there is an acute shortage of security staff with the appropriate skills. Alex became the UKs Spy Chief, a position known as C in 2014. New DevSecOps programmes and models hav Digital certificates are everywhere within your organisation and are growing exponentially in number.Unfortunately, a missed certificate expiry or a sudden requirement to change out certificates in vo Join Neil Thacker, CISO EMEA at Netskope, Gartner Quadrant Leader in Security Service Edge, as he outlines how to achieve cost efficiency, performance & risk reduction during securty transformation. Our research shows that the UK is second in having the most amount of conferences taking place in 2022. Preventing a data breach. Ryan Aldred, Head of GCP Security Engineering - Lloyds Banking Group, Mindy Player, Cloud Security Director - Lloyds Banking Group, No one-size-fits all: building a security function for the post-pandemic world, The best of both worlds? Ash Hunt, Group Head of Information Security - Sanne Group, Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust, Ben Jenkins, Senior Solutions Engineer - ThreatLocker, Enhancing Zero Trust Postures with self-learning AI, Oakley Cox, Director of Analysis - Darktrace, Best practice: Agricultural revolution how a global foods business transformed its security.

Sitemap 3