1 Star2 Stars3 Stars4 Stars5 Stars
Loading...
Loading Events

Agenda

  • What the hack is going on

    – Robert McArdle
    EMEA Manager
    Forward Looking Threat Research Team
    Trend Micro

  • +Taking Control: Key Questions Every CEO Should be Asking About Cyber Security

    – Dr J.R. Reagan
    Global CISO
    Deloitte

    – Darren Argyle
    Global Chief Information Security Officer
    Markit

    – Michael Wignall
    National Technology Officer
    Microsoft

    – Troels Oerting
    Global CISO
    Barclays

    – Rik Ferguson
    VP Security Research
    Trend Micro

    Businesses are increasingly dealing with highly targeted and personallised cyberattacks; whether it’s spam delivering Ransomware or a one-off email to a CEO asking for a wire transfer, these attacks are tailored to succeed; and they do at an alarming rate.

    So, at a time of increasing regulation, more risk from cybercriminals, organisations are still full steam ahead with their digital journey and investment into new technologies. The fabric of corporate IT is transforming dramatically with digital investments in web, mobile and social, as well as new shared responsibility models from Cloud providers. Are businesses and security teams really prepared and able to sturdy their organisation through an attack on their people, systems and data?

    This panel discussion will look at the enterprise digital transformation and the risks that surface along this journey. Speakers will take questions on what drives the numbers game in terms of what causes the most losses and how to prevent them, what contributes to the success of security, and what is the cost of good security versus a poor one.


    • Security evolution at Microsoft

      Stuart Aston
      National Security Officer
      Microsoft



      +Enabling Cloud Security – Its more than just ticking a box

      Puneet Kukreja
      Partner – Cyber Advisory
      Deloitte Australia

      Cloud and IoT is now in mainstream adoption phase, often being referred to as the fourth revolution. The presentation will share experiences from early adopters and focus on challenges that vendors will not share when selling cloud enablement services. The effort and areas of focus that are often overlooked when initiating and securing cloud capability within an organisation.

      The session will commence with a snapshot of how the cloud security market has transformed and advanced over the past few years.

      The session will then share the learnings from implementation of multiple cloud enablement services, more specifically the challenges from an information security domain. Walk through of experiences of what works and what does not work, learnings and pitfalls that organisations need to be aware of when investing and enabling cloud services.

      The presentation will explain the typical lifecycle of a cloud ecosystem from contract sign to consumption and reporting. It will then discuss methods on how depending on the service being invoked distinct architectural and operational activities are required to enable success.

      The presentation will end with a model on how to evaluate and govern cloud services within an organisation which will be more than an audit of the cloud service provider for contractual clauses.


      Visibility into the Cloud and Virtualized Data Center

      Daniel Poole
      Senior Sales Engineer
      Gigamon



    • +Defense in depth: practical steps to securing your data and achieving compliance

      Chris Purrington
      VP Sales Europe
      Cohesive Networks

      Perimeter-based security approaches have not evolved to meet the modern application-focused enterprise. The weaknesses of the perimeter-based approach are on display in the east/west attacks on Sony, Target, and Home Depot exploits where hackers gained access to the perimeter, then ransacked the internal networks with minimal resistance.
      What can modern enterprises do? A “defense in depth” approach to security at the network layer.
      Enterprises must strengthen existing core networking hardware and virtualization layer security with added application security.

      In data centres, physical network isolation is not practical, and logical segmentation can be very difficult without using evolved networking approaches. As data centers became wholly virtualized and blur the line between data center and private cloud, we can finally add and control logical segmentation at the virtualization layer.

      This “Application Segmentation” provides the most comprehensive security model available today.
      You can apply application segmentation defense in depth using Cohesive Networks’ VNS3:turret. VNS3:turret creates a cryptographically unique micro-perimeter around each application topology. This presentation will examine how an defense in depth at the application layer can stop the next Sony attack.



      How VMware NSX can help organisations comply with the new European data protection laws

      – Ghaleb Zekri
      NSX Senior Systems Engineer EMEA
      VMware
      – Conor Ward
      Consulting Partner, Hogans Lovell, Chair of Legal Forum, Cloud Industry Forum (CIF)


  • +Panel Discussion: Charting successes and developing initiatives for tackling global cyber-crime

    – Steven Wilson
    Head of Cyber Crime Centre EC3
    Europol

    – Bob Flores
    Partner
    Cognitio (ex CTO, CIA)

    – Timothy Wallach
    Supervisory Special Agent – Cyber Task Force
    FBI

    – Charlie McMurdie
    Senior Cyber Crime Advisor
    PWC

    – Raimund Genes
    Global CTO
    Trend Micro
    – Robert Carolina
    Executive Director
    Institute for Cyber Security Innovation Royal Holloway University of London

    Often described as an ‘arms race’ the fight to overcome cybercrime is often a thankless task and like many preventative initiatives it’s only discussed when things go wrong. “911” for example, wouldn’t have happened had someone locked the door and no one who have had been acclaimed for stopping this disaster. In the online world of cybercrime syndicates, aggressive nation state hackers and disgruntled activists, when it does go wrong, everyone gets to hear about it.

    How do we as cyber security custodians cut through the media onslaught to better understand the lay of the land, the risks we’re really facing and the global initiatives that are doing good. How do we shift our focus to better learn from security events and share intelligence amongst our community?

    This panel discussion will address the current approaches from governments, law enforcement, industry and academia, and the micro and macro initiatives we can take to further develop the ‘good-guys’ capability in overthrowing the ‘bad-guys’.

  • A review of CLOUDSEC London 2016

    – Geoff White
    Technology Journalist
    Channel 4

    – Rik Ferguson
    VP Security Research
    Trend Micro

Speakers

Alex Hilton

Chief Executive
Cloud Industry Forum (CIF)

Bob_Flores

Founder & Partner
Cognitio Corp

Chris Purrington

VP Sales Europe
Cohesive Networks

Darren Argyle

Global Chief Information Security Officer
Markit

Dr J.R. Reagan

Global Chief Information Security Officer
Deloitte

Geoff White

Technology Journalist
Channel 4

Ghaleb Zekri

NSX Senior Systems Engineer, EMEA
VMWare

Jenny Radcliffe

Social Engineering

Michael Wignall

National Technology Officer
Microsoft

Puneet Kukreja

Partner, Cyber Advisory
Deloitte Australia

Raimund Genes

Global CTO
Trend Micro

rik_ferguson

VP Security Research
Trend Micro

Robert Carolina

Executive Director, Institute for Cyber Security Innovation
Royal Holloway University of London

Robert McArdle

Manager Threat Research Team
Trend Micro

Steven Wilson

Head of Cybercrime Centre
EC3 Europol

Stuart Aston

National Security Officer
Microsoft

Timothy Wallach

Supervisory Special Agent
FBI

Troels Oerting

Global Chief Information Security Officer
Barclays

Hosted By

Gold Sponsors

Silver Sponsors

Supporting Organizations

Exhibitors