Accredited event by the CPD

The recent global crisis is causing ripple effects that will have a lasting impact on businesses, increasing the risk of cyber attack. The ‘new normal’ of hybrid business environments is heightening cyber security vulnerabilities, as organisations work to protect assets both in the office and at home. 

It was the time to re-evaluate security strategies and safeguard your operations. 

The second event of the Cyber Risk and Resilience Series, ‘Protecting Against Cyber Attack’, gave attendees tools to understand the human and structural process that can protect a business online. With analysis and debate on the role of AI to monitor your network for unusual activity, how to manage and prevent insider threats as well as the insights into creating a security culture in reality rather than just paying lip service to it. ‘Protecting Against Cyber Attack’ provided practical and business critical tools to improve the standard of monitoring, certification and training in any business.

Understanding & Managing Cyber Risk

Key questions that were answered:

‘A bad carpenter blames his tools’
How do you ensure your workforce is trained to implement the security tools and protocols you are putting in place?

Man vs. Machine:
What role should AI play in your network monitoring?

Where should you be prioritising to monitor for unusual activity?

Scaling technology that protects you and your business

Are your own staff your biggest cyber security risk? And if so, how do create a’ security culture’ to mitigate this risk?

What ‘unusual activity’ should you be looking out for? How do you know it is an attack rather than just unusual activity?

Agenda

Event 2
February 24, 2021
9:25 am - 9:30 am
Online Platform

Welcome Remarks & Explanation of Features of Digital Platform

9:30 am - 9:50 am
Online Platform
By

Data Download Presentation: Tread the Route to Cyber Resilience through your Unknowns

9:50 am - 10:30 am
Online Platform
By

Panel Discussion: Beyond the Marketing Spiel - What should you be looking for in a solution to protect your business?

10:35 am - 11:05 am
Online Platform
By

Presentation: Beyond BloodHound: Who let the dogs out?

In 2014, researchers from ANSII (National Agency for the Security of Information Systems) present a research paper detailing a new and unique approach using graph theory to map Active Directory security. This research was then used by third parties to develop BloodHound. Fast forward 6 years and the same researchers responsible for this initial research have gone above and beyond to explore strange new AD worlds where no one has gone before. Join us as we explore some of the advanced AD security issues that can only be seen via continuous AD graph theory!

11:50 am - 12:30 pm
Online Platform

Industry Specific 'Off the Record' Roundtables

Emily Turner
Chief Resilience & Security Office, Lloyds Banking Group

These roundtables will provide you with the same experience as meeting and chatting to someone new during the coffee break of a live conference. Organised by industry sector, each table will give you an opportunity to lesson share and network with others dealing with the same industry specific challenges as you.
There will be a table leader to drive the conversation and provide you with actionable learnings to take away from the conversation.

All you have to do is:
- Click on a topic table
- Choose whether you want to share your audio and visual
- Jump into the conversation

There will be several topics for each industry sector so that you have the opportunity for as much networking and lesson sharing as possible.
+ Finance & Legal
+ Remote Working
+ Government/Public Sector & Charities

12:30 pm - 1:45 pm

Lunch & Screen Break

1:45 pm - 2:15 pm
Online Platform
By

Presentation: Reducing the Human Factor: Can AI and Machine Learning Revolutionise the Cyber Security Sector?

A few facts are crystal clear. We, as a security industry, are not winning the war against cybercrime despite more than $100B spent each year by organizations. In addition it is equally clear that throwing more security professionals at the problem, even if they were widely available and affordable (which they aren’t), won’t solve the problem either as there is too much data, not enough integration, and too much forensic complexity for humans to keep up. The emergence of AI and machine learning as applied to security has received its fair share of hype, but can it really make a difference? This session will explore key aspects of AI and machine learning, will give some real-life examples of it in practice, and then you can decide if it is a revolution in the making.

2:20 pm - 2:50 pm
Online Platform
By

Presentation: A Human Centric Approach to Ransomware & Phishing Attacks: How do you protect your workforce from themselves?

2:55 pm - 3:30 pm
Online Platform
By

Thought Leadership & Management Panel Discussion: The Big Debate of Human vs. Technology: What is the best team structure to ensure the most efficient monitoring or is it better to rely on technology?

- How do you consider and factor in diversity of thought in the structure of your teams?
- Recruiting and retaining talent: has this become harder since the start of the pandemic?

3:30 pm - 4:00 pm

Afternoon Screen Break

4:00 pm - 4:20 pm
Online Platform
By

Presentation: Cybersecurity resilience in the new order

No part of our life has been left untouched by digitalisation. Already in play way before 2020, the Coronavirus pandemic has dramatically hastened the speed at which businesses are digitally transforming. However, at the same time it has also scattered the people who work within them and the customers who transact with them. The threat surface has multiplied, and controls are stretched like never before. How do Cybersecurity leaders navigate the new order, build resilience into their teams, systems and processes to pre-empt, detect and protect their organisations from a very clear and present danger.

4:25 pm - 5:00 pm
Online Platform
By

Panel Discussion: How can you use governance structures, team training and processes to prevent a breach?

Speakers included

 

If you are interested in speaking at the next event please contact:

Alex Bell

Portfolio Manager

[email protected]

Emily Turner

Chief Resilience & Security Office, Lloyds Banking Group

Sponsors were

www.alsid.com

Alsid is a cybersecurity vendor specialising in defending the common denominator of most attacks we see in the wild nowadays: Active Directory (AD) infrastructures. As a fully-automated cloud solution, Alsid for AD provides users with step-by-step, tailored recommendations for hardening their AD, a real-time attack detection engine, as well as capabilities for investigating AD breaches when they unfortunately occur. Whether in the cloud or on premise, Alsid is easy to deploy and operate – no specialised security knowledge required.

Mimecast

www.mimecast.com

Cyber attacks don’t stop at your email perimeter. Your security can’t either. That is why it is Mimecast’s mission to mitigate the risks you face from email, and support you in reducing the cost and complexity of protecting yourself by moving this workload to the cloud. Mimecast lives and breathes cloud technology. With developed proprietary cloud architecture, Mimecast offers you comprehensive email security, service continuity and archiving in a single subscription service. Ultimately, Mimecast’s goal is to make it easier for you to protect your business in today’s fast-changing security and risk environment.

https://www.isc2.org/

(ISC)² is an international, nonprofit membership association for information security leaders like you. We’re committed to helping our members learn, grow and thrive. More than 150,000 certified members strong, we empower professionals who touch every aspect of information security. 

www.okta.com

Okta is one trusted platform to secure every identity. More than 9,400 organisations trust Okta’s software and APIs to sign in, authorise, and manage users. Accelerate a world where everyone can safely use any technology. Okta brings simple and secure access to people and organisations everywhere. They promise to not only protect the identities of our customers’ workforce and users, but to ask, “what more can we make possible?”. 

 

www.thycotic.com

The easiest to manage and most readily adopted privilege management solutions are powered by Thycotic. Thycotic’s security tools empower over 10,000 organisations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritising productivity, flexibility and control. Headquartered in Washington, DC, Thycotic operates worldwide with offices in the UK and Australia.