The Security Track will deep-dive into the challenges and issues the security industry faces on a daily basis, equipping attendees with actionable content and strategies. Topics include the future of security, how to engage the board, data discovery, crisis management, challenges in the cloud, emerging technologies and much more.
Navigating Regulatory Compliance in APAC Through Effective Data Protection Strategy
Looking at the progress and complexity of the regulatory landscape in APACand applying effective data strategy to address that with the help of Microsoft's Compliance Management and information protection and governance capabilities.
Director, Security Solution Group for Asia Pacific and Japan, Microsoft
The Evolving Security Landscape: Trends to Expect in 2021 and Beyond
What is the current state of cybercrime and what are the common types of incidents being reported?
We explore the true extent and cost of security breaches, developments in the attacker ecosystem and how businesses can protect and defend against these.
Our panelists will also look to future trends, outlining what new risks businesses should expect in 2021 and beyond.
National Cyber Lead, Police Digital Security Centre
Chief Information Security Officer, healthAlliance New Zealand
Engaging the Board on Cyber Security
Engaging the board is an ongoing challenge in cyber security for a variety of reasons: what seems like a uniquely technical issue is actually a complex business risk present across different business functions.
Board members don’t necessarily have the technical knowledge to feel at ease making decisions about cyber risk, and a lack of regulatory clarity and metrics around cyber threat makes it challenging to track ROI.
This session asks how we can prepare a board for a crisis, using planning processes to help shape decisions, identify areas in need of investment and gain cyber security sponsorship at the highest levels of the business.
Non-Executive Director, Ukreximbank
Head of Information Security, L&Q Group
Partner, Kemp Little; Director and Counsel Institute of AI
Interm Program Manager Cybersecurity, The Dutch Railway
What Does a Successful Data Access Governance Programme Look Like?
Strong walls only get you so far – the nature of a best practice approach to data access governance is to increase the focus on how data is controlled internally.
This session brings together experts to discuss advances in approaches to data access so your business can have visibility of what data you have, who has access and how access is achieved.
The panel will focus on how to build policies, procedures and controls to reduce the risks associated with unauthorised access.
Enterprise Cloud Architect, Schroders
Associate Professor, University of Groningen
CDPO, CISMS-Implementer, Information Security Engineer, Pilmico Foods Corporation
Information Systems Auditor, Metropol Corporation Limited and Board Advocacy Director, ISACA Kenya Chapter
R&D and Product Director, NetApp’s Israeli Innovation Center
Data Discovery: What Skeletons are Hiding in Your Unstructured Data?
Unstructured data is a compliance risk. Examples of this type of data can include the content of email messages and spreadsheets through to business plans and intellectual property.
In this session we ask: where does your critical data reside? Who has access to your sensitive, classified data? And what policies, processes and remedial actions do you have to protect your data?
We cover best practice on the most effective strategies that today’s security leader’s use when it comes to protecting data.
Former Group Product Manager, Booking.com
Cluster Information Security Officer, Standard Chartered Bank
Information Security and Privacy Executive, MinerEye
Founder & CEO, Dathena
Building Your Security Dream Team
How can you guarantee that your security team has the right skills and resources to implement your cyber security plan?
This session discusses strategies for building and growing strong security teams which are aligned with your organisation’s objectives.
We look at defining roles, team structures, recruiting skills, and overcoming cultural and resource barriers.
Head of Information Security, University of Salford
Co-Founder and Managing Director, Cyberwayfinder
Head of Cyber Operations, Virgin Money
How Diversity Can Enable Organisations to Combat Security Risks
A diverse cybersecurity team is critical to generating ideas and processes needed to confront security risks.
This session explores how diversity can improve outcomes and fuel innovation and produce opportunities for under-represented groups.
The panel will also discuss the challenge of overcoming common barriers and biases and addressing challenges in the security talent pipeline and retention.
Associate Director, Chief Information Security Office, UBS
Chief Information Security Officer, HM Courts & Tribunal Service
Cyber Security Engineer and Founder of STEM Wahandisi La Femme
The Price of Non-Governance in Your Unstructured Data
What role does unstructured data play in your organization?
What benefits can tight management of unstructured data deliver to an organization?
What is the price of non-governance on your business operations ?
Take-aways for the audience:
- The critical business importance of tight data governance – now more than ever given the proportion of unstructured of data in your network and the regulations from privacy and security concerns
- The harmful operational implications of keeping data governance in a manual realm
- The options of automation and what to look for in an automated technology.
Chief Security and Trust Officer, Cymatic
Co-founder and CEO, MinerEye
Business Resilience and Continuity in a Time of Uncertainty: Trends, Challenges and Lessons Learned
Business continuity planning allows organisations to respond, resume and restore operations in the event of disruptions.
With the proliferation of social, mobile, Cloud, big data and AI technologies, the risk and attack vectors have multiplied and become more complex.
We explore how your business can prepare and operationalise continuity plans, how to manage third party risk, and maintain visibility of a remote working environment during the COVID-19 pandemic.
Cyber Risk Manager, National Healthcare Group, Singapore
SVP Global Products & Delivery, Prevalent
Independent Cyber Security Consultant
Best Practice for Incident Response: Crisis Management, Response and Recovery
Effective incident response is a key component of being able to contain and respond to a breach.
We explore key activities required in each phase of your incident response from how to identify risks and communicate during crises, to the containment of breaches and carrying out a post-mortem in the aftermath of a breach.
Information Security & Privacy Officer, Eurofiber
Chief Information Security Officer and Data Protection Officer, Council of Europe Development Bank
Director - Cyber & Data Protection, DWF LLC
Keynote: Jeff Lanza in Conversation
The FBI’s former security expert shares his insights into how the new challenges facing organisations from criminals are likely to develop in the coming years.
One of the world’s most sought-after Panellists on cybersecurity, and drawing on his 20 year career in the top ranks of law enforcement, Lanza will give the audience the inside track on what they have to fear most.
Former Special Agent, FBI
The Classification Conundrum: Why It’s Time to Rethink Your Approach to Data Classification
Data classification is embedded in the very DNA of successful data protection and privacy programs, at the heart of a true data asset inventory, and is critical for compliance - but it can be difficult, unreliable, and inconsistent (at best). How can enterprises know their data in a fragmented data landscape of diverse data formats, schemas, content, and metadata types? Why haven’t we solved the classification conundrum - and how can security and privacy teams lead the charge for next-generation classification?
It’s crucial that data classification takes a leap forward - enabling organizations to maintain an accurate data inventory, achieve continuous compliance, get insight on their critical data faster, and establish a holistic view of sensitive data across the data sprawl.
Join this session to learn more about:
● Why organizations need a new approach to data classification - and why traditional classification isn’t enough
● How to apply ML to get deeper insight into data
● New techniques for classifying sensitive data
Director of Product Management, BigID
Investing in Your People: The Value of Security Awareness and Engagement
The best way to secure your network and keep your data safe is to invest in your employees.
We discuss ways to mitigate risks through awareness training, strategies for getting buy-in for security awareness exercises, and best practice on decreasing social engineering and phishing attacks.
Chief Information Security Officer, Lusíadas Saúde
Information Security Specialist, London Business School
Cyber Security Awareness, Behaviour and Culture Specialist, Travelex
Vice President, Global Compliance and Information Technology, OneLogin
Embedding Security and Risk Management into Your Organisation
Cyber security plays a critical role in helping digital businesses to flourish.
How can organisations ensure that security is the starting point of their digital transformation activities rather than an afterthought? How can the security function add value to the digital business and contribute towards creating great customer journeys and trust among stakeholders?
We explore how security can be included from the outset and embedded across organisations.
Information Rights Manager, The Open University
Group Privacy Officer, Skyscanner
Global Privacy Risk & Compliance Manager, dunnhumby
Chief Information Security Officer at ChristianaCare
Vice President, Information Security Officer, Pacific Dental Services
Chief Information Security Officer, Sparbanken Syd
Head of Cyber Security Architecture and Solutions, innogy SE
Chief Technology Officer, PKWARE
Using Security as a Tool to Build Competitive Edge
Security functions in some leading organisations are beginning to move beyond just their role as defence mechanism and are defining the role they can play in contributing to the overall strategic vision.
How can security demonstrate its value in executing a winning competitive strategy?
This session looks at the best practice and explores how businesses can leverage cyber security to gain edge.
Chief Information Security Officer, Crypto.com
Head of Customer Success, Exonar
Co-Founder and Managing Director, Cyberwayfinder
Podcast Host, Attributive Security
Senior Product Marketing Manager, Egress Software Technologies
Data Protection and Security in the Cloud
As the cloud environment continues to develop and new mechanisms are introduced which affect organisations’ strategies, opportunities and risks grow in complexity.
This session discusses likely technical developments and how practitioners can analyse their own processes to ensure they are fully taking advantage of them.
Head of Risk across New Technology and Technology Change, Lloyds Banking Group
Director, Cloud Security Alliance UK Chapter
Director of Edge Protection, Forcepoint EMEA
Head of Information Security, Firstport UK
Chief Security Advisor, Microsoft
Understanding Security Regulations and Compliance
Cyber compliance requirements can vary in complexity and be imposed by law enforcement, regulatory bodies and even industry groups.
This session surveys key regulatory mandates and schemes and ways in which businesses can implement technical controls, policies and procedures based on requirements
Cyber Security Journalist and Founding Board Member of InfoSec Hoppers
Founding Partner, Parava Security Solutions
Director of Compliance, Batelco
Partner, Kemp Little
Vice President, Enterprise & Cloud Erasure Solutions, Blancco
Keynote: Robert Hannigan on: The Future Cyber Threat Landscape
The creator of the UK National Cyber Security Centre in 2016, former GCHQ director Robert Hannigan can now give a unique and exclusive perspective on how cyber security threats are developing and how governments and business must evolve their reactions in a constantly changing landscape.
Former Director, GCHQ
A Strong Finish: Disposing of Data Securely & Completely in a Post-Covid World
Drawing on industry research, best practices and case studies, we’ll explore why enterprises must address end-of-life data more efficiently and precisely than ever before. We will show you how enterprises can ensure data security throughout the data lifecycle, comply with data protection laws, and align data disposal policies with regulators and environmental goals.
We’ll also look at how to target regulated data within traditional endpoints (including remote workplaces), live environments (onsite or in the cloud) and decommissioned IT assets (drives and devices). You’ll also learn how application integrations and cross-vendor cooperation can help you comply with regulations and secure your data.
- Current innovations and best practices for data sanitization in the post-Covid hybrid work environment
- Adequate and inadequate disposal methods for active data and end-of-life IT assets
- How many large enterprises are putting data at risk with current practices
- How data erasure supports environmental stewardship and social responsibility policies
- How to address sensitive data in the cloud (including AWS and Azure public clouds) and overcome data migration “spillage”
- Best practices for automation and integration into third-party asset management solutions like ServiceNow
Vice President, Enterprise & Cloud Erasure Solutions, Blancco
Keynote: Misha Glenny on Geopolitics, Cybersecurity and the Future of Organised Crime
The subtitle of Misha Glenny’s worldwide best-seller, MacMafia was ‘Seriously Organised Crime’ and this award winning journalist is better placed than anyone to discuss how international criminal organisations are constantly innovating.
In this keynote he draws on his background in geopolitics to show how great power relations are driving insecurity in cyberspace and why companies cannot rely on governments to shore-up their vulnerabilities.
Former Digital Security Journalist of the Year; Author, Broadcaster
To Trust, or Not to Trust the Cloud; That is Your Compliance and Risk Question
Many organizations struggle with digital transformation and cloud computing particularly when implementing a framework to meet their compliance requirements.
In this session, we will discuss a framework and operational approach to support you to move your business forward delivering quality services balancing cost and risk.
Senior Director of Trust and Security, EMEA, OneLogin
The Deployment of AI, ML and Emerging Technologies in Cyber Defence and Attack
The deployment of new and cutting-edge technologies like Machine Learning and Artificial Intelligence can help security specialists to analyse and correlate data to identify patterns, scan various risks, gain predictive insights and forecast potential breaches.
But these emerging technologies are also being deployed in adversarial attacks, and increasingly being used to orchestrate sophisticated breaches.
This session covers key trends in this space and explores how businesses can responsibly deploy AI and ML for cyber defence.
Group Information Security Manager, IKEA (KSA/Bahrain)
Technical Director, Deloitte and founder of the Women Leading in AI network
Director of Research and Development in Cyber Security and Cryptology, Emirates Advanced Investment
VP of Information Security, Tessian
Chief Security Advisor, Microsoft
Identifying Risky Vendors: 7 Warning Signs You Shouldn't Ignore
For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with? Answering that question is not so straightforward. Third-party risk comes loaded with complexities and compromises. However, there are “red flags” you can look for when evaluating the security, privacy, and compliance programs of your vendors.
Consultant, CIPP/E, CIPM, OneTrust
Keynote: Edgar Perez in Conversation
One of the world’s foremost experts on how organisations can harness bleeding edge technologies to give themselves competitive edge, Edgar Perez will share his insights into how the world’s leading companies are changing their business models to leverage technical change.
Quantum Computing, Artificial Intelligence, and Cybersecurity Futurist
Partner, DWF LLP
Protecting Data and Ensuring Compliance Posture in the Hybrid Work Environment
We have seen two years' worth of digital transformation in only a few months. Most of Microsoft's enterprise customers (and even Microsoft itself!) had to quickly transform the way they assess new and complex risks in the wake of remote work.
In this webinar, hear from security and privacy professionals at Microsoft and LTTS on how they are adapting to these changes through new processes and policies, and how technology is helping them manage their risks.
Lead Cybersecurity Evangelist and Technologist, Microsoft
Director, Microsoft Information Protection and Compliance Customer Experience Team, Microsoft
Featuring over 200+ speakers across 8 tracks, 90+ sessions, PrivSec Global will cover the most pressing and challenging topics in the data protection, privacy and security industry.
Latest From The Blog
The Evolving Responsibilities of Today’s Chief Data Officer: Data is the new oil, here’s how that impacts CDOs
November 25, 2020Read More
A 5 Step Guide to Data Protection and Risk Reduction for Financial Services
November 25, 2020
Financial services organizations face specific challenges when it comes to securing their sensitive, personal, and regulated data: from addressing layered compliance requirements for various regulations to being able to proactively manage their data to mitigate risk and boost business outcomes.Read More