Security Track

The Security Track will deep-dive into the challenges and issues the security industry faces on a daily basis, equipping attendees with actionable content and strategies. Topics include the future of security, how to engage the board, data discovery, crisis management, challenges in the cloud, emerging technologies and much more.

30-Nov-2020

7:30 GMT

Navigating Regulatory Compliance in APAC Through Effective Data Protection Strategy

Looking at the progress and complexity of the regulatory landscape in APACand applying effective data strategy to address that with the help of Microsoft's Compliance Management and information protection and governance capabilities.

Speakers

Director, Security Solution Group for Asia Pacific and Japan, Microsoft

Speakers

Job title

Job title

Job title

8:00 GMT

The Evolving Security Landscape: Trends to Expect in 2021 and Beyond

What is the current state of cybercrime and what are the common types of incidents being reported?

We explore the true extent and cost of security breaches, developments in the attacker ecosystem and how businesses can protect and defend against these.

Our panelists will also look to future trends, outlining what new risks businesses should expect in 2021 and beyond.

Speakers

Cyber Security Journalist and Founding Board Member, InfoSec Hoppers

Security Specialist

National Cyber Lead, Police Digital Security Centre

Chief Information Security Officer, healthAlliance New Zealand

CEO, ThreatLocker

9:00 GMT

Engaging the Board on Cyber Security

Engaging the board is an ongoing challenge in cyber security for a variety of reasons: what seems like a uniquely technical issue is actually a complex business risk present across different business functions.

Board members don’t necessarily have the technical knowledge to feel at ease making decisions about cyber risk, and a lack of regulatory clarity and metrics around cyber threat makes it challenging to track ROI.

This session asks how we can prepare a board for a crisis, using planning processes to help shape decisions, identify areas in need of investment and gain cyber security sponsorship at the highest levels of the business.

Speakers

Non-Executive Director, Ukreximbank

Head of Information Security, L&Q Group

Partner, Kemp Little; Director and Counsel Institute of AI

Interm Program Manager Cybersecurity, The Dutch Railway

10:00 GMT

What Does a Successful Data Access Governance Programme Look Like?

Strong walls only get you so far – the nature of a best practice approach to data access governance is to increase the focus on how data is controlled internally.

This session brings together experts to discuss advances in approaches to data access so your business can have visibility of what data you have, who has access and how access is achieved.

The panel will focus on how to build policies, procedures and controls to reduce the risks associated with unauthorised access.

Speakers

Cyber Security Correspondent, BBC News

Enterprise Cloud Architect, Schroders

Associate Professor, University of Groningen

CDPO, CISMS-Implementer, Information Security Engineer, Pilmico Foods Corporation

Information Systems Auditor, Metropol Corporation Limited and Board Advocacy Director, ISACA Kenya Chapter

R&D and Product Director, NetApp’s Israeli Innovation Center

11:00 GMT

Data Discovery: What Skeletons are Hiding in Your Unstructured Data?

Unstructured data is a compliance risk. Examples of this type of data can include the content of email messages and spreadsheets through to business plans and intellectual property.

In this session we ask: where does your critical data reside? Who has access to your sensitive, classified data? And what policies, processes and remedial actions do you have to protect your data?

We cover best practice on the most effective strategies that today’s security leader’s use when it comes to protecting data.

Speakers

Former Group Product Manager, Booking.com

Cluster Information Security Officer, Standard Chartered Bank

Information Security and Privacy Executive, MinerEye

Founder & CEO, Dathena

Privacy Counsel,
Air Canada

Cyber Security Journalist and Founding Board Member, InfoSec Hoppers

12:00 GMT

Building Your Security Dream Team

How can you guarantee that your security team has the right skills and resources to implement your cyber security plan?

This session discusses strategies for building and growing strong security teams which are aligned with your organisation’s objectives.

We look at defining roles, team structures, recruiting skills, and overcoming cultural and resource barriers.

Speakers

Reader in Cyber Crime & Cybersecurity, University of Portsmouth

Head of Information Security, University of Salford

Co-Founder and Managing Director, Cyberwayfinder

Head of Cyber Operations, Virgin Money

13:00 GMT

Sponsored Session

To be announced. Register for updates!

Speakers

Job title

Job title

Job title

13:30 GMT

How Diversity Can Enable Organisations to Combat Security Risks

A diverse cybersecurity team is critical to generating ideas and processes needed to confront security risks.

This session explores how diversity can improve outcomes and fuel innovation and produce opportunities for under-represented groups.

The panel will also discuss the challenge of overcoming common barriers and biases and addressing challenges in the security talent pipeline and retention.

Speakers

Associate Director, Chief Information Security Office, UBS

Chief Information Security Officer, HM Courts & Tribunal Service

Cyber Security Engineer and Founder of STEM Wahandisi La Femme

Cyber Security Correspondent, BBC News

14:30 GMT

The Price of Non-Governance in Your Unstructured Data

What role does unstructured data play in your organization?
What benefits can tight management of unstructured data deliver to an organization?
What is the price of non-governance on your business operations ?

Take-aways for the audience:
- The critical business importance of tight data governance – now more than ever given the proportion of unstructured of data in your network and the regulations from privacy and security concerns
- The harmful operational implications of keeping data governance in a manual realm
- The options of automation and what to look for in an automated technology.

Speakers

Chief Security and Trust Officer, Cymatic

Co-founder and CEO, MinerEye

Speakers

Job title

Job title

Job title

15:00 GMT

Business Resilience and Continuity in a Time of Uncertainty: Trends, Challenges and Lessons Learned

Business continuity planning allows organisations to respond, resume and restore operations in the event of disruptions.

With the proliferation of social, mobile, Cloud, big data and AI technologies, the risk and attack vectors have multiplied and become more complex.

We explore how your business can prepare and operationalise continuity plans, how to manage third party risk, and maintain visibility of a remote working environment during the COVID-19 pandemic.

Speakers

Reader in Cyber Crime & Cybersecurity, University of Portsmouth

Cyber Risk Manager, National Healthcare Group, Singapore

SVP Global Products & Delivery, Prevalent

Independent Cyber Security Consultant

16:00 GMT

Best Practice for Incident Response: Crisis Management, Response and Recovery

Effective incident response is a key component of being able to contain and respond to a breach.

We explore key activities required in each phase of your incident response from how to identify risks and communicate during crises, to the containment of breaches and carrying out a post-mortem in the aftermath of a breach.

Speakers

Cyber Security Correspondent, BBC News

Information Security & Privacy Officer, Eurofiber

Chief Information Security Officer and Data Protection Officer, Council of Europe Development Bank

Director - Cyber & Data Protection, DWF LLC

16:45 GMT

Keynote: Jeff Lanza in Conversation

The FBI’s former security expert shares his insights into how the new challenges facing organisations from criminals are likely to develop in the coming years.

One of the world’s most sought-after Panellists on cybersecurity, and drawing on his 20 year career in the top ranks of law enforcement, Lanza will give the audience the inside track on what they have to fear most.

Speakers

Former Special Agent, FBI

17:30 GMT

The Classification Conundrum: Why It’s Time to Rethink Your Approach to Data Classification

Data classification is embedded in the very DNA of successful data protection and privacy programs, at the heart of a true data asset inventory, and is critical for compliance - but it can be difficult, unreliable, and inconsistent (at best).  How can enterprises know their data in a fragmented data landscape of diverse data formats, schemas, content, and metadata types? Why haven’t we solved the classification conundrum - and how can security and privacy teams lead the charge for next-generation classification?  

It’s crucial that data classification takes a leap forward - enabling organizations to maintain an accurate data inventory, achieve continuous compliance, get insight on their critical data faster, and establish a holistic view of sensitive data across the data sprawl.  

Join this session to learn more about:
●      Why organizations need a new approach to data classification - and why traditional classification isn’t enough
●      How to apply ML to get deeper insight into data
●      New techniques for classifying sensitive data

Speakers

Director of Product Management, BigID

Speakers

Job title

Job title

Job title

18:00 GMT

Investing in Your People: The Value of Security Awareness and Engagement

The best way to secure your network and keep your data safe is to invest in your employees.

We discuss ways to mitigate risks through awareness training, strategies for getting buy-in for security awareness exercises, and best practice on decreasing social engineering and phishing attacks.

Speakers

Reader in Cyber Crime & Cybersecurity, University of Portsmouth

Chief Information Security Officer, Lusíadas Saúde

Information Security Specialist, London Business School

Cyber Security Awareness, Behaviour and Culture Specialist, Travelex

Vice President, Global Compliance and Information Technology, OneLogin

19:00 GMT

Embedding Security and Risk Management into Your Organisation

Cyber security plays a critical role in helping digital businesses to flourish.

How can organisations ensure that security is the starting point of their digital transformation activities rather than an afterthought? How can the security function add value to the digital business and contribute towards creating great customer journeys and trust among stakeholders?

We explore how security can be included from the outset and embedded across organisations.

Speakers

Information Rights Manager, The Open University

Group Privacy Officer, Skyscanner

Director, PrivacyCulture

Global Privacy Risk & Compliance Manager, dunnhumby

Speakers

Cyber Security Journalist and Founding Board Member, InfoSec Hoppers

Chief Information Security Officer at ChristianaCare

Vice President, Information Security Officer, Pacific Dental Services

Chief Information Security Officer, Sparbanken Syd

Head of Cyber Security Architecture and Solutions, innogy SE

Chief Technology Officer, PKWARE

1-Dec-2020

8:00 GMT

Sponsored Session

To be announced. Register for updates!

Speakers

Job title

Job title

Job title

9:00 GMT

Keynote Session

To be announced. Register for updates!

Speakers

Job title

Job title

Job title

10:00 GMT

Using Security as a Tool to Build Competitive Edge

Security functions in some leading organisations are beginning to move beyond just their role as defence mechanism and are defining the role they can play in contributing to the overall strategic vision.

How can security demonstrate its value in executing a winning competitive strategy?

This session looks at the best practice and explores how businesses can leverage cyber security to gain edge.

Speakers

Chief Information Security Officer, Crypto.com

Head of Customer Success, Exonar

Co-Founder and Managing Director, Cyberwayfinder

Podcast Host, Attributive Security

Senior Product Marketing Manager, Egress Software Technologies

11:00 GMT

Data Protection and Security in the Cloud

As the cloud environment continues to develop and new mechanisms are introduced which affect organisations’ strategies, opportunities and risks grow in complexity.

This session discusses likely technical developments and how practitioners can analyse their own processes to ensure they are fully taking advantage of them.

Speakers

Head of Risk across New Technology and Technology Change, Lloyds Banking Group

Director, Cloud Security Alliance UK Chapter

Director of Edge Protection, Forcepoint EMEA

Head of Information Security, Firstport UK

Cyber Security Journalist and Founding Board Member, InfoSec Hoppers

Chief Security Advisor, Microsoft

12:00 GMT

Understanding Security Regulations and Compliance

Cyber compliance requirements can vary in complexity and be imposed by law enforcement, regulatory bodies and even industry groups.

This session surveys key regulatory mandates and schemes and ways in which businesses can implement technical controls, policies and procedures based on requirements

Speakers

Cyber Security Journalist and Founding Board Member of InfoSec Hoppers

Founding Partner, Parava Security Solutions

Director of Compliance, Batelco

Partner, Kemp Little

Vice President, Enterprise & Cloud Erasure Solutions, Blancco

13:00 GMT

Sponsored Session

To be announced. Register for updates!

Speakers

Job title

Job title

Job title

13:30 GMT

Sponsored Session

To be announced. Register for updates!

Speakers

Job title

Job title

Job title

14:00 GMT

Keynote: Robert Hannigan on: The Future Cyber Threat Landscape

The creator of the UK National Cyber Security Centre in 2016, former GCHQ director Robert Hannigan can now give a unique and exclusive perspective on how cyber security threats are developing and how governments and business must evolve their reactions in a constantly changing landscape.

Speakers

Former Director, GCHQ

14:30 GMT

A Strong Finish: Disposing of Data Securely & Completely in a Post-Covid World

Drawing on industry research, best practices and case studies, we’ll explore why enterprises must address end-of-life data more efficiently and precisely than ever before. We will show you how enterprises can ensure data security throughout the data lifecycle, comply with data protection laws, and align data disposal policies with regulators and environmental goals.


We’ll also look at how to target regulated data within traditional endpoints (including remote workplaces), live environments (onsite or in the cloud) and decommissioned IT assets (drives and devices). You’ll also learn how application integrations and cross-vendor cooperation can help you comply with regulations and secure your data.


Takeaways include:
- Current innovations and best practices for data sanitization in the post-Covid hybrid work environment
- Adequate and inadequate disposal methods for active data and end-of-life IT assets
- How many large enterprises are putting data at risk with current practices
- How data erasure supports environmental stewardship and social responsibility policies
- How to address sensitive data in the cloud (including AWS and Azure public clouds) and overcome data migration “spillage”
- Best practices for automation and integration into third-party asset management solutions like ServiceNow

Speakers

Vice President, Enterprise & Cloud Erasure Solutions, Blancco

Speakers

Job title

Job title

Job title

15:00 GMT

Keynote: Misha Glenny on Geopolitics, Cybersecurity and the Future of Organised Crime

The subtitle of Misha Glenny’s worldwide best-seller, MacMafia was ‘Seriously Organised Crime’ and this award winning journalist is better placed than anyone to discuss how international criminal organisations are constantly innovating.

In this keynote he draws on his background in geopolitics to show how great power relations are driving insecurity in cyberspace and why companies cannot rely on governments to shore-up their vulnerabilities.

Speakers

Former Digital Security Journalist of the Year; Author, Broadcaster

15:30 GMT

To Trust, or Not to Trust the Cloud; That is Your Compliance and Risk Question

Many organizations struggle with digital transformation and cloud computing particularly when implementing a framework to meet their compliance requirements.  

In this session, we will discuss a framework and operational approach to support you to move your business forward delivering quality services balancing cost and risk.

Speakers

Senior Director of Trust and Security, EMEA, OneLogin

Speakers

Job title

Job title

Job title

16:00 GMT

The Deployment of AI, ML and Emerging Technologies in Cyber Defence and Attack

The deployment of new and cutting-edge technologies like Machine Learning and Artificial Intelligence can help security specialists to analyse and correlate data to identify patterns, scan various risks, gain predictive insights and forecast potential breaches.

But these emerging technologies are also being deployed in adversarial attacks, and increasingly being used to orchestrate sophisticated breaches.

This session covers key trends in this space and explores how businesses can responsibly deploy AI and ML for cyber defence.

Speakers

Reader in Cyber Crime & Cybersecurity, University of Portsmouth

Group Information Security Manager, IKEA (KSA/Bahrain)

Technical Director, Deloitte and founder of the Women Leading in AI network

Director of Research and Development in Cyber Security and Cryptology, Emirates Advanced Investment

VP of Information Security, Tessian

Chief Security Advisor, Microsoft

17:00 GMT

Identifying Risky Vendors: 7 Warning Signs You Shouldn't Ignore

For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with? Answering that question is not so straightforward. Third-party risk comes loaded with complexities and compromises. However, there are “red flags” you can look for when evaluating the security, privacy, and compliance programs of your vendors.

Speakers

Consultant, CIPP/E, CIPM, OneTrust

Speakers

Job title

Job title

Job title

17:30 GMT

Keynote: Edgar Perez in Conversation

One of the world’s foremost experts on how organisations can harness bleeding edge technologies to give themselves competitive edge, Edgar Perez will share his insights into how the world’s leading companies are changing their business models to leverage technical change.

Speakers

Quantum Computing, Artificial Intelligence, and Cybersecurity Futurist

Partner, DWF LLP

18:30 GMT

Protecting Data and Ensuring Compliance Posture in the Hybrid Work Environment

We have seen two years' worth of digital transformation in only a few months. Most of Microsoft's enterprise customers (and even Microsoft itself!) had to quickly transform the way they assess new and complex risks in the wake of remote work.

In this webinar, hear from security and privacy professionals at Microsoft and LTTS on how they are adapting to these changes through new processes and policies, and how technology is helping them manage their risks.

Speakers

Lead Cybersecurity Evangelist and Technologist, Microsoft

Director, Microsoft Information Protection and Compliance Customer Experience Team, Microsoft

Speakers

Job title

Job title

Job title

19:00 GMT

Data Discovery as a Platform

Learn how AI boosts data discovery to manage data governance, data privacy and data protection with simplicity in one platform.

Speakers

R&D and Product Director, NetApp’s Israeli Innovation Center

Speakers

Job title

Job title

Job title

Speakers

Featuring over 200+ speakers across 8 tracks, 90+ sessions, PrivSec Global will cover the most pressing and challenging topics in the data protection, privacy and security industry.

Latest From The Blog