You are on page 1of 5
s28r2021 Virtual Conference Apri Programme — Cyber News Group P ss GRour ove PSBE « Cyber News: HOME ABOUT CYBERCONNECT VIRTUALCONFERENCESY Q Group PSBE CyberNews. Q vew Group ST) silane ha Tee Programme — UTC Time Zone ‘08:00 - Chairs Opening Address - John Doody + 08:00 Detection and Response in 2021: Where to Focus for Effective Business Protection” ‘ith so many predictions, celebity threats, and ransomware fascos, ts often forgotten that there are key fundamentals of Detection and Response that will help drive significant maturty in your ‘organisations infosecurty programs. From knowing what assets and intellectual property you have, ‘who may want, and how attackers could access it, to what you're doing as a business to prevent, detect, and respond to treats and breaches. Join Rapids Chief Security Data Scientist, ob Russ ‘and Head of Detection and Response for EMEA, Elis Fincham as they discuss areas where businesses ‘shouldbe focusing thelr energy to effete protect the employees and assets, They wil also share 8 few war stores they've experienced wen this focus lapses! ‘What you wil ean + How to mitigate common eyber risks and challenges of cloud migration + Explosion ofthe edge and the imoactof sifting to remote working +The implications of the growing numberof applications to enable workforces and support customers + Recommendations on what to focus on given the pace of change as you migrate tothe cloud RAPID += 09:30 - Three key techniques threat actors willuse on your network’ I we reflect onthe cybersecurity news of 202 iis clear that determined treat actors are using carefully planned and sophisticated attack techniques to breach the networks of target organisations. ‘We believe that 2021 will beno different. In this seminar, you wil ear tree key network-based techniques that threat actors willemploy during atypical attack ona target environment hitpsiwwv-cybemewsgroup.co.ukvitual-canference-apri-programme! 1s s28r2021 Virtual Conference Apri Programme — Cyber News Group ‘Join Dan Crossley, Enterprise Sales Engineering Manager, LogRhythm, to gain insight HNo How Be D {following attack techniques operate, enabling you to enhance your ovn threat hunting and detection approaches: ~ How attackers establish Command & Control (C2) communications and infrastructure = How Domain Generation Algorithms (OGAs) work and why they are used ~ How attackers can exflirate data via DNS tunnelling entation: Phil Sully, C10, Costa - Future of Cyber Security ~ Its Personal’ ‘Covering the personalisation and payment futures for businesses and identity management ‘+ 10:30 -'Securty Telemetry: Detection as Code! ‘See firsthand how to utliz a clouc-natve security analytics system built on core Google infrastructure to understand the increasing amounts of secur telemetry data in your erganization. Learn how to Investigate threats and attacks within your own network atthe speed of a Google search and use security analytics as a force multiplier fr threat hurting and incident response, Google Cloud Security += 11:00 - Join us inthe Networking Lounge! Please take time to visit our sponsors, and interact live with speakers and staff members within their booth ‘4-11-15 - ‘Securing the Future of Work with Cyber Al ‘The future of work remains unpredictable and uncertain. More than ever before, business leaders need toremain confident that their operations can continue securely inthe face of glabal or eves regional ‘rises, and while sections ofthe economy are slowly re-opening, eyberatackers are ramping up thelr ‘campaigns. ‘As businesses look set to rely on cloud and SaaS tools forthe long term, our digital environments are ‘going to be more dynamic than ever. Yet organizations are finding themselves undergoing a delicate balancing act—each new work practice and technology that is itroduced also brings unforeseen risk, Stati, legacy approaches have become redundant, both unintelligent and ikequipped to adapt ‘Organizations must rethink heir approach tosecurty anérely on new technologies Ike Alo achieve ‘much-needed adaptabity and resilience. Darkrace isthe word leader in cyber Al technology, and leverages unsupervised machine leaning o seamlessly adapt and integrate into changing ‘environments and to detect and respond to attacks in the eallest moments, Inthe face of an uncertain present and future, Cyber Al enables businesses to continue ‘communicating operating and innevating, ‘?DARKTRACE an resentation from OneLogin viey Cooks Paley hitpssiwww-cybemewsgroup.co.ukvitual-canference-apri-programme! 28 s28r2021 Virtual Conference Apri Programme — Cyber News Group onelogin ‘+ 12:15 - Lunch and Networking ane - Ransomwate Defence for all Teams: ‘Critical Steps to Defeating Ransomware! Ransomware is getting worse, and everyone teling you thal you must be preparee, but how? Large “enterprises operate 26x7 security operations center ~ thats nota business option fora small team, Bull your own security data lake or deploy 3 SIEM ~ we cannot find the people to hire to run them, and if we dd, we could not afford it ‘So what ea small team supposed to do? ‘This presentation will help small teams understand what is essential ad offer paths forward to build a _more robust oyber security program. Topics covered include: “The five cftical items you need to do now to protect your organization fram ransomware attacks +The strengths and weaknesses of endpoint and network security and where each itn your defense, + Emerging services models to boost your defenses, including software asa service, managed security ‘services, and managed detection and response For mid-and small sized businesses with Iimited resources, this webinar will help define what is Important and how to better protect your organization G cusiass ‘+ 18:15 - Keynote Presentation: Lubica Pendaroska, President, Women4Cyber North Macedonia, ‘+ 13:45 - Presentation from Fastly fastly += 14:15 - Presentation from One Trust a1 + Join us in the Networking Lounge! Please take time to visit our sponsors, and interact ive with speakers and staf members within their booth ‘+ 18:00 - Keynote Presentation: Shawnee Delaney, CEO, Vaillance ‘+ 18:30 - Exposing the Dangers of Poor ssword Management With Security Intelligence’ hitpsiwww-cybemewsgroup.co.ukvitual-canference-apri-programme! ais s28r2021 Virtual Conference Apri Programme — Cyber News Group ‘The continued effectiveness of certain threat actor tools in part due to poor password hygiene ‘There is no honour among thieves, and some of these tools have been cracked, allowing any interested ‘ybereriminal to use them at a cheaper price than offered by the orginal seller — or even completely free. Checkers and brute forcers are among these popular ols sol and shared onthe criminal ‘underground to validate ecedentials quickly and easily. ‘+ 16:00 - Presentation fram Cyber Observer Ooskserver ‘= 16:30 -IT Security threats that should be keeping your company awake at night Hackers don't think ike the rest of the population, which Is why they are able to spot weaknesses that ‘everyone else just walks right by. Leam howto significantly reduce your risk to the most prominent attacks that your company faces go that you can sleep more peacefully a ight, from Bryan Seely, world-famous hacker, Cybersecurity expert, author and former U.S. Marin 1+ 17:20 - Conference Close and Entertainment Enjoy a catch up with speakers, sponsors & peers and join our post-event entertainment More than 2 pretty face in a purple suit, Jonathan Molo has been astounding audiences with his ‘signature blend of high energy, interactive comedy magic forthe past 25 years. Jonathan isa member ofthe prestcious Academy of Magical Arts and also a resident Magician atthe ‘World Famous Magic Castle in Hollywood, California, Kis vitual magic show is unparalleled and you will not want to miss ths! 04 01 15 43 Days Hours Minutes Seconds 211 Delegates booked so far hitpssiwww-cybemewsgroup.co.ukvitual-canference-apri-programme! 46 s28r2021 \irwal Conference Apri Programme — Cyber News Group Google Cloud Security hitpssiwww-cybemewsgroup.co.ukvitual-canference-apri-programme! - 55

You might also like