Virtual Event

Programme

Please note that timings may change. 

We will continue to update the programme here so please check back frequently for updates or contact sara.hook@pulseconferences.com for the most recent draft programme. 

Day One Wednesday 17 June 2020
10:00-17:30 BST

10:00-10:30
LOBBY
PEOPLE
NETWORKING
EXPO
(30 mins)

Lobby – Check in and chat with peers!
People – Set up your virtual badge and profile, See who you know and who you don’t!
Networking – Ice-breaker CISO 360 Experience! Memorable 3-minute video connections with peers and luminaries!
Expo– Meet the Sponsors & Points for Prizes! Meet the sponsors, collect points at each stand to win prizes!

10:30-10:35
STAGE
(Video 5 mins)

Opening Remarks
Master of Ceremonies: Clive Room, Director, Pulse Conferences

10:35-10:40
STAGE
(Live 5 mins)

OPENING

Chairman’s Opening

Marcus Alldrick, CISO Luminary

10:40-11:10
STAGE
(Live 30 mins)

FIRESIDE CHAT

 

 

 

 

Looking Back, Looking Forward: Projects 2020 and 2030

In 2012, Vic and Rik built scenarios for the future of cybercrime. These became the basis for 2020, Trend Micro’s award-winning short movie series. Now that we’ve reached our time horizon and passed “Peak Blade Runner” last November, we’re reviewing how we did, and looking again to the future. In this short talk, we’ll take you through the original project and its results, and introduce you to the next generation of our work.

Rik Ferguson, Vice President Security Research, Trend Micro and Special Advisor, Europol

Dr Victoria Baines, Visiting Research Fellow, Oxford Department of International Development

11:10-11:35
STAGE
(Live 30 mins)

KEYNOTE

 

 

 

 

Do You Have Imposter Blindness? Fighting the Next Generation of Targeted Email Attacks

  • Highly-targeted, low volume impostor email – or business email compromise (BEC) – attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today.
  • But things are changing. Technology can now surpass people and process initiatives to proactively eliminate fraudulent emails, removing the guesswork for users.
  • What is BEC and EAC? Why are the threats to Stagecoach’s business?
  • Why are BEC and EAC so difficult to prevent?
  • How Stagecoach is working to overcome these challenges

Simon Taylor, Information Security Manager, Stagecoach Group

Adenike Cosgrove, Cybersecurity Strategy, International, Proofpoint

11:35-12:00
STAGE LIVE
(Live 25 mins)

FIRESIDE CHAT

 

 

 

 

Next Generation Defence: Using Hackers to Beat Hackers

There are many dilemmas in today’s complex cybersecurity world. Year on year increases in cyber-attacks, an increase in the sophistication of these attacks, a widening cybersecurity talent gap, IT security budgets that haven’t kept up with growing demands, and now large remote work forces and social distancing requirements. In this fireside chat, Justin and Mark will discuss an innovative crowdsourced security model that has been deployed at Freshfields. Learn why Freshfields is utilizing an army of ethical hackers to harden their corporate assets; and how security operations have been transformed and simplified, all while quickly deploying safer applications.

Mark Walmsley, Chief Information Security Officer (CISO), Freshfields Bruckhaus Deringer LLP

Justin Shaw Gray, Director, Synack Inc.

12:00-12:15
NETWORKING & EXPO (15 mins)

Networking – CISO 360 Speed Networking Experience! Memorable 3-minute video connections with peers
Expo- Meet the Sponsors & Points for Prizes! Meet the sponsors, collect points at each stand to win prizes!

12:15-12:25
STAGE
(Video 5 mins)

CISO MUSE

Back to Basics – Why are the Basics STILL So Hard?

Quentyn Taylor, Director of Information Security EMEA, Canon Europe

12:25-12:55

STAGE
(Live 30 mins)

PANEL

 

 

 

 

 

 

 

 

Cyber Resilience in a VUCA world – What’s next?  How do we translate trust, sharing and collaboration into technological terms?

Engaging the community with the big questions challenging leaders today. In a world of social media, false information, growing nationalism/authoritarianism, growing civil unrest and of course the current pandemic, hear predictions

· What is the current World order to cyber defence? How will this impact our businesses and economies?
· How we will find the right balance between legitimate increased surveillance for public health and intrusive mass surveillance?
• How can we ensure credible intelligence and increase levels of international collaboration?· Covid-19 is the greatest shock to business for a century. What will struggle to get back to how it was before, and what might change forever?
· What is the next killer digital virus, and will the world be able to cope with it?
· How can we mitigate the risks of and strengthen systemic resilience to fraud as critical priorities?
·  What do the next generation of cybersecurity operations look like? What is the role of automation?

Chaired by: Professor Dr. Robert Coles, Visiting Professor, Royal Holloway, University of London

Joined by:

Graham Edwards, Head of Cyber Security, Yorkshire Water

Graeme Burnett  Head of Application Security, Mastercard

Richard Hollis, CEO, Risk Crew

12:55-13:10

STAGE
(Live 15 mins)

KEYNOTE LIGHTNING TALK

Scams and Deception – Inside the mind of the scammer

We talk a great deal around the scam itself, but not about understanding the approach of individuals and why they scam. This session will take a very brief look into the factors that support why people commit deception related crime, and will look at the threats, challenges and responses to the changing fraud landscape. The demand for electronic devices to work and engage in social contact has substantially expanded the attack surface and the target pool has widened for fraudsters, who are also at the beginning of their own transformation!

Simon Scales, Specialist Public Sector SME and Former Head of Investigations

13:10-13:30

NETWORKING & EXPO (30 MINS)

Networking – CISO 360 Speed Networking Experience! Memorable 3-minute video connections with peers
Expo- Meet the Sponsors & Points for Prizes! Meet the sponsors, collect points at each stand to win prizes! 

13:30-13:45

STAGE
(Live 15 mins)
KEYNOTE LIGHTNING TALK

What’s In Your Software?

Tracking the software and software components an organisation uses in its products and its operations is crucial for responding to emergency threats. However, building and maintaining these Software Bills of Materials (SBOMs) is very challenging, especially across large enterprises. In this session, Alyssa Miller discusses the hidden threats in the Software Supply Chain, and analyzes some of the unique challenges of open source software, IoT and Medical devices, and Industrial Control Systems. She’ll share real world strategies and risk mitigations that organizations should employ to address these threats and reduce the risks associated with them.

Alyssa Miller, Hacker/Researcher, Application Advocate, Snyk

13:45-14:25

STAGE
(40 mins)

FIRESIDE CHAT

CISOs, 5 questions – CISO Futurists: How can we take our strategy to the next level?

  1. What are the top 3 learnings for you in the past 2 months?
  2. What will struggle to get back to how it was before, and what might change for ever?
  3. What kind of CISO do you need to be right now? And in 5 years?
  4. If you were able to give your younger self a piece of advice about the security industry, what would it be?
  5. How can we take our strategy to the next level? How can we leverage ML, AI, Automation for Cybersecurity?

Chaired by: Kevin Fielder, CISO, Just Eat

Panellists:

Martyn Booth, CISO, Euromoney Institutional Investor PLC

Bev Allen, Head of Information Security Assurance, Quilter

14:25-14:55

THINK TANKS
(live 30 mins)

Truly Transformational! Sharing Practical Lessons

These CISO 360 Think Tanks provide the opportunity to benchmark lessons with peers and to hear tried and tested approaches to deal with four areas of security that are seeing rapid development. Working in smaller breakout groups for the roundtable discussions, gives you the opportunity to come face to face on screen. Return to Stage for the wrap up at the end! Understand: What role these technologies are expected to play; How these areas fit within the business risk strategy. These are not presentations but roundtable discussions. 

PLEASE SELECT:

 

 

 

 

 

 

 

THINK TANK 1:

Future of Identity and Zero Trust
How are you ensuring the right individuals (or machines) access to the right resources, at the right times, for the right reasons?
Co-led by: Mike Kiser,
Global Strategist and Evangelist, Office of the CTO, SailPoint
Karl Lankford, Director, Solutions Engineering BeyondTrust

THINK TANK 2:

CyberOptimise360
How are we streamlining or optimising our cyber programmes?

Co-led by: Scott Raspa, Director and Jesse K. Dean, Vice President, Solutions, TDI

THINK TANK 3:

CISO-DevSecOps
How can we develop secure and fast.

Led by: Alyssa Miller, Hacker/Researcher, Application Advocate, Snyk

THINK TANK 4:
Cloud Security Risks and Audit
Mitigations, audit, compliance in cloud.

Led by: Mike Milner, Global Director of AppSec Technology, Trend Micro & CTO/Co-founder of Immunio

14:55-15:10

STAGE (15 mins)
WRAP UP

Truly Transformational – Wrap Up

Think Tank leaders have 3 minutes per Think Tank to share key findings back to the group, to wrap up.

15:10-15:25

NETWORKING & EXPO
(15 mins)

CISO 360 Speed Networking Experience! Memorable 3-minute networking to connect with CISO peers!

Meet the Sponsors & Password to Prizes! Meet the sponsors, find the password at each stand to win prizes!

15:25-15:30

STAGE
(5 mins)

CISO MUSE

A Better Way of Collaborative Working with Security

Martyn Booth, CISO, Euromoney Institutional Investor PLC

15:30-16:15

STAGE
(45 mins)
VIRTUAL FISHBOWL

 

Cyber Culture: Controls, Continuity and Compliance
The Fishbowl (main speakers) introduce and discuss the issues, while the outer circle participants observe the discussion, moving in and out of the Fishbowl, at the invitation of the Chairman, to share experiences and to ask questions. We look forward to an energised discussion! If you would like to be in the fishbowl participant observer partaking on screen please let us know at
teampulse@pulseconferences.com!

  • Balancing WFH compliance against business needs
  • Where is the new boundary of security and privacy?
  • Awareness campaigns – top tips to be heard remotely
  • How do we cultivate and grow security culture remotely?
  • Metrics to transform a remote security function. What KPIs work?
  • How do you build organisational accountability?
  • How do we maintain Security standards in a remote working environment?
  • How to manage a crisis team in a remote working environment

Chaired by: Professor Dr. Robert Coles, Visiting Professor, Royal Holloway, University of London

Fishbowl Speakers:

Amy Lemberger, Information Security Director, Gamma

Dr. Vasileios Karagiannopoulos, Institute of Criminal Justice Studies, University of Portsmouth

Tim Ward, Director, Think Cyber Security Ltd

Steve Collins, Head of IT Security, First Quantum Minerals

James Kwaan, President, (ISC)2 Scottish Chapter

+Fishbowl Participants ‘Outer Circle Observers’

16:15-16:50

ZOOM
(30 MINS)

ROUNDTABLES
Sharing operational best practices with peers

 

 

 

 

 

 

What keeps you up at night in terms of data security threats?

  • What are the most challenging areas of regulatory compliance regarding protecting sensitive data?
  • What do you see as being the main threats to your organization’s sensitive data?
  • What do you see as the biggest challenges in planning and executing a data encryption strategy?

Peer to peer discussion led by: Simon Hill, Chief Legal & Compliance Officer, Certes Networks

Securing Data & Privacy in a Remote Workforce – Best Practices & Controls 

Continue the fish bowl discussion with peers face to face for an in-depth exchange! Focus on sharing on new frameworks, monitoring and collaboration strategies.

  • Permissibility of workforce monitoring in a multinational organisation
  • Remote monitoring and IAM controls
  • BYOD, perimeterless security and the remote workforce
  • Assurance activity in the post-Covid world

Peer to peer discussion led by: Toby Hayes, Global Data Protection Controller, Pladis Global

Cyber Threat Intelligence Landscape

Sharing operational best practices on cyber threat intelligence.

  • Best practice threat rating methodologies
  • Emerging trends in cyber threat intelligence
  • Pandemic related phishing and ransomware campaigns
  • Threat landscape analysis and horizon scanning techniques
  • Moving intelligence beyond security issues to cover a broad range of brand and other risks
  • CIRT triage by decentralized fusion teams

Peer to peer discussion led by: Richard Hollis, CEO, Risk Crew

16:50-17:25

STAGE (35 mins)
KEYNOTE

WFH

Michael Colao, Chief Corporate Security Officer, AXA

17:25-17:35

POINTS FOR PRIZES
& CLOSE

Points for Prizes – Winners Announced! Summaries and Close

Master of Ceremonies: Clive Room, Director, Pulse Conferences and Marcus Alldrick, CISO Luminary

17:35-17:50

NETWORKING & EXPO

(15 MINS)

Last Chance Networking – CISO 360 Speed Networking Experience! Memorable 3-minute video connections with peers

Day Two – Thursday 18 June 2020
10:00-11:30 BST

About #CISO360 Roundtable

The ultimate sound-boarding for today’s cybersecurity leaders. Guests are expected to contribute to the discussions that will be held under The Chatham House Rule.

Pre-event:
You shape the topics by inputting your top 3 current priorities.

On the day:
The size and interests of the group will determine if break out rooms are required.
P
articipants are invited to contribute to the discussion and to be visible on screen if you are comfortable to do so.

Post-event:
Output report (non-attributed as to who said what)

10:00 -10:10
Guest Introductions and Chairman’s Opening

10:10-11:30
#CISO 360 Roundtable
Chaired by: Professor Dr. Robert Coles, Visiting Professor, Royal Holloway, University of London

Co-Facilitated by:

  • Marcus Alldrick, CISO Luminary
  • Graham Edwards, Head of Information Security, Yorkshire Water

11:30
Wrap Up and Close of Roundtable

Back to Pulse Conferences

You currently have JavaScript disabled!

This site requires JavaScript to be enabled. Some functions of the site may not be usable or the site may not look correct until you enable JavaScript. You can enable JavaScript by following this tutorial. Once JavaScript is enabled, this message will be removed.