7th Annual Cyber Security for Business Conference
Wed 24th & Thurs 25th March 2021 | 08:00am - 16:30pm BST | Virtual Event
The must-attend online conference for the cyber security community with keynote talks, breakouts and an exhibition hall - all hosted live on a virtual platform. Free to attend for end users working in IT/ Security - join us from anywhere in the world.
The national Scot-Secure Summit is the largest annual Cyber Security event in Scotland: however is now open to the world. The virtual event brings together senior IT leaders and Information Security personnel, providing a unique forum for knowledge exchange, discussion and high-level networking.
The conference programme is focussed on promoting best-practice cyber security; looking at the current trends, the key threats - and offering practical advice on improving resilience and implementing effective security measures.
The conference is free* to attend for InfoSec & IT personnel.
DIGIT has rapidly grown into the largest independent business technology community in Scotland. We run an extensive series of virtual conferences and online events focused on core areas of emerging Technology, Digital and IT. We also run Scotland's leading IT & Digital News Platform with over 100,000 page views per month.
The virtual events provide a unique platform for knowledge exchange, drawing stakeholders together to explore best practice, technological innovation and business outcomes. Our conferences attract a senior delegate following and have become renowned as an important forum for high-level networking.
We are delighted to announce that DIGIT will be running our conference programme in a virtual environment. Not only will you be able to enjoy our full events line-up, but you’ll be able to log-in remotely and join us from anywhere in the world.
Kevin FielderCISO, Just Eat
Petra LeimichLecturer in Cybersecurity and Digital Forensics, Edinburgh Napier University
Lisa FortePartner, Red Goat Cyber
Malcolm GrahamDeputy Chief Constable, Police Scotland
Freha ArshadSenior Manager, Accenture
David StubleyCEO, 7 Elements
Sarah Armstrong-SmithNon-Executive Director, Decipher Cyber
Richard GreyHead of Information Security, FreeAgent
Scott BarnettDeputy CISO, TSB
Colin GracieEnterprise Security Specialist, SonicWall
Hannah RudmanStrategic Transformation Director, Wallet.Services
Garry ScobieDeputy CISO, The University of Edinburgh
Mike JonesSecurity Researcher & Ethical Hacker
Holly Grace WilliamsPenetration Tester & Technical Director, Secarma
Ian ChisholmDirector, Information Security, Charles River
Stu HirstPrincipal Cloud Security Engineer, Just Eat
Greg van der GaastHead of Information Security, The University of Salford
Harry McLarenProduct Lead, Adarma
Val MannSenior Manager, CSO Supplier Assurance, Lloyds Banking Group
Mark StephenJournalist & Broadcaster - BBC Scotland
(2021 Coming Soon)
Day 1 - Wednesday 19th February
8:30 Registration & Networking
The opening session will consider some of the key security challenges that organisations and InfoSec practitioners are facing. Specific areas of focus will include: business alignment and speed of delivery, the insider threat, and the security landscape for 2020.
09:20 Welcome and Introduction from the conference Chair
Mark Stephen, Journalist & Broadcaster, BBC Scotland
09:30 Security at the Speed of Business: Delivering Security in an Agile World
Kevin Fielder, CISO, Just Eat
09:50 Insider Threats: Looking After Number One
Lisa Forte, Partner & Insider Threat Specialist, Red Goat Cyber
10.10 The Threat Landscape for 2020
Mark Mitchell, Security Engineer, Check Point
11:05 Refreshments & Networking
This session will explore key aspects of cyber security in a smaller group environment. Four breakout sessions will be run in parallel and then repeated, providing delegates an opportunity to attend two of the options on offer.
11:40 First Breakout
12:15 Second Breakout
Delegates will select two of the below Breakouts to attend
A. Third-Party Risk Management: Overcoming Today’s Most Common Security & Privacy Challenges
Review the drivers and challenges organizations face when managing third-party vendor risk
Identify priorities before, during and after vendor procurement
Takeaway a six-step approach for automating the third-party vendor risk lifecycle
Hear real case studies from privacy experts on how to practically tackle the third-party vendor risk
Chris Paterson, Enterprise Solutions Engineer, OneTrust
B. Automate or Die
Learn how to remediate open source vulnerabilities
Over 12% open source is vulnerable, how do you compare
What did Equifax do when they got hacked and how could they have prevented it?
Ryan Sheldrake, International Principle Architect, Sonatype
C. The New Era of Cyber Threats: The Shift to Self-Learning, Self-Defending Networks
Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats
How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time
How to achieve 100% visibility of your entire business including cloud, network and IoT environments
Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk
Stuart King, Account Executive, Darktrace
Georgia Terry, Account Executive, Darktrace
D. Why Understanding Your Attack Surface Matters
What does it mean to obtain and use ‘cyber intelligence’ in a manner that effectively prioritises scarce resources
Threats arise for two main reasons; weakness in IT infrastructure and an interest taken by an attacker
Ensuring an organisation has the skills, agility, platforms and processes to understand, detect and manage cyber-threats
What should the priority be for an organisation that wants to improve its cyber security posture?
Wicus Ross, Senior Research Lead, SecureData
12:45 Lunch, Exhibition & Networking
This session will provide an opportunity to attend a longer presentation on a specific area of interest. These will cover three distinct areas: security architecture, security awareness and cloud forensics.
Delegates will select one of the streams below to attend.
13:35 Stream 1. Proactive Security Architecture: Changing the Game & Securing the Future
How to build a forward looking security architecture capability
Embedding strategic threat intelligence in product development
Choosing security standards and moving the bar
Managing security change in an impatient world
Agile? DevOps? No problemo!
Scott Barnett, Deputy CISO, TSB
13:35 Stream 2. Security Awareness in Practice
Identifying the challenges to overcome when introducing a security awareness program
An overview of real-life attacks on the organisation; making the abstract concrete, helping to shape our thinking on awareness training
Suggested solutions using the current awareness program at The University of Edinburgh as an example
Garry Scobie, Deputy CISO, The University of Edinburgh
13:35 Stream 3. Cloud Forensics: Opportunities and Challenges
Facets of cloud forensics: in-cloud, on-cloud and cloud storage forensics
Technical, Organisational and Legal dimensions
Artefacts and Methods: What’s special about cloud forensics and IR in the cloud?
Client-side and server-side, and the role of the CSP
Common challenges and opportunities
Forensic readiness: what we should do to prepare
Dr Petra Leimich, Lecturer in Cybersecurity and Digital Forensics, Edinburgh Napier University
Session 4 will explore the offensive tools and techniques used by attackers; examining past security incidents, illustrating how systems were compromised, and considering how breaches could have been prevented. The session will then explore the psychology, tactics and motivations behind hackers, examining how methods have evolved and what the future of cybercrime might look like.
14:10 Incident Analysis: Learning From Past Security Breaches
Holly Grace Williams, Technical Director, Secarma
14:30 Journey from Blackhat to Whitehat: the Psychology, the Tactics and the Future of Cybercrime
Mike Jones, Security Researcher & Former Hacker with Anonymous
15:35 Closing Remarks
15:40 Networking Drinks Reception
17:00 Close of Day 1
Day 2 - Thursday 20th February
Day two of the conference will focus on practical steps to improve your organisational resilience and response. The opening session will explore how we think about security strategy within the business; how we set objectives, communicate to the board, measure success and respond to crisis situations.
09:20 Welcome from the conference Chair
Mark Stephen, Journalist & Broadcaster, BBC Scotland
09:25 Rethinking Information Security for Maximum Effectiveness
Greg van der Gaast, Head of Information Security, University of Salford
09:45 The A,B,C Don’ts of Incident Response and Crisis Management
Sarah Armstrong-Smith, Non-Executive Director, Decipher Cyber
10:05 Threat Modelling at Board Level
Federico Charosky, Managing Director, Quorum Cyber
10:55 Refreshments & Networking
Continuing the theme of improving organisational resilience, the main hall session will look at key challenges of securing the estate; examining the main threat factors, exploring practical advice for safeguarding security within complex organisations, and looking at supplier assurance and vulnerabilities from third parties.
In addition to the main hall session, four parallel streams will be run in a smaller group environment, giving delegates the choice to attend a live demo session or participate in an interactive workshop run by a moderator from Cyber Scotland Connect.
11:30 Delegates will choose one of the Session 2 streams to attend
Stream 1. Main Hall
11:30 The Five Threat Factors Testing Organisational Resilience
Freha Arshad, Senior Manager, Accenture
11:50 Securing a Complex Enterprise
Ian Chisholm, Director, Information Security, Charles River
12:10 Supplier Assurance – Why Bother?
Val Mann, Senior Manager, CSO Supplier Assurance, Lloyds
Stream 2. Security Toolbox: Live Tool Demonstrations
11:30 Prep Your Organisation to Face 2020’s Most Advanced Cyber Threats
Findings of the SonicWall 2020 Cyber Threat Report
Overview of Security Industry Advancements & Cybercriminal Trends
Blueprints and guidance for 2020 and beyond
Colin Gracie, Enterprise Security Specialist, SonicWall
12:10 A More Secure Everywhere
Cloud visibility, alerting, security & compliance reporting
Network monitoring and analytics
User entity & behaviour analytics
Cloud configuration drifts/monitoring
Incident response management and threat investigation
Phil Taylor, Systems Engineer, Palo Alto Networks
Stream 3. (Interactive Workshop) Mental Health and Burnout
What are the causes of Burnout, stress and mental health issues within workplaces?
What are businesses currently doing to tackle the problem?
What can the Cyber industry do to help?
What tangible outcomes can we produce, as a group, to share with the wider community?
Richard Grey, Head of Information Security, FreeAgent
Stream 4. (Interactive Workshop) Implementing the Basics
What are the top 5 things a business should focus on with regards to security?
How do we develop and recruit great talent?
What frameworks can businesses use and how good are they?
What are the ‘crown jewels’ for a business and how do we capture and define them?
How do ‘the basics’ differ from business to business? What factors are at play?
David Stubley, CEO, 7 Elements
Stream 5. (Interactive Workshop) Security Training and Awareness
What are businesses currently lacking when it comes to awareness?
What are some of the tried and tested approaches that a business could leverage?
How do businesses measure awareness? Can it be measured effectively?
Maggie de Jager, Cyber Security Manager, Scott Moncrieff
13:00 Lunch, Exhibition & Networking
The final session will consider the future of security, it will explore the evolution of current cyber trends, the rise of new and emerging technologies, and the challenges and opportunities these will present for business, society and law enforcement. Specific areas of focus within the session will be IoT Security, Artificial Intelligence, DLT and ethical issues.
In addition to the main hall session, three parallel streams will be run in a smaller group environment, giving delegates the choice to attend an interactive workshop run by a moderator from Cyber Scotland Connect.
13:50 Delegates will choose one of the Session 3 streams to attend
Stream 6. Main Hall
13:50 IoT Security: Vulnerabilities and Future Challenges
Paul Patras, Associate Professor, The School of Informatics, The University of Edinburgh
14:10 Improving Cyberbreach Reporting with Trust and Security Enabled by DLT
Hannah Rudman, Strategic Transformation Director, Wallet.Services
14:30 Ethical Dilemmas of Policing in the Digital Age
Malcolm Graham, Deputy Chief Constable, Police Scotland
Stream 7. (Interactive Workshop) Incident and Breach Response
Outlining some types of common incidents and the most appropriate responses
Examples of where incident and breach response fell short
What are some good examples of incident management from your experience?
What do the bad guys want and how does understanding their motives help?
What makes up a good incident playbook (response plan)?
How might a business respond to a ransomware attack or data breach?
Harry McLaren, Product Lead, Adarma & Co-Founder, CSC
Stream 8. (Interactive Workshop) Supply Chain & Third Party Security
Large vs small business - dedicated department vs an individual
Categorising 3rd parties based on your risk profile
Certifications - are these enough?
Right to Audit - how easy is this in practice?
A consistent approach across all providers
What tools can help
Sean Wright, Software Security Engineer
Stream 9. (Interactive Workshop) Cloud Security
What frameworks are available for cloud risk? Are they any good?
What might a business need from a third party when looking to move into the Cloud? Is the Shared Responsibility Model understood?
How does Cloud security differ from on-prem security?
How important is automation and what should be automated?
How might business increase its Cloud Security knowledge?
Stu Hirst, Principal Cloud Security Engineer, Just Eat & Co-founder, CSC
15:20 Networking & Drinks Reception
16:30 Close of Conference
*The conference agenda is provisional and subject to change and revision