Please note that timings may change.
We will continue to update the programme here so please check back frequently for updates or contact sara.hook@pulseconferences.com for the most recent draft programme.
Day One Wednesday 17 June 2020
10:00-17:30 BST
10:00-10:30
LOBBY
PEOPLE
NETWORKING
EXPO
(30 mins)
Lobby – Check in and chat with peers!
People – Set up your virtual badge and profile, See who you know and who you don’t!
Networking – Ice-breaker CISO 360 Experience! Memorable 3-minute video connections with peers and luminaries!
Expo– Meet the Sponsors & Points for Prizes! Meet the sponsors, collect points at each stand to win prizes!
10:30-10:35
STAGE
(Video 5 mins)
Opening Remarks
Master of Ceremonies: Clive Room, Director, Pulse Conferences
10:35-10:40
STAGE
(Live 5 mins)
OPENING
Chairman’s Opening
Marcus Alldrick, CISO Luminary
10:40-11:10
STAGE
(Live 30 mins)
FIRESIDE CHAT
Looking Back, Looking Forward: Projects 2020 and 2030
In 2012, Vic and Rik built scenarios for the future of cybercrime. These became the basis for 2020, Trend Micro’s award-winning short movie series. Now that we’ve reached our time horizon and passed “Peak Blade Runner” last November, we’re reviewing how we did, and looking again to the future. In this short talk, we’ll take you through the original project and its results, and introduce you to the next generation of our work.
Rik Ferguson, Vice President Security Research, Trend Micro and Special Advisor, Europol
Dr Victoria Baines, Visiting Research Fellow, Oxford Department of International Development
11:10-11:35
STAGE
(Live 30 mins)
KEYNOTE
Do You Have Imposter Blindness? Fighting the Next Generation of Targeted Email Attacks
- Highly-targeted, low volume impostor email – or business email compromise (BEC) – attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today.
- But things are changing. Technology can now surpass people and process initiatives to proactively eliminate fraudulent emails, removing the guesswork for users.
- What is BEC and EAC? Why are the threats to Stagecoach’s business?
- Why are BEC and EAC so difficult to prevent?
- How Stagecoach is working to overcome these challenges
Simon Taylor, Information Security Manager, Stagecoach Group
Adenike Cosgrove, Cybersecurity Strategy, International, Proofpoint
11:35-12:00
STAGE LIVE
(Live 25 mins)
FIRESIDE CHAT
Next Generation Defence: Using Hackers to Beat Hackers
There are many dilemmas in today’s complex cybersecurity world. Year on year increases in cyber-attacks, an increase in the sophistication of these attacks, a widening cybersecurity talent gap, IT security budgets that haven’t kept up with growing demands, and now large remote work forces and social distancing requirements. In this fireside chat, Justin and Mark will discuss an innovative crowdsourced security model that has been deployed at Freshfields. Learn why Freshfields is utilizing an army of ethical hackers to harden their corporate assets; and how security operations have been transformed and simplified, all while quickly deploying safer applications.
Mark Walmsley, Chief Information Security Officer (CISO), Freshfields Bruckhaus Deringer LLP
Justin Shaw Gray, Director, Synack Inc.
12:00-12:15
NETWORKING & EXPO (15 mins)
Networking – CISO 360 Speed Networking Experience! Memorable 3-minute video connections with peers
Expo- Meet the Sponsors & Points for Prizes! Meet the sponsors, collect points at each stand to win prizes!
12:15-12:25
STAGE
(Video 5 mins)
CISO MUSE
Back to Basics – Why are the Basics STILL So Hard?
Quentyn Taylor, Director of Information Security EMEA, Canon Europe
12:25-12:55
STAGE
(Live 30 mins)
PANEL
Cyber Resilience in a VUCA world – What’s next? How do we translate trust, sharing and collaboration into technological terms?
Engaging the community with the big questions challenging leaders today. In a world of social media, false information, growing nationalism/authoritarianism, growing civil unrest and of course the current pandemic, hear predictions
· What is the current World order to cyber defence? How will this impact our businesses and economies?
· How we will find the right balance between legitimate increased surveillance for public health and intrusive mass surveillance?
• How can we ensure credible intelligence and increase levels of international collaboration?· Covid-19 is the greatest shock to business for a century. What will struggle to get back to how it was before, and what might change forever?
· What is the next killer digital virus, and will the world be able to cope with it?
· How can we mitigate the risks of and strengthen systemic resilience to fraud as critical priorities?
· What do the next generation of cybersecurity operations look like? What is the role of automation?
Chaired by: Professor Dr. Robert Coles, Visiting Professor, Royal Holloway, University of London
Joined by:
Graham Edwards, Head of Cyber Security, Yorkshire Water
Graeme Burnett Head of Application Security, Mastercard
Richard Hollis, CEO, Risk Crew
12:55-13:10
STAGE
(Live 15 mins)
KEYNOTE LIGHTNING TALK
Scams and Deception – Inside the mind of the scammer
We talk a great deal around the scam itself, but not about understanding the approach of individuals and why they scam. This session will take a very brief look into the factors that support why people commit deception related crime, and will look at the threats, challenges and responses to the changing fraud landscape. The demand for electronic devices to work and engage in social contact has substantially expanded the attack surface and the target pool has widened for fraudsters, who are also at the beginning of their own transformation!
Simon Scales, Specialist Public Sector SME and Former Head of Investigations
13:10-13:30
NETWORKING & EXPO (30 MINS)
Networking – CISO 360 Speed Networking Experience! Memorable 3-minute video connections with peers
Expo- Meet the Sponsors & Points for Prizes! Meet the sponsors, collect points at each stand to win prizes!
13:30-13:45
STAGE
(Live 15 mins)
KEYNOTE LIGHTNING TALK
What’s In Your Software?
Tracking the software and software components an organisation uses in its products and its operations is crucial for responding to emergency threats. However, building and maintaining these Software Bills of Materials (SBOMs) is very challenging, especially across large enterprises. In this session, Alyssa Miller discusses the hidden threats in the Software Supply Chain, and analyzes some of the unique challenges of open source software, IoT and Medical devices, and Industrial Control Systems. She’ll share real world strategies and risk mitigations that organizations should employ to address these threats and reduce the risks associated with them.
Alyssa Miller, Hacker/Researcher, Application Advocate, Snyk
13:45-14:25
STAGE
(40 mins)
FIRESIDE CHAT
CISOs, 5 questions – CISO Futurists: How can we take our strategy to the next level?
- What are the top 3 learnings for you in the past 2 months?
- What will struggle to get back to how it was before, and what might change for ever?
- What kind of CISO do you need to be right now? And in 5 years?
- If you were able to give your younger self a piece of advice about the security industry, what would it be?
- How can we take our strategy to the next level? How can we leverage ML, AI, Automation for Cybersecurity?
Chaired by: Kevin Fielder, CISO, Just Eat
Panellists:
Martyn Booth, CISO, Euromoney Institutional Investor PLC
Bev Allen, Head of Information Security Assurance, Quilter
14:25-14:55
THINK TANKS
(live 30 mins)
Truly Transformational! Sharing Practical Lessons
These CISO 360 Think Tanks provide the opportunity to benchmark lessons with peers and to hear tried and tested approaches to deal with four areas of security that are seeing rapid development. Working in smaller breakout groups for the roundtable discussions, gives you the opportunity to come face to face on screen. Return to Stage for the wrap up at the end! Understand: What role these technologies are expected to play; How these areas fit within the business risk strategy. These are not presentations but roundtable discussions.
PLEASE SELECT:
THINK TANK 1:
Future of Identity and Zero Trust
How are you ensuring the right individuals (or machines) access to the right resources, at the right times, for the right reasons?
Co-led by: Mike Kiser, Global Strategist and Evangelist, Office of the CTO, SailPoint
Karl Lankford, Director, Solutions Engineering BeyondTrust
THINK TANK 2:
CyberOptimise360
How are we streamlining or optimising our cyber programmes?
Co-led by: Scott Raspa, Director and Jesse K. Dean, Vice President, Solutions, TDI
THINK TANK 3:
CISO-DevSecOps
How can we develop secure and fast.
Led by: Alyssa Miller, Hacker/Researcher, Application Advocate, Snyk
THINK TANK 4:
Cloud Security Risks and Audit
Mitigations, audit, compliance in cloud.
Led by: Mike Milner, Global Director of AppSec Technology, Trend Micro & CTO/Co-founder of Immunio
14:55-15:10
STAGE (15 mins)
WRAP UP
Truly Transformational – Wrap Up
Think Tank leaders have 3 minutes per Think Tank to share key findings back to the group, to wrap up.
15:10-15:25
NETWORKING & EXPO
(15 mins)
CISO 360 Speed Networking Experience! Memorable 3-minute networking to connect with CISO peers!
Meet the Sponsors & Password to Prizes! Meet the sponsors, find the password at each stand to win prizes!
15:25-15:30
STAGE
(5 mins)
CISO MUSE
A Better Way of Collaborative Working with Security
Martyn Booth, CISO, Euromoney Institutional Investor PLC
15:30-16:15
STAGE
(45 mins)
VIRTUAL FISHBOWL
Cyber Culture: Controls, Continuity and Compliance
The Fishbowl (main speakers) introduce and discuss the issues, while the outer circle participants observe the discussion, moving in and out of the Fishbowl, at the invitation of the Chairman, to share experiences and to ask questions. We look forward to an energised discussion! If you would like to be in the fishbowl participant observer partaking on screen please let us know at teampulse@pulseconferences.com!
- Balancing WFH compliance against business needs
- Where is the new boundary of security and privacy?
- Awareness campaigns – top tips to be heard remotely
- How do we cultivate and grow security culture remotely?
- Metrics to transform a remote security function. What KPIs work?
- How do you build organisational accountability?
- How do we maintain Security standards in a remote working environment?
- How to manage a crisis team in a remote working environment
Chaired by: Professor Dr. Robert Coles, Visiting Professor, Royal Holloway, University of London
Fishbowl Speakers:
Amy Lemberger, Information Security Director, Gamma
Dr. Vasileios Karagiannopoulos, Institute of Criminal Justice Studies, University of Portsmouth
Tim Ward, Director, Think Cyber Security Ltd
Steve Collins, Head of IT Security, First Quantum Minerals
James Kwaan, President, (ISC)2 Scottish Chapter
+Fishbowl Participants ‘Outer Circle Observers’
16:15-16:50
ZOOM
(30 MINS)
ROUNDTABLES
Sharing operational best practices with peers
What keeps you up at night in terms of data security threats?
- What are the most challenging areas of regulatory compliance regarding protecting sensitive data?
- What do you see as being the main threats to your organization’s sensitive data?
- What do you see as the biggest challenges in planning and executing a data encryption strategy?
Peer to peer discussion led by: Simon Hill, Chief Legal & Compliance Officer, Certes Networks
Securing Data & Privacy in a Remote Workforce – Best Practices & Controls
Continue the fish bowl discussion with peers face to face for an in-depth exchange! Focus on sharing on new frameworks, monitoring and collaboration strategies.
- Permissibility of workforce monitoring in a multinational organisation
- Remote monitoring and IAM controls
- BYOD, perimeterless security and the remote workforce
- Assurance activity in the post-Covid world
Peer to peer discussion led by: Toby Hayes, Global Data Protection Controller, Pladis Global
Cyber Threat Intelligence Landscape
Sharing operational best practices on cyber threat intelligence.
- Best practice threat rating methodologies
- Emerging trends in cyber threat intelligence
- Pandemic related phishing and ransomware campaigns
- Threat landscape analysis and horizon scanning techniques
- Moving intelligence beyond security issues to cover a broad range of brand and other risks
- CIRT triage by decentralized fusion teams
Peer to peer discussion led by: Richard Hollis, CEO, Risk Crew
16:50-17:25
STAGE (35 mins)
KEYNOTE
WFH
Michael Colao, Chief Corporate Security Officer, AXA
17:25-17:35
POINTS FOR PRIZES
& CLOSE
Points for Prizes – Winners Announced! Summaries and Close
Master of Ceremonies: Clive Room, Director, Pulse Conferences and Marcus Alldrick, CISO Luminary
17:35-17:50
NETWORKING & EXPO
(15 MINS)
Last Chance Networking – CISO 360 Speed Networking Experience! Memorable 3-minute video connections with peers
Day Two – Thursday 18 June 2020
10:00-11:30 BST
About #CISO360 Roundtable
The ultimate sound-boarding for today’s cybersecurity leaders. Guests are expected to contribute to the discussions that will be held under The Chatham House Rule.
Pre-event:
You shape the topics by inputting your top 3 current priorities.
On the day:
The size and interests of the group will determine if break out rooms are required.
Participants are invited to contribute to the discussion and to be visible on screen if you are comfortable to do so.
Post-event:
Output report (non-attributed as to who said what)
10:00 -10:10
Guest Introductions and Chairman’s Opening
10:10-11:30
#CISO 360 Roundtable
Chaired by: Professor Dr. Robert Coles, Visiting Professor, Royal Holloway, University of London
Co-Facilitated by:
- Marcus Alldrick, CISO Luminary
- Graham Edwards, Head of Information Security, Yorkshire Water
11:30
Wrap Up and Close of Roundtable