Tuesday, 3 March, 2020 - 08:30 to 17:15
The Future of Cyber Security Birmingham
Organiser
Exclusive access to intelligence from industry-leading experts
The Future of Cyber Security Birmingham features a great Midlands-based location, with networking time, streams and bigger names than ever before. The Future of Cyber Security Birmingham 2020 will be a closed-door, invite-only conference and expedition featuring 400 hand-picked senior executives from major UK firms.
The expanded conference and exhibition is aimed at board level executives and senior IT decision-makers from government and industries including critical infrastructure, healthcare, retail, and financial services.
In just one day, the event will provide essential intelligence that enables senior personnel to stay one step ahead of cyber criminals as the attack surface expands. The conference covers today's cyber security trends and threats across Europe – as well as those of the future – equipping delegates with the tools needed to cope in an increasingly complex landscape.
The event will also examine the latest cyber security strategies and technologies. It will cover government cyber security strategy, how to fill the growing skills gap, news on the EU Update to Data Protection regulation (GDPR) and advice on trends such as the increasing amount of ransomware attacks and the threat posed by a firm’s employees.
Industry-leading conference and seminar sessions
The Future of Cyber Security Birmingham is even more targeted than before, with more seminar sessions and networking opportunities across multiple vertical industries. It follows hot on the heels of iMM Group’s highly successful 2020 events.
In the morning, it will cover cyber security strategy, including a look inside the National Cyber Security Centre, how to fill the skills gap using neurodiverse employees, and the GDPR fines firms such as Marriott and BA are facing one year since the regulation came into force.
Cyber-attacks are becoming increasingly sophisticated and expensive to deal with. The cost of a breach can be huge, often reaching millions of pounds. According to Accenture and the Ponemon Institute, the average cost of a cyber-attack is now $13 million. The Annual Cost of Cybercrime study found that cyber criminals are adapting their attack methods by targeting the human layer—the weakest link in cyber defence—through increased ransomware and phishing and social engineering attacks as a path to entry.
The event will discuss how to manage ransomware attacks, also focusing on how to deal with the threat posed by your employees – whether intentional or unintentional.
The event will provide the opportunity to engage with some major industry speakers and will also feature sessions on IoT security, AI as an advantage and a threat in cyber security, and a live on-stage hack of a connected car.
The Future of Cyber Security Birmingham gives you the opportunity to draw the latest intelligence from over 30 invaluable seminar, workshop, panel and breakout sessions featuring the leading names in the field.
Our seminar streams and interactive round tables feature CSOs and thought leaders from multiple industries, aiming to encourage delegates to participate in the discussion, in an intimate setting with their peers.
Peer-to-peer networking and cyber security technology showcase
In addition to extensive peer-to-peer networking opportunities, The Future of Cyber Security Birmingham also gives senior decision-makers and the opportunity to view and try new and exciting technologies from leading suppliers of cyber security products and services.
Throughout the day, delegates will have exclusive access to the latest cyber security innovations, covering a range of focused themes such as:
- Cyber security analytics and monitoring
- Personal identity
- High risk industries
- Government surveillance
- Ransomware
- Mobile Security
- IoT
- GDPR
- DDoS
- Encryption
- Open Source & License Management
- APTs
- ID management
- Data protection
- Threat intelligence
- Intrusion detection
- Incident response
- Cloud security
- Cyber terrorism
- Hackivism
- Protecting critical infrastructure
- Insider threat
- Spear phishing
- Social engineering
- Big data
- Space hacking
- Artificial intelligence (AI) and machine learning
- The UK Government’s cyber security strategy
- and many more....
Agenda:
- 08:30 - Networking
- 08:55 - Chairs Opening Address
- Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD
- Security in 2020: Cyber threats and new methods to protect against them
- The risks and costs of cybercrime to businesses
- Cyber skills: The importance of education and diversity in cybersecurity
- 09:05 - UK cyber security strategy: Progress so far
- The UK government’s National Cyber Security Strategy covers 2016 – 21. So what progress has been made over the last year? The strategy sets out how the UK will aim to be one of the most secure places in the world to do business in cyberspace.
- This session will cover progress so far including:
- The work of the National Cyber Security Centre (NCSC), set to act as the UK government’s single authority on cyber security
- The Active Cyber Defence programme, which has successfully blocked more than 4.5 million malicious emails every month and taken down over 140,000 fraudulent phishing sites
- Strengthened regulation to improve our overall cyber security, including the Data Protection Act, the General Data Protection Regulation (GDPR), and the Network and Information Security Regulations
- 09:25 - Inside the NCSC
- Set up to act as the UK Government’s authority on cyber security, the NCSC has made huge progress since its inception three years ago. This session, led by the NCSC, will detail the work of the centre including:
- How the NCSC is working with young people to direct their talent for good and prevent them from entering cybercrime.
- The types of threat impacting the UK and how the NCSC is working with businesses to counter them
- Intelligence sharing and how the NCSC is working with US organisations such as the NSA to help fight cyber-attacks from foreign actors
- 09:35 - Orange Cyberdefense
- Overview Coming Soon
- 09:50 - How to wear two hats - life as a DPO in a SME.
- Daniel Selman
- In this presentation Daniel will talk about the challenges and opportunities of being the Data Protection Officer in a small to medium enterprise, how you strike the right balance between independently assessing and assuring compliance whilst making sure you’re not just ‘marking your own homework’.
- 10:10 - Neurodiversity: How diverse skills help mitigate cyber attacks
- Lauri Love, Gary McKinnon and many other young people falling foul of the Computer Misuse Act are autistic. But they are also talented coders whose talents could have been used by businesses to help stop cyber-attacks. Neurodiverse individuals have many skills that could be used in cyber security, including cognitive pattern recognition, outside-the -box thinking, attention to detail, logical and methodical thinking, and focus and integrity.
- This session will explain:
- What is neurodiversity and how can it be useful to the cyber security industry?
- How firms need to adjust to accommodate neurodiverse individuals, and the benefits of doing so
- Changing the recruitment process: making your job ads as inclusive as possible to attract neurodiverse applicants
- Lauri Love, Gary McKinnon and many other young people falling foul of the Computer Misuse Act are autistic. But they are also talented coders whose talents could have been used by businesses to help stop cyber-attacks. Neurodiverse individuals have many skills that could be used in cyber security, including cognitive pattern recognition, outside-the -box thinking, attention to detail, logical and methodical thinking, and focus and integrity.
- 10:30 - Coffee and networking
- 11:00 - Seminar Stream 1
- Choose to attend 1 of 2 industry expert sessions
- 11:35 - Seminar Stream 2
- 12:05 - Lunch and networking
- 13:05 - Seminar Stream 3
- 13:35 - Chair's afternoon address
- Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD
- 13:40 - The people problem: Why your employees can be your weakest link
- Security experts already know that the weakest link is the business' employees. But hackers are also realising this and are constantly finding more innovative ways to attack. This session will cover:
- The rise of spear phishing and social engineering
- Examples of data breaches that started this way
- Educating employees: why real life scenarios help
- Managing access to data
- Password security: An essential factor that firms often get wrong
- The insider threat: When employees go rogue
- 14:05 - Data Ethics: Ensuring subject centricity & the next steps in compliance.
- Daniel Cope Today, we are seeing increase in regulatory enforcement activity, not just on breach of the law put breach of the principle and spirit of the law, an increase in customer/subject expectations. In this ever ncreasingly digital world driven by Data, how do you progress pass MVP? How do you ensure the subject and Data is at the heart of your business? We will be taking brief look at beyond the black and white 99 articles and driving into the ethical consideration of Data Privacy to enable you to be compliant avoid regulatory attention and ensure best in class service of excellence.
- 14:35 - "out of the shadows"
- Mike Jones - Life in the shadows has its own risks and potential disasters around every corner. This is Mike's life, experience and lessons learned from a life lived in the ether. Going from an intense investigation to aiding businesses, individuals and government has changed him both professionally and personally....now it's time to give back.
- 15:10 - Lead Sponsor Presentation
- TBC
- 15:30 - Coffee and networking
- 16:00 - Q&A with Frank Abagnale “Catch me if you can”
- Frank Abagnale
- Frank William Abagnale Jr. is an American security consultant known for his background as a former con man, check forger, and impostor between the ages of 15 and 21. He became one of the most notorious impostors, claiming to have assumed no fewer than eight identities, including an airline pilot, a physician, a U.S. Bureau of Prisons agent, and a lawyer. He escaped from police custody twice (once from a taxiing airliner and once from a U.S. federal penitentiary) before he was 22 years old. He served less than five years in prison before starting to work for the federal government. He is currently a consultant and lecturer for the FBI academy and field offices. He also runs Abagnale & Associates, a financial fraud consultancy company. Abagnale’s story inspired the Academy Award-nominated feature film Catch Me If You Can (2002), starring Leonardo DiCaprio as Abagnale and Tom Hanks as the FBI agent pursuing him, as well as a Broadway musical of that name and a TV series White Collar, which are based on the book Catch Me If You Can. Frank will describe his fascinating life, and his take on cyber security in conversation with Geoff White, an investigative journalist, who has worked for both the BBC & Channel 4 TV. He will then be taking questions from Geoff and from the audience. Geoff White’s exclusives have covered everything from developments in artificial intelligence to fraud in the internet dating industry. He is currently writing a book on cybercrime for due for publication in 2020.
- 17:00 - Chair's closing remarks & event close
- 17:10 - Drinks Reception
- Sponsored by: iStorm Solutions
Request your place
Share this post
EmailMade Smarter WM
Made Smarter is a national movement to drive growth amongst UK makers and advance the UK economy. Backed by world renowned businesses and the UK government, it will improve the development and adoption of emerging technologies. Making a real, everyday difference to people from the boardroom to the factory floor.
Looking for work, or have vacancies to fill?
CW Employment Solutions offers a service for job seekers and employers, recruiters and education leavers, to connect, find jobs, post vacancies and access the wealth of support measures that have been implemented across the region.
Client testimonials
GET IN TOUCH
Local office: 0300 060 3747
Email: support@cwgrowthhub.co.uk
About
Part of the Government-supported growth hub network
© Copyright 2016-2023 by CW GrowthHub. All Rights Reserved.