Identification: SS22UK03
Credits: None available.
As founder of the UK’s National Cyber Security Centre, Ciaran Martin managed more than 2,000 significant cyber-attacks including the so-called Wannacry attack in 2017. Martin will provide a robust analysis of the world’s digital insecurities and provide his perspective on mitigation strategies. What are the biggest cyber vulnerabilities globally and who are the nefarious actors? How can we, as companies, countries and individuals fight back and how do we build partnerships to identify risk, build defenses and improve technology resilience.
Identification: SS22UK04
Credits: None available.
Estonia is a small country in the Baltics; however, it has been on the forefront of technology for many years. This session traces Estonia’s journey from independence in 1991 to its current use of digital identities for the systems that allow citizens to vote, check online banking, e-residency, and tax returns. We’ll share lessons learned and key takeaways from incidents that happened along the way, examine what the future holds, and discuss the impact of incorporating AI into a digital society.
Identification: SS22UK08
Credits: None available.
As supply chains become increasingly more connected and complex, the greater and pressing the imperative is to secure them from malicious actors. Get an overview of the latest cyber supply chain risks and the challenges that cybersecurity professionals face. Gain insight into risk mitigation strategies to ensure a safe and resilient global supply chain.
Learning Objectives:Identification: SS22UK09
Credits: None available.
While CSIRTs mitigate incidents, law enforcement agencies conduct investigations. Although each has a specific role, they often deal with the same cases, which can potentially hinder the investigation and cause inefficiencies in the process. Learn how the European Union Agency for Cybersecurity (ENISA) is helping to facilitate cooperation between CSIRTs, law enforcement agencies and the judiciary cooperate to better tackle cyber incidents and respond to cybercrime.
Identification: SS22UK06
Credits: None available.
A security operating model is used to steer and develop the security capabilities within an organization, not only by defining the security capabilities consisting out of security services and security products and processes, but also the governance to run these services on a strategic, tactical, and operational model. To run these security capabilities, it is most important to assign the responsibilities on all activities to business and security professionals. This session will delve into the concept of SOM and how it acts as a combination of security capabilities and a security governance model.
Identification: SS22UK05
Credits: None available.
As the UK and the EU both move forward with their now separate legislative agendas, we’ll take our crystal ball into Westminster and Brussels to examine how these are likely to diverge. We’ll explore what this will mean in practice for companies operating across both regimes. Can you take a one-size-fits-all approach, or will you need to consider separate activities for EU and UK operations in the longer term? What are the impacts for companies right now and what might be coming down the road?
Identification: SS22UK10
Credits: None available.
The global cybersecurity workforce is growing, but so is the gap in professionals to carry out its critical mission. Get a high-level overview of the findings from the 2022 (ISC)2 Cybersecurity Workforce Study pertaining to the UK and European regions and examine strategies for addressing the critical need for cybersecurity professionals. We’ll also discuss the European approach to the workforce gap and get an overview of the European Cybersecurity Skills Framework (ECSF) and the role it will play in helping to ensure that organizations have the right people with the right skills to lower cybersecurity risk.
Identification: SS22UK07
Credits: None available.
Imposter Syndrome – feelings of self-doubt and unworthiness - has become more prevalent in workspaces, impacting job performance and employee mental health across all industries and disciplines. Learn what imposter syndrome is, why we may all suffer from it and what can be done to prevent it from impacting your career.
Learning Objectives:Identification: SS22UK13
Credits: None available.
The proliferation of IoT/IIoT devices and connectivity, stresses the importance of addressing and mitigating cybersecurity risks throughout the entire products and systems lifecycle, from product requirements through decommission. Misaligned cybersecurity standards and conformity assessment programmes increase complexity and costs, and dramatically slow adoption in the market; yet governments and standards organisations continue to develop cybersecurity requirements without considering the need for global harmonisation. Get an overview of the global IoT standards and regulatory landscape and examine the need for globally coordinated cybersecurity standards, regulations and conformity assessment programmes that not only lower certification costs but also increase the overall cyber programme maturity of any organisation.