Since Russia's invasion of Ukraine in February, NATO allied countries have waited to see cyber spillover from the conflict - DDoS, ransomware, wiper malware or any other attacks against critical infrastructure. So far, the activity has been sparse. So, if collateral damage from cyber warfare isn't necessarily all it was reputed to be, then what are the emerging threats that have security leaders most concerned?
Join this esteemed panel for a wide ranging discussion that includes:
Finding a balance between a pleasant user experience and stringent security requirements can be a challenge. If you do not find the right balance, users may revolt! This was especially true when Adobe, like you, were faced with the major shift towards more remote and hybrid work as a result of the COVID-19 pandemic. For example, when the pandemic first started and the world began shutting down, we had to move the entire Adobe workforce of more than 22,000 global employees to remote work over a single weekend. Such a massive change all at once requires network security controls that can readily adapt.
Adobe was well-prepared for this change thanks in part to our investment in what we call “Project ZEN.” Project ZEN is an internal initiative at Adobe based upon zero-trust principles. Since there is no “off-the-shelf” solution to fully deliver on these principles, ZEN consists of pioneering technology and policies to make the path to a zero-trust network more efficient and attainable. This effort enabled us to deliver on a more novel approach to managing our user encounters and authentication across the company – increasing security while improving the overall user experience.
In this session Eric Anderson, Director of Enterprise Security at Adobe, will talk about the benefits of a zero-trust approach to network security, our path to Project ZEN, and the benefits we have seen, including how it helped us better navigate the big changes in how our people work precipitated by the pandemic. Eric will provide insights from our experience here at Adobe in building and deploying zero-trust networking that you can use to help improve how your own organizations approach the new hybrid and remote work reality.
Rapid digital acceleration seen since the start of the pandemic has transformed the way businesses operate as they adapt to changing consumer behaviors and consumers' expectations of both customer experience and security. Recent world events have increased the risk of cyberthreats and elevated the importance of having a strategic incident response plan in place to deal with a data breach, should it happen.
TransUnion’s data breach solutions can help you take a proactive approach to dealing with data breaches and better protect consumers while helping to reduce financial losses. We do this by developing an efficient and effective response strategy that can help your organization equip customers with tools for combating identity theft, mitigate impacts to reputation and credibility and rebuild trust.
Mark Read, head of data breach solutions for TransUnion in the U.K. and part of TransUnion’s award-winning consumer solutions team, will share his insights into the current data breach landscape, covering the pressing issues faced by businesses across the U.K. and the role TransUnion’s data breach support services can play in helping businesses to reduce the impact of a data breach.
As part of its remit, the U.K.'s National Cyber Security Center, or NCSC, safeguards the nation's critical infrastructure - much of which is controlled within the private sector. Marsha Quallo-Wright, an NCSC deputy director, is responsible for improving critical infrastructure resilience, and in this exclusive session she discusses:
Running user awareness programs continues to be a cornerstone of many corporate information security programs, often driven in part by regulatory requirements. But can, and should, user training be relied on to better secure organizations? Should organizations instead focus their efforts more broadly, for example, by attempting not to train users, but to more effectively influence their behavior?
Join this session to hear three leading cybersecurity executives share their experiences regarding:
While a huge amount of attention is being payed to the concept and attempted actualisation of Zero Trust Security Architectures, the actual practical implementation of a successful trust environment requires a number of steps to deliver a comprehensive and actually useable environment.
This talk will outline practical approaches to the three main challenges for deploying Zero Trust architectures and will touch upon a number of options which will allow for enhanced security while the ZTA is being brought online.
We've looked into our crystal ball to predict the types of threats and potential cybersecurity weaknesses businesses can anticipate and prepare for in 2022. The changes in how we work and do business that arose during 2020 paved the way for new vulnerabilities in 2021, offering attackers unrestricted possibilities to exploit security flaws. Criminals targeted organizations of all sizes and took advantage of a lack of cyber resilience and cybersecurity infrastructure. We anticipate that in 2022 these hacks will only continue to grow and damage all types of organisations. Therefore, it's pivotal to learn how to reduce risks and defend your business from existing and future threats.
The business world has been through a massive evolution in the past few years. Threat actors are no different. They change with the times, preying on unsuspecting organizations and looking for any way to slip past your defenses. No single industry is immune to an attack, but you can be prepared with an understanding of the rapidly evolving threat landscape. After all, cyberthreats change quickly, and your cybersecurity must do the same to keep up.
Join Don Smith, vice president of IT security in the Secureworks Counter Threat Unit, as he discusses the changing threat landscape - including the growing risk of ransomware - as well as how your organization’s security program can keep pace, even with today’s most nefarious threat actors. In this session, Smith will discuss:
In order to protect against the evolving threat landscape, we must change the way in which we protect our data against vulnerabilities. To adapt, organizations are operating within the framework that no user, network, or device can be trusted by default until proven otherwise. Join ThreatLocker’s Director of Cybersecurity, Ben Jenkins, as he discusses how to secure applications from vulnerabilities using a Zero Trust model.
There is a wealth of data mobile operators currently utilize, and this data is being used in real time to protect consumers against account takeover fraud. Our panelists will share each of their unique perspectives on how they are helping to protect consumers against fraud. This informative discussion will shed light on the following:
Real-time digital payments: In barely a decade's time, they have gone from vision to broad reality. In his role at Mastercard, Nick Coleman oversees real-time payments and has an inside view of the maturation, evolving threatscape and emerging regulations. In this exclusive session, Coleman discusses:
The cyberthreat landscape continued to evolve and expand in 2021 as attackers found new vulnerabilities and ways to infiltrate organizations. There was also a significant rise in supply chain attacks in the past year, meaning hundreds or even thousands of organizations are at risk of being breached because of a security flaw in a single third party.
In this environment, security teams must shift to a risk-based approach, prioritizing the most important areas of their organization. They should also not be afraid to seek outside help, leveraging the growing number of highly skilled white hat hackers to discover unique types of vulnerabilities across their network.
In this session, Ellis will discuss:
Cyberattacks and threats such as phishing, malware and ransomware challenge security teams on a daily basis. During the pandemic and with the new increased flexibility of work, office and data locations, it’s never been more critical for security teams to be efficient and effective.
The constant evolution of security tooling is all about providing real-time visibility to detect and respond earlier, faster and more effectively to threats and attacks, all to circumvent existing security controls of the ever-changing attack surface.
During this session, we will discuss how you can ensure your security operations team has the visibility and tools it needs to reduce your organization's response times.
As part of this discussion, we’ll explore:
Join us for this interactive session and gain actionable insights to help you defend and protect critical data and infrastructure from emerging cyberthreats.
Modern WAFs are powerful, but they can be complex to manage and operate. From deciding on deployment architecture and requirement mapping to DEVOPs (CI/CD) integration and finalizing the myriad of other considerations before moving to the tuning and operationalization phase, all this creates complexity and confusion.
As a result, modern WAFs can be costly to implement in both commercial and staffing terms. Join Jay Coley, lead of security strategy at Fastly, as he demonstrates how you can reduce these issues to ensure your WAF deployments are as flexible and as simple as possible, all the while maintaining rule accuracy and WAF usability.
Most organisation’s IT infrastructures remain fragile to cyber attacks, especially the current scourge of ransomware operators sweeping across all verticals and all countries across the globe. Becoming cyber resilient to these kinds of attack is an emergent property, not a collection of products you can buy. In this session James will discuss those emergent properties and how he has seen organisations best achieve them using best-practice frameworks and solid engineering principles.
Because every business is unique, so too are the risks facing each one. Hence the answer to the question "what are the biggest cyber risks we face?" depends on who's asking. Regardless of the answer, however, it's up to the cybersecurity team to not only identify cyber risks, but help business leaders understand the operational risks each one poses, to help them quantify the resulting business risks each one poses and to take responsibility for what happens next.
This expert panel discusses:
Late last year, the UK government announced its National Cyber Strategy for 2022, a comprehensive plan that aims to establish “a more secure and resilient nation, better prepared for evolving threats and risks.” But what about the personal resilience of our security leaders and their teams? A constantly shifting threat landscape, long work hours, a lack of resources, high staff turnover are all factors that can lead to burnout.
How can a more secure and resilient nation be achieved if we don't look after our people?
This expert panel will share insights and strategies, including:
All content from Day 1 will be available on demand from 9 AM - 5 PM BST on Day 2, Wednesday, May 25th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.
Since Russia's invasion of Ukraine in February, NATO allied countries have waited to see cyber spillover from the conflict - DDoS, ransomware, wiper malware or any other attacks against critical infrastructure. So far, the activity has been sparse. So, if collateral damage from cyber warfare isn't necessarily all it was reputed to be, then what are the emerging threats that have security leaders most concerned?
Join this esteemed panel for a wide ranging discussion that includes:
Finding a balance between a pleasant user experience and stringent security requirements can be a challenge. If you do not find the right balance, users may revolt! This was especially true when Adobe, like you, were faced with the major shift towards more remote and hybrid work as a result of the COVID-19 pandemic. For example, when the pandemic first started and the world began shutting down, we had to move the entire Adobe workforce of more than 22,000 global employees to remote work over a single weekend. Such a massive change all at once requires network security controls that can readily adapt.
Adobe was well-prepared for this change thanks in part to our investment in what we call “Project ZEN.” Project ZEN is an internal initiative at Adobe based upon zero-trust principles. Since there is no “off-the-shelf” solution to fully deliver on these principles, ZEN consists of pioneering technology and policies to make the path to a zero-trust network more efficient and attainable. This effort enabled us to deliver on a more novel approach to managing our user encounters and authentication across the company – increasing security while improving the overall user experience.
In this session Eric Anderson, Director of Enterprise Security at Adobe, will talk about the benefits of a zero-trust approach to network security, our path to Project ZEN, and the benefits we have seen, including how it helped us better navigate the big changes in how our people work precipitated by the pandemic. Eric will provide insights from our experience here at Adobe in building and deploying zero-trust networking that you can use to help improve how your own organizations approach the new hybrid and remote work reality.
Rapid digital acceleration seen since the start of the pandemic has transformed the way businesses operate as they adapt to changing consumer behaviors and consumers' expectations of both customer experience and security. Recent world events have increased the risk of cyberthreats and elevated the importance of having a strategic incident response plan in place to deal with a data breach, should it happen.
TransUnion’s data breach solutions can help you take a proactive approach to dealing with data breaches and better protect consumers while helping to reduce financial losses. We do this by developing an efficient and effective response strategy that can help your organization equip customers with tools for combating identity theft, mitigate impacts to reputation and credibility and rebuild trust.
Mark Read, head of data breach solutions for TransUnion in the U.K. and part of TransUnion’s award-winning consumer solutions team, will share his insights into the current data breach landscape, covering the pressing issues faced by businesses across the U.K. and the role TransUnion’s data breach support services can play in helping businesses to reduce the impact of a data breach.
As part of its remit, the U.K.'s National Cyber Security Center, or NCSC, safeguards the nation's critical infrastructure - much of which is controlled within the private sector. Marsha Quallo-Wright, an NCSC deputy director, is responsible for improving critical infrastructure resilience, and in this exclusive session she discusses:
Running user awareness programs continues to be a cornerstone of many corporate information security programs, often driven in part by regulatory requirements. But can, and should, user training be relied on to better secure organizations? Should organizations instead focus their efforts more broadly, for example, by attempting not to train users, but to more effectively influence their behavior?
Join this session to hear three leading cybersecurity executives share their experiences regarding:
While a huge amount of attention is being payed to the concept and attempted actualisation of Zero Trust Security Architectures, the actual practical implementation of a successful trust environment requires a number of steps to deliver a comprehensive and actually useable environment.
This talk will outline practical approaches to the three main challenges for deploying Zero Trust architectures and will touch upon a number of options which will allow for enhanced security while the ZTA is being brought online.
We've looked into our crystal ball to predict the types of threats and potential cybersecurity weaknesses businesses can anticipate and prepare for in 2022. The changes in how we work and do business that arose during 2020 paved the way for new vulnerabilities in 2021, offering attackers unrestricted possibilities to exploit security flaws. Criminals targeted organizations of all sizes and took advantage of a lack of cyber resilience and cybersecurity infrastructure. We anticipate that in 2022 these hacks will only continue to grow and damage all types of organisations. Therefore, it's pivotal to learn how to reduce risks and defend your business from existing and future threats.
The business world has been through a massive evolution in the past few years. Threat actors are no different. They change with the times, preying on unsuspecting organizations and looking for any way to slip past your defenses. No single industry is immune to an attack, but you can be prepared with an understanding of the rapidly evolving threat landscape. After all, cyberthreats change quickly, and your cybersecurity must do the same to keep up.
Join Don Smith, vice president of IT security in the Secureworks Counter Threat Unit, as he discusses the changing threat landscape - including the growing risk of ransomware - as well as how your organization’s security program can keep pace, even with today’s most nefarious threat actors. In this session, Smith will discuss:
In order to protect against the evolving threat landscape, we must change the way in which we protect our data against vulnerabilities. To adapt, organizations are operating within the framework that no user, network, or device can be trusted by default until proven otherwise. Join ThreatLocker’s Director of Cybersecurity, Ben Jenkins, as he discusses how to secure applications from vulnerabilities using a Zero Trust model.
There is a wealth of data mobile operators currently utilize, and this data is being used in real time to protect consumers against account takeover fraud. Our panelists will share each of their unique perspectives on how they are helping to protect consumers against fraud. This informative discussion will shed light on the following:
Real-time digital payments: In barely a decade's time, they have gone from vision to broad reality. In his role at Mastercard, Nick Coleman oversees real-time payments and has an inside view of the maturation, evolving threatscape and emerging regulations. In this exclusive session, Coleman discusses:
The cyberthreat landscape continued to evolve and expand in 2021 as attackers found new vulnerabilities and ways to infiltrate organizations. There was also a significant rise in supply chain attacks in the past year, meaning hundreds or even thousands of organizations are at risk of being breached because of a security flaw in a single third party.
In this environment, security teams must shift to a risk-based approach, prioritizing the most important areas of their organization. They should also not be afraid to seek outside help, leveraging the growing number of highly skilled white hat hackers to discover unique types of vulnerabilities across their network.
In this session, Ellis will discuss:
Cyberattacks and threats such as phishing, malware and ransomware challenge security teams on a daily basis. During the pandemic and with the new increased flexibility of work, office and data locations, it’s never been more critical for security teams to be efficient and effective.
The constant evolution of security tooling is all about providing real-time visibility to detect and respond earlier, faster and more effectively to threats and attacks, all to circumvent existing security controls of the ever-changing attack surface.
During this session, we will discuss how you can ensure your security operations team has the visibility and tools it needs to reduce your organization's response times.
As part of this discussion, we’ll explore:
Join us for this interactive session and gain actionable insights to help you defend and protect critical data and infrastructure from emerging cyberthreats.
Modern WAFs are powerful, but they can be complex to manage and operate. From deciding on deployment architecture and requirement mapping to DEVOPs (CI/CD) integration and finalizing the myriad of other considerations before moving to the tuning and operationalization phase, all this creates complexity and confusion.
As a result, modern WAFs can be costly to implement in both commercial and staffing terms. Join Jay Coley, lead of security strategy at Fastly, as he demonstrates how you can reduce these issues to ensure your WAF deployments are as flexible and as simple as possible, all the while maintaining rule accuracy and WAF usability.
Most organisation’s IT infrastructures remain fragile to cyber attacks, especially the current scourge of ransomware operators sweeping across all verticals and all countries across the globe. Becoming cyber resilient to these kinds of attack is an emergent property, not a collection of products you can buy. In this session James will discuss those emergent properties and how he has seen organisations best achieve them using best-practice frameworks and solid engineering principles.
Because every business is unique, so too are the risks facing each one. Hence the answer to the question "what are the biggest cyber risks we face?" depends on who's asking. Regardless of the answer, however, it's up to the cybersecurity team to not only identify cyber risks, but help business leaders understand the operational risks each one poses, to help them quantify the resulting business risks each one poses and to take responsibility for what happens next.
This expert panel discusses:
Late last year, the UK government announced its National Cyber Strategy for 2022, a comprehensive plan that aims to establish “a more secure and resilient nation, better prepared for evolving threats and risks.” But what about the personal resilience of our security leaders and their teams? A constantly shifting threat landscape, long work hours, a lack of resources, high staff turnover are all factors that can lead to burnout.
How can a more secure and resilient nation be achieved if we don't look after our people?
This expert panel will share insights and strategies, including:
All content from Day 1 will be available on demand from 9 AM - 5 PM BST on Day 2, Wednesday, May 25th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.
May 24 - 25, 2022
UKI Summit