PrivSec London

 

PrivSec London 2023

  

 AGENDA

 

28th February & 1st March 2023

Park Plaza, Riverbank 

 

Register To Attend

 
 

Day 1 Agenda - 28th February 2023

Privacy & Security Theatres

Day 1: Privacy Theatre - Tuesday 28th February 2023

PrivSec London Agenda | Timings shown in Greenwich Mean Time (GMT)

Day 1: Security Theatre - Tuesday 28th February 2023

PrivSec London Agenda | Timings shown in Greenwich Mean Time (GMT)

Scroll left/right to view

GMT Tuesday 28th February 2023
09:00

Event Opens & Registration
09:00 AM - 09:30 AM

09:15
09:30

Hybrid Work Is Here to Stay: How to Improve and Maintain Cyber Resilience
09:30 AM - 10:10

This session will explore the rise of hybrid work and its implications for cyber resilience. As more and more organisations shift to a mix of in-office and remote work, it's crucial to maintain strong cyber security measures.

The panellists will provide insights and strategies for improving and maintaining cyber resilience in a hybrid work environment. They will discuss topics such as identifying and mitigating potential risks, implementing effective security protocols, and maintaining strong communication and collaboration within remote teams.

As an attendee, you'll learn about the challenges and opportunities of hybrid work and how to address them from a cybersecurity perspective. You'll also gain strategies for keeping your organisation's data and systems secure in a hybrid work environment.

Speakers

09:45
10:10
10:15

Is Zero Trust Enough?
10:15 AM - 10:45 AM

With the pace of cyber-attacks and data breaches increasing, organisations are looking for solutions that just simply work.

Both frequency of sophisticated attacks and ransomware recovery costs are steadily rising; organisations must think about risk mitigation and vulnerability management, plus how to minimise business disruption while streamlining recovery.

Compromises cannot always be prevented - even in a zero-trust environment; having a comprehensive cyber resilience strategy is critical for business continuity in the face of ever-stronger attacks.

Join Matt Aldridge, Principal Solutions Consultant from OpenText as he discusses:​
· Real-world emerging attack examples​
· BrightCloud threat Intelligence​
· The menace of social engineering​
· Zero Trust principles​
· Key pillars of Cyber Resilience​
· Practical steps to Cyber Resilience​

Speakers

  • Matt Aldridge, Principal Solutions Consultant, Opentext Cybersecurity
10:30
10:45
10:50

Security and Ethics: Why Cyber Security Is a Core Part of ESG
10:50 AM - 11:30 AM

As more and more organisations focus on ESG principles, it's important to think about the ethical implications of cyber security. This session will explore the relationship between cyber security and ethics, and why cyber security is a key part of ESG initiatives.

The panel of experts will discuss the role of cyber security in ESG, and how it can impact an organisation's reputation and relationships with stakeholders. They'll also explore ethical considerations in cyber security, such as protecting personal data and using technology fairly and responsibly.

As an attendee, you'll learn about the importance of cyber security in ESG and the ethical considerations involved. You'll also gain valuable insights and guidance on how to integrate cyber security into your organisation's ESG strategy.

Speakers

  • Tim Burnett, Head of Cyber Security and Compliance, Science & Technology Facilities Council
  • Jonathan Wood, CEO, C2Cyber
11:00
11:15
11:30
11:35

Break
11:35 AM - 11:50 AM

11:45
11:50
11:55

Third Party Risk Management: Strategies and Tools to Mitigate Cyber Threats
11:55 AM - 12:35

As more and more organisations rely on third parties to provide services and support, managing the potential risks to cyber security has become increasingly important. This session will explore third-party risk management, and the strategies and tools available to mitigate cyber threats.

The expert speakers on the panel will discuss the importance of third-party risk management, and provide in-depth insights into the strategies and tools that can you can use to identify and mitigate potential threats. They will also discuss the role of risk assessments, contract negotiations, and ongoing monitoring in effective third-party risk management.

As an attendee, you'll gain a comprehensive understanding of the potential risks associated with third parties and how to manage them effectively. You'll also gain valuable insights and strategies for identifying and mitigating cyber threats in your organisation.

Speakers

12:00
12:15
12:35
12:40

State-Sponsored Cyber Attacks and Business: Strategies, Insurance and Why Ransomware Is Still Booming
12:40 - 13:20

Over the past year, there has been a disturbing increase in aggressive nation-state cyber activity. A November Microsoft report suggests that the proportion of cyberattacks perpetrated by nation-states targeting critical infrastructure jumped from 20% to 40%.

This session will explore the growing threat of state-sponsored cyberattacks and their impact on businesses. The panellists will discuss the current risk landscape, as well as trends and strategies for protecting businesses from these threats.

As an attendee, you'll gain valuable guidance on how to protect your organisation from these increasingly aggressive attack, and strategies for defending against ransomware.

Speakers

13:00
13:15
13:20
13:25

Lunch
13:25 - 14:25

13:45
14:00
14:25
14:30

Sponsored Session
14:30 - 15:00

Session info coming soon...

Speakers

14:45
15:00
15:05

The Future of Cybersecurity: Emerging Threats and Innovative Defenses
15:05 - 15:45

As the threat landscape continues to evolve, it's essential to stay up-to-date. This session will explore the future of cybersecurity, highlighting the threats most likely to emerge or increase in coming years—and new ways to defend against them.

Panellists will discuss the latest security trends and developments, and provide their views on the most significant emerging threats that organisations need to be aware of. They will also explore the innovative technologies and strategies that are being developed to defend against these threats, and provide guidance on how organizations can stay ahead of the curve.

As an attendee, you'll learn about the most serious emerging threats and how you can protect against them.

Speakers

  • Alison Wakefield, Professor of Criminology and Security Studies, University of West London
  • Tim Burnett, Head of Cyber Security and Compliance, Science & Technology Facilities Council
15:15
15:30
15:45
15:50
16:00
16:05
16:15
16:30
16:45

Day 2 Agenda - 1st March 2023

Privacy & Security Theatres 

Day 2: Privacy Theatre - Wednesday 1st March 2023

PrivSec London Agenda | Timings shown in Greenwich Mean Time (GMT)

Scroll left/right to view

GMT Wednesday 1st March 2023
10:00

Data Protection Authorisation Framework: Could a Standard Regulatory Structure Really Solve Every Privacy-Related Problem?
10:00 AM - 10:40 AM

The patchwork of data protection laws and frameworks can be confusing for individuals and hard to navigate for businesses. This session will explore the idea of a standard regulatory structure for data protection, and discuss whether such a framework could solve privacy-related problems.

Panellists will critique the current state of data protection regulations, and provide insight into the challenges and opportunities presented by a standard regulatory structure. They will also discuss the potential benefits and drawbacks of a standard framework, and provide guidance on how such a framework could be implemented.

As an attendee, you'll have the opportunity to think critically about the current state of data protection regulations, and consider the potential of a standard regulatory structure.

Speakers

10:15
10:30
11:40
11:45

Why do we accept gaps in our Data protection practices
10:45 AM - 11:15 AM

Data security is one of the most complex security challenges to modern business. Leaders faced with structured, unstructured, and now, semistructured data have the herculean task of defending their data, while staying compliant with a litany of regional and global regulations. In this session, Adrian Clark will demystify some best practices in finding, monitoring, and controlling sensitive data regardless of where it lives. Walk away with steps you can take to secure your data without an army of people, a vault of cash, or a Ph.D.

Attendees will:​
· Learn the difference between structured & unstructured data and how to deal with data privacy regulations​
· Understand why you should not simply monitor your most critical data when most breeches occur in areas where the stakes are much lower and the entry points are much easier to gain access to.​
· Discover why real time security is too slow and why data classification should come second to monitoring when you begin a security overhaul.​

Speakers

11:00
11:15
11:20

Break
11:20 AM - 11:35 AM

11:30
11:35
11:40

Privacy Program Management: How Companies Can Best Juggle Their Compliance Requirements
11:40 AM - 12:20

In today's digital landscape, companies must navigate a complex array of privacy laws and regulations. This panel discussion will explore the challenges and opportunities of managing a privacy program, and provide insights on how companies can best juggle their compliance requirements.

The panelists will discuss the key components of a privacy program, including conducting risk assessments, implementing appropriate policies and procedures, training employees on privacy best practices, and the role of technology in privacy program management.

As an attendee, you will learn about the latest trends and developments in privacy program management, and gain practical advice on how to effectively manage your own company's privacy program. You will also have the opportunity to engage with the panelists and ask questions about privacy program management and compliance.

Speakers

  • Evie Kyriakides-Stenhouse, Group Head of Data Privacy/Chief Privacy Officer, Natura & Co.
  • Gal Ringel, CEO & Co-founder, Mine
  • Glen Hymers, Head of Data Privacy & Compliance and Information Assurance | Cabinet Office Digital
  • Steven Bond, Information Rights Manager, The Open University
12:00
12:20
12:25

Keeping Up with the Pace of Data Collection: Best Practices for Reducing Data Breach Risks
12:25 - 13:05

As data collection practices continue to evolve, organisations must be proactive and rigorous to avoid data breaches. This session will explore best practices for reducing data breach risks and keeping up with the pace of data collection.

The expert speakers on the panel will discuss the current state of data collection and data breach risks, and provide insight into the strategies and tools that organisations can use to reduce their risks. They will also discuss the importance of regular monitoring and assessments, and provide guidance on how to implement effective data protection policies and procedures.

As an attendee, you'll learn about the latest trends in data collection and data breach risks, and gain valuable insights into the best practices for reducing these risks.

Speakers

12:45
13:05
13:10

Lunch
13:10 - 14:10

13:30
13:45
14:10
14:15

New EU Digital Regulations: Beyond the GDPR
14:15 - 14:55

The DMA, the DSA, the DGA—it can be hard to keep as EU continues to develop its alphabet soup of digital policy acyronyms.

This session will explore the new EU digital laws that have recently passed or are in development. Panellists will explore which organisations are subject to the most important new laws, and consider how they will impact UK organisations operating in Europe.

As an attendee, you'll come away with a better understanding of what's coming up in the EU, and which of these new laws you need to be concerned about.

Speakers

14:30
14:45
14:55
15:00

Emerging Privacy-Enhacing Technologies (PETs): What Works?
15:00 - 15:40

Privacy-enhancing technologies (PETs) are a growing area of interest as organisations look for better ways to protect personal information. This session will explore the emerging landscape of PETs, and discuss which technologies are most effective.

Speakers will discuss the latest developments in PETs, and provide insight into the technologies that are currently available. They will also discuss the challenges and opportunities presented by PETs, and provide guidance on how organizations can implement these technologies effectively.

As an attendee, you'll learn about the latest trends in PETs, and gain a better understanding of which technologies are most effective.

Speakers

  • James Robson, Data Protection Officer at Early Intervention Foundation (EIF)
15:15
15:30
15:45
16:00
16:15
16:30
16:35
16:45
17:00
17:15

Day 2: Security Theatre - Wednesday 1st March 2023

PrivSec London Agenda | Timings shown in Greenwich Mean Time (GMT)

Scroll left/right to view

GMT Wednesday 1st March 2023
09:00

Event Opens & Registration
09:00 AM - 09:30 AM

09:15
09:30

The Role of Cybersecurity in Disaster Recovery and Business Continuity Planning
09:30 AM - 10:10

Cybersecurity is an essential component of any disaster recovery and business continuity plan. This session will explore how organisations ensure their resilience and overcome setbacks.

Panellists how cybersecurity contributes to disaster recovery and business continuity planning, and provide insight into the strategies and tools that can be used to protect against cyber threats. They will also discuss the importance of regular testing and updating of these plans, and provide guidance on how organisations can ensure their resilience in the face of disasters.

As an attendee, you'll learn gain valuable insights and strategies for using cybersecurity to enhance your organisation's resilience and business continuity programme.

Speakers

09:45
10:10
10:15

Sponsored Session
10:15 AM - 10:45 AM

10:30
10:45
10:50

Why Staff Still Click: Employee Training and Cybersecurity Best Practices to Prevent Breaches
10:50 AM - 11:30 AM

Despite ongoing training and awareness efforts, staff members still regularly fall victim to phishing scams and other types of attacks. In this session, our expert panel will explore the latest strategies for empowering employees to be strong defenders of cybersecurity.

The panel will delve into the reasons behind this problem and discuss best practices for preventing breaches. Topics will include effective training strategies, technical solutions that take the burden off employees, and how to keep your team engaged and motivated.

As an attendee, you'll learn about the latest trends in employee training and cybersecurity best practices. You'll also have the opportunity to ask questions and engage with the panellists.

Speakers

11:00
11:15
11:30
11:35

Break
11:35 AM - 11:50 AM

11:45
11:50
11:55

How AI Is Transforming Cybersecurity: Both For Security Teams and Cybercriminals
11:55 AM - 12:35

In this session, our expert panel will explore how AI is transforming the field of cybersecurity. Security teams are using AI to improve their ability to detect and respond to threats. But cybercriminals are also leveraging AI to launch increasingly sophisticated attacks.

The panel will discuss the implications of this development and explore the latest trends in the use of AI in cybersecurity. Topics will include the role of AI in threat intelligence, the potential for AI-powered tools to automate some security tasks, and the challenges and opportunities presented by AI.

As an attendee, you'll learn about the latest developments in the use of AI in cybersecurity and how they could impact your business or organisation.

Speakers

  • Jose Belo, Data Privacy Senior Legal Counsel, Shell Group
12:00
12:15
12:35
12:40

Keynote: The Future of CCTV: Protecting privacy, security and digital rights
12:40 - 13:10

The use of CCTV in modern Britain has changed drastically in recent years. No longer just passively watching us, the cameras on the streets of the UK are increasingly AI-powered smart devices that are actively analysing us and our behaviours. Many of these devices are also made by Chinese state-owned companies, posing additional security and rights concerns. How can we protect human rights and national security in the age of pervasive surveillance?

Speakers

13:00
13:10

Lunch
13:10 - 14:25

13:20
13:45
14:00
14:25
14:30

Sponsored Session
14:30 - 15:00

14:45
15:00
15:05

The Future of Cyber Security is Neurodiverse
15:05 - 15:45

With the need for digital connection increasing by the minute so is our vulnerability to cyber threats. This problem is amplified when there is lack of suitably skilled and qualified candidates available tacke these threats. Studies often claim that this is the primary reason for the cyber security skills gap. Is this really true?

This session will cover:​
· Are we creating an artificial skills/talent gap by putting an excessive focus on technical skills?​
· Are there other untapped pools of talent that are being overlooked for Cyber Security roles?​
· What role does Neurodiversity play in creating and developing a robust talent pipeline of security professionals to tackle today’s security issues?​
· What’s been done so far and what can we do better to develop a neurodiverse workforce in cyber security?​

Speakers

15:15
15:30
15:45
15:50
16:00
16:05
16:15
16:30
16:45