Speakers
- The speaker lineup will be announced shortly for this panel, Stay tuned for more!
PrivSec London Agenda | Timings shown in Greenwich Mean Time (GMT)
PrivSec London Agenda | Timings shown in Greenwich Mean Time (GMT)
GMT | Tuesday 28th February 2023 |
---|---|
09:00 | Event Opens & Registration Speakers
|
09:15 | |
09:30 | Hybrid Work Is Here to Stay: How to Improve and Maintain Cyber Resilience This session will explore the rise of hybrid work and its implications for cyber resilience. As more and more organisations shift to a mix of in-office and remote work, it's crucial to maintain strong cyber security measures. The panellists will provide insights and strategies for improving and maintaining cyber resilience in a hybrid work environment. They will discuss topics such as identifying and mitigating potential risks, implementing effective security protocols, and maintaining strong communication and collaboration within remote teams. As an attendee, you'll learn about the challenges and opportunities of hybrid work and how to address them from a cybersecurity perspective. You'll also gain strategies for keeping your organisation's data and systems secure in a hybrid work environment. Speakers
|
09:45 | |
10:10 | |
10:15 | Is Zero Trust Enough? With the pace of cyber-attacks and data breaches increasing, organisations are looking for solutions that just simply work. Both frequency of sophisticated attacks and ransomware recovery costs are steadily rising; organisations must think about risk mitigation and vulnerability management, plus how to minimise business disruption while streamlining recovery. Compromises cannot always be prevented - even in a zero-trust environment; having a comprehensive cyber resilience strategy is critical for business continuity in the face of ever-stronger attacks. Join Matt Aldridge, Principal Solutions Consultant from OpenText as he discusses: Speakers
|
10:30 | |
10:45 | |
10:50 | Security and Ethics: Why Cyber Security Is a Core Part of ESG As more and more organisations focus on ESG principles, it's important to think about the ethical implications of cyber security. This session will explore the relationship between cyber security and ethics, and why cyber security is a key part of ESG initiatives. The panel of experts will discuss the role of cyber security in ESG, and how it can impact an organisation's reputation and relationships with stakeholders. They'll also explore ethical considerations in cyber security, such as protecting personal data and using technology fairly and responsibly. As an attendee, you'll learn about the importance of cyber security in ESG and the ethical considerations involved. You'll also gain valuable insights and guidance on how to integrate cyber security into your organisation's ESG strategy. Speakers
|
11:00 | |
11:15 | |
11:30 | |
11:35 | Break Speakers
|
11:45 | |
11:50 | |
11:55 | Third Party Risk Management: Strategies and Tools to Mitigate Cyber Threats (Sponsored by C2Cyber) As more and more organisations rely on third parties to provide services and support, managing the potential risks to cyber security has become increasingly important. This session will explore third-party risk management, and the strategies and tools available to mitigate cyber threats. The expert speakers on the panel will discuss the importance of third-party risk management, and provide in-depth insights into the strategies and tools that can you can use to identify and mitigate potential threats. They will also discuss the role of risk assessments, contract negotiations, and ongoing monitoring in effective third-party risk management. As an attendee, you'll gain a comprehensive understanding of the potential risks associated with third parties and how to manage them effectively. You'll also gain valuable insights and strategies for identifying and mitigating cyber threats in your organisation. Speakers
|
12:00 | |
12:15 | |
12:35 | |
12:40 | State-Sponsored Cyber Attacks and Business: Strategies, Insurance and Why Ransomware Is Still Booming Over the past year, there has been a disturbing increase in aggressive nation-state cyber activity. A November Microsoft report suggests that the proportion of cyberattacks perpetrated by nation-states targeting critical infrastructure jumped from 20% to 40%. This session will explore the growing threat of state-sponsored cyberattacks and their impact on businesses. The panellists will discuss the current risk landscape, as well as trends and strategies for protecting businesses from these threats. As an attendee, you'll gain valuable guidance on how to protect your organisation from these increasingly aggressive attack, and strategies for defending against ransomware. Speakers
|
13:00 | |
13:15 | |
13:20 | |
13:25 | Lunch Speakers
|
13:45 | |
14:00 | |
14:25 | |
14:30 | Automation, Regulation and Board Oversight: Tectonic shifts in Cybersecurity GRC (Sponsored by Commugen) Cybersecurity GRC is changing rapidly, and business leaders who don’t want to stay behind have to adapt. GRC is the medium for creating meaningful and informed conversation about the way cybersecurity affects businesses. This panel will explore some of the recent changes in the field of Cybersecurity GRC, and how innovative security experts are staying ahead of the curve: Speakers
|
14:45 | |
15:00 | |
15:05 | The Future of Cybersecurity: Emerging Threats and Innovative Defenses As the threat landscape continues to evolve, it's essential to stay up-to-date. This session will explore the future of cybersecurity, highlighting the threats most likely to emerge or increase in coming years—and new ways to defend against them. Panellists will discuss the latest security trends and developments, and provide their views on the most significant emerging threats that organisations need to be aware of. They will also explore the innovative technologies and strategies that are being developed to defend against these threats, and provide guidance on how organizations can stay ahead of the curve. As an attendee, you'll learn about the most serious emerging threats and how you can protect against them. Speakers
|
15:15 | |
15:30 | |
15:45 | |
15:50 | |
16:00 | |
16:05 | |
16:15 | |
16:30 | |
16:45 |
PrivSec London Agenda | Timings shown in Greenwich Mean Time (GMT)
GMT | Wednesday 1st March 2023 |
---|---|
10:00 | Data Protection Authorisation Framework: Could a Standard Regulatory Structure Really Solve Every Privacy-Related Problem? The patchwork of data protection laws and frameworks can be confusing for individuals and hard to navigate for businesses. This session will explore the idea of a standard regulatory structure for data protection, and discuss whether such a framework could solve privacy-related problems. Panellists will critique the current state of data protection regulations, and provide insight into the challenges and opportunities presented by a standard regulatory structure. They will also discuss the potential benefits and drawbacks of a standard framework, and provide guidance on how such a framework could be implemented. As an attendee, you'll have the opportunity to think critically about the current state of data protection regulations, and consider the potential of a standard regulatory structure. Host
Speakers
|
10:15 | |
10:30 | |
11:40 | |
11:45 | Why do we accept gaps in our Data protection practices Data security is one of the most complex security challenges to modern business. Leaders faced with structured, unstructured, and now, semistructured data have the herculean task of defending their data, while staying compliant with a litany of regional and global regulations. In this session, Tim Ayling will demystify some best practices in finding, monitoring, and controlling sensitive data regardless of where it lives. Walk away with steps you can take to secure your data without an army of people, a vault of cash, or a Ph.D. Attendees will:
Speakers
|
11:00 | |
11:15 | |
11:20 | Break Speakers
|
11:30 | |
11:35 | |
11:40 | Privacy Program Management: How Companies Can Best Juggle Their Compliance Requirements In today's digital landscape, companies must navigate a complex array of privacy laws and regulations. This panel discussion will explore the challenges and opportunities of managing a privacy program, and provide insights on how companies can best juggle their compliance requirements. The panelists will discuss the key components of a privacy program, including conducting risk assessments, implementing appropriate policies and procedures, training employees on privacy best practices, and the role of technology in privacy program management. As an attendee, you will learn about the latest trends and developments in privacy program management, and gain practical advice on how to effectively manage your own company's privacy program. You will also have the opportunity to engage with the panelists and ask questions about privacy program management and compliance. Speakers
|
12:00 | |
12:20 | |
12:25 | The Practical GRC Roadmap for 2023 - lowering GRC costs and risks. Data at rest is the value not the enemy. Data is becoming increasingly regulated, so businesses need to do more than just manage it - they must take charge of data governance. This means having the structures in place that ensure their information assets are accurate and accessible while simultaneously protecting against privacy violations utilizing Artificial Intelligence (AI) and machine learning. With over 100 laws based on the EU's GDPR 2018 as a global standard, companies have an obligation to be accountable when using AI-powered automated decision-making processes due to Europe's upcoming new AI Act. Join our expert team for a lively, fun and ‘plain English’ fireside chat to explore: Speakers
|
12:45 | |
13:05 | |
13:10 | Lunch Speakers
|
13:30 | |
13:45 | |
14:10 | |
14:15 | New EU Digital Regulations: Beyond the GDPR
The DMA, the DSA, the DGA—it can be hard to keep as EU continues to develop its alphabet soup of digital policy acyronyms. This session will explore the new EU digital laws that have recently passed or are in development. Panellists will explore which organisations are subject to the most important new laws, and consider how they will impact UK organisations operating in Europe. As an attendee, you'll come away with a better understanding of what's coming up in the EU, and which of these new laws you need to be concerned about. Speakers
|
14:30 | |
14:45 | |
14:55 | |
15:00 | Emerging Privacy-Enhacing Technologies (PETs): What Works? Privacy-enhancing technologies (PETs) are a growing area of interest as organisations look for better ways to protect personal information. This session will explore the emerging landscape of PETs, and discuss which technologies are most effective. Speakers will discuss the latest developments in PETs, and provide insight into the technologies that are currently available. They will also discuss the challenges and opportunities presented by PETs, and provide guidance on how organizations can implement these technologies effectively. As an attendee, you'll learn about the latest trends in PETs, and gain a better understanding of which technologies are most effective. Speakers
|
15:15 | |
15:30 | |
15:45 | Managing a Privacy Program in a Multinational Environment Data privacy – driven by the proliferation of personal data, growing consumer expectation around the way personal data is handled, and expanding regulatory requirements around the globe – is at the forefront of our digital world. How can an organisation achieve best practice for managing an effective privacy program across multiple jurisdictions? In this session the panel will discuss some of the fundamentals of an effective privacy program, focusing particularly on the challenges that arise when dealing with compliance with varied data privacy laws across multiple jurisdictions. By the end of the session you’ll have a better understanding of the issues that can arise when managing a privacy program in an multi-national environment and you’ll be better placed to make informed decisions on how to tackle this important area. Speakers
|
16:00 | |
16:15 | |
16:30 | |
16:35 | |
16:45 | |
17:00 | |
17:15 |
PrivSec London Agenda | Timings shown in Greenwich Mean Time (GMT)
GMT | Wednesday 1st March 2023 |
---|---|
09:00 | Event Opens & Registration Speakers
|
09:15 | |
09:30 | The Role of Cybersecurity in Disaster Recovery and Business Continuity Planning Cybersecurity is an essential component of any disaster recovery and business continuity plan. This session will explore how organisations ensure their resilience and overcome setbacks. Panellists will discuss how cybersecurity contributes to disaster recovery and business continuity planning, and provide insight into the strategies and tools that can be used to protect against cyber threats. They will also discuss the importance of regular testing and updating of these plans, and provide guidance on how organisations can ensure their resilience in the face of disasters. As an attendee, you'll gain valuable insights and strategies for using cybersecurity to enhance your organisation's resilience and business continuity programme. Speakers
|
09:45 | |
10:10 | |
10:15 | Keeping Up with the Pace of Data Collection: Best Practices for Reducing Data Breach Risks As data collection practices continue to evolve, organisations must be proactive and rigorous to avoid data breaches. This session will explore best practices for reducing data breach risks and keeping up with the pace of data collection. The expert speakers on the panel will discuss the current state of data collection and data breach risks, and provide insight into the strategies and tools that organisations can use to reduce their risks. They will also discuss the importance of regular monitoring and assessments, and provide guidance on how to implement effective data protection policies and procedures. As an attendee, you'll learn about the latest trends in data collection and data breach risks, and gain valuable insights into the best practices for reducing these risks. Speakers
|
10:30 | |
10:45 | |
10:50 | Why Staff Still Click: Employee Training and Cybersecurity Best Practices to Prevent Breaches Despite ongoing training and awareness efforts, staff members still regularly fall victim to phishing scams and other types of attacks. In this session, our expert panel will explore the latest strategies for empowering employees to be strong defenders of cybersecurity. The panel will delve into the reasons behind this problem and discuss best practices for preventing breaches. Topics will include effective training strategies, technical solutions that take the burden off employees, and how to keep your team engaged and motivated. As an attendee, you'll learn about the latest trends in employee training and cybersecurity best practices. You'll also have the opportunity to ask questions and engage with the panellists. Speakers
|
11:00 | |
11:15 | |
11:30 | |
11:35 | Break Speakers
|
11:45 | |
11:50 | |
11:55 | How AI Is Transforming Cybersecurity: Both For Security Teams and Cybercriminals In this session, our expert panel will explore how AI is transforming the field of cybersecurity. Security teams are using AI to improve their ability to detect and respond to threats. But cybercriminals are also leveraging AI to launch increasingly sophisticated attacks. The panel will discuss the implications of this development and explore the latest trends in the use of AI in cybersecurity. Topics will include the role of AI in threat intelligence, the potential for AI-powered tools to automate some security tasks, and the challenges and opportunities presented by AI. As an attendee, you'll learn about the latest developments in the use of AI in cybersecurity and how they could impact your business or organisation. Speakers |
12:00 | |
12:15 | |
12:35 | |
12:40 | Keynote: The Future of CCTV: Protecting privacy, security and digital rights The use of CCTV in modern Britain has changed drastically in recent years. No longer just passively watching us, the cameras on the streets of the UK are increasingly AI-powered smart devices that are actively analysing us and our behaviours. Many of these devices are also made by Chinese state-owned companies, posing additional security and rights concerns. How can we protect human rights and national security in the age of pervasive surveillance? Speakers
|
13:00 | |
13:10 | Lunch Speakers
|
13:20 | |
13:45 | |
14:00 | |
14:25 | |
14:30 | Operational Grind - the cost of operationalizing security The value of data has driven privacy regulations and increased the cost of compliance. Where is the operational balance achieved between the intent of the compliance regulation and the rigour and effort required to actually implement it? As regulations increase will we be able to afford the operational costs of implementing good security – or will we just pay the fine. Speakers
|
14:45 | |
15:00 | |
15:05 | The Future of Cyber Security is Neurodiverse With the need for digital connection increasing by the minute so is our vulnerability to cyber threats. This problem is amplified when there is lack of suitably skilled and qualified candidates available tacke these threats. Studies often claim that this is the primary reason for the cyber security skills gap. Is this really true? This session will cover: Speakers
|
15:15 | |
15:30 | |
15:45 | |
15:50 | |
16:00 | |
16:05 | |
16:15 | |
16:30 | |
16:45 |