2020 Keynote Agenda


Introducing the Cloud & Cyber Security Keynote agenda

We’re excited to share with you a snapshot of the hottest topics that will be discussed live in March. Hear from experts about the latest data scandals and the leading technologies, techniques and best practices from across the industry.

If you can relate to these subjects and want to stay up to date with this and other CCSE news...

Register your interest   Present at CCSE 2020

Here's a snapshot of our 2020 speakers:


Pentesting: So, you think you’re secure?

Many organisations find pentesting painful. Even if your hired hackers find a vulnerability to fix, you’re left uncertain whether all your weaknesses have been exposed or not. This session will give an overview of more holistic pentesting for a wide range of types of attacks – from social engineering to network and cloud breaches.

Using AI to respond to threats

There are only so many cyber threats that humans can discover and tackle – and many breaches go unnoticed for months. And that’s where AI comes in. An AI system could tirelessly scan for suspicious behaviour, alert you to problems and even provide fixes. This session will look at the potential – and limits – of using AI for cyber security.

Hacking and cybercrime – how the land lies in 2020

Make sure you are as informed as your peers about the latest hacking threats. Here our industry expert report from the frontline of cybercrime and walk us through emerging trends, including AI-enhanced breaches, IoT vulnerabilities and remote access attacks - and show how you can keep your organisation safe. 

Fighting back with cloud: CounterAttacks 101

Attack is the best form of defense. The problem is, most organisations’ cyber security model focuses almost exclusively on building walls around on-premises systems. In our cloud-first era, this just doesn’t make sense. Attend this session to learn how to defend your assets in the cloud by constantly scanning the horizon and attacking the attackers. 

Fostering a security culture from top to bottom

Organisations with a strong security culture have much lower chances of ‘human factor’ breaches – by far the most common cause of incidents. However, as any cyber security exec will tell you, fostering this kind of culture is extremely challenging. But it is possible, and this session will walk you through the practicalities of changing hearts and minds.

Security without sacrificing the customer experience?

Customers expect hassle-free online purchases and easy access to your products and services. They also demand the highest standards of security. How do you square this circle? Attend this session to learn how to balance safety with a smooth customer experience – and learn how your security credentials can become a competitive differentiator.

Is decentralised cloud the way to reduce vulnerabilities and risk?

Today an enormous amount of cloud computing runs through the central servers of a small handful of companies. While these service providers are certainly secure, there are still some well documented risks with this model. This session will explore how decentralised cloud computing could provide a novel alternative.

How self-learning machines can detect and defeat

Imagine a self-learning machine crawling your systems, seeking out and neutralising threats. Rather than human workers scanning entire environments, artificial intelligence solutions could do the leg work - without ever getting fatigued. This session will explore how this technology works.

Who will triumph? How Nation States weaponise intelligence to dominate

It’s the new arms race. Competing governments are increasingly weaponising intelligence to influence trade, news and even elections in foreign countries. But what are the underlying technologies and strategies that let them do this? Our expert will provide an insight into the technical and geopolitical factors at play.

API security – The cyber risks of seamless integration?

APIs underpin so much modern technology. But if you depend on a third-party API which gets broken, hacked, or simply isn’t updated, you could leak sensitive data. Attend this session to learn about the latest encryption methods, tokens, and other strategies to ensure the APIs you use are safe and secure.

Ensuring enterprise-level security in complex cloud environments

Many large businesses are adopting complex cloud environments which offer great flexibility, scalability and privacy - be that an entirely private cloud or some kind of hybrid. However, ensuring these environments are safe requires cloud security expertise that not every IT department can access. During this session we explore the essentials.

Creating value while managing risk and security

It is the major dilemma for CISOs and other security professionals: you don’t want to eternally be saying “no” to new initiatives yet must ensure security. This session will look at how to find a balance between these competing demands and how to manage them. We will also see how security can be a valued-added differentiator.

The year in breaches: Lessons learned from Capital One and more

When details of 106m people were stolen from the Capital One bank’s Amazon Web Services instance in 2019, it reopened many people’s concerns around cloud security. This session will explore the major cloud breaches of the past 12 months and look at what we have learnt about cloud security.

Are your employee devices the weakest link in your network?

More employees are using peripheral devices than ever. All those company-issued and BYOD smartphones, laptops and tablets are great for productivity but provide juicy opportunities for hackers too. We explore the best ways to manage these devices across your network and methods to contain any breaches.

The consequences to brand, finance and trust for BA, Marriott and Facebook

The EU’s GDPR regulation bared its teeth in 2019 with huge fines for BA, Marriott and Facebook. In this keynote we explore the implications of these penalties for the brands concerned. What can we learn from their experiences, and what does it mean for your company?

The role of the enterprise in averting cyberwarfare

In 2015 Sony was rocked by a cyber-attack believed to have emanated from North Korea in response to a film it produced. Aggressive foreign powers are increasingly weaponising cyberwarfare to target key industries and critical infrastructure in other countries. This session will look at the scale of the threat, how businesses can reduce their exposure and the role of the private sector in curtailing threats from abroad.

Is society growing numb to data breaches? The risk of breach normalisation

Barely a week goes by without newspaper headlines reporting another data breach. For many citizens these breaches feel abstract and distant, yet for the victims the consequences are very real. Are we at risk of normalising data breaches? Is this even a problem, and how might we counteract it?

Navigating the staffing challenge within security teams

There are huge shortages of skilled cyber security staff and many organisations are forced to outsource this work to expensive consultancies. This session will look at what the industry needs to do to develop cyber security skills in-house. We will also learn how successful CISOs attract, train and retain security personnel.

Automating security operations for best-in-class SIEM

Automated Security Information and Event Management promises to save IT departments countless tedious hours analysing security alerts. The benefits are clear but SIEM is not a silver bullet and must be deployed effectively. During this session we will explore the do’s and don’ts and best practice.

Is the future of cyber security Quantum?

While widespread quantum computing is still some way off, its cyber security potential is enormous. It could, for instance, make it nearly impossible for hackers to launch brute force attacks on a system. A quantum and cyber security expert will talk us through the implications of this new technology, its strengths and limits.

Maintaining confidentiality in the BYOD era

BYOD is the New Normal, but it introduces more access points to your network than ever before. While there is some risk, this model can still be managed securely and confidential data protected. We will be taking a deep dive into best practice and protocol from both a technical and business culture perspective.

Simplifying IAM in the age of cloud?

In the cloud era, employees are increasingly using cloud-based business apps and tools from different providers. This introduces the risk that they use short cuts such as simple (or written down) passwords to access all these systems. Attend this session to learn about best practice Identity and Access Management in the cloud.

Latest News

  • 21-Jan-2020

    “Making good business decisions is a critical part of every executive’s job and is vital to every company’s well-being.” So says McKinsey and Co, in an article on the importance of decision-making. It’s undeniable that being able to take action rapidly is the difference between success and failure in today’s markets – consider how many once-leading businesses have atrophied as their ability to make the right decisions has diminished.

    Yet knowing what to do is hard, doubly so when you consider the amount of information we are all assailed with on a day-to-day basis. How can anyone make definitive decisions when faced with so many choices, so much data?

    The post Data-informed decision making — 10 skills you can’t do without appeared first on Techerati.

  • 21-Jan-2020

    London-based NTT Ltd. has formed a new division incorporating the data centre companies that previously sat under NTT Communications.

    NTT Ltd. was formed after Japanese telecommunications giant NTT Corp. consolidated NTT Communications and two other of its key IT businesses into a single $11bn (£8.7bn) entity, making it Japan's largest IT company.

    The IT provider's newly-formed Global Data Centers division incorporates e-shelter, Gyron, Netmagic, NTT Indonesia Nexcenter, RagingWire and others.

    The post NTT Ltd. consolidates data centre firms into global unit appeared first on Techerati.

  • 21-Jan-2020

    An EU proposal to temporarily ban facial recognition technology has divided opinion in the upper echelons of the techsphere, with leaders from Google and Microsoft offering divergent responses to the proposed bill.

    Alphabet chief executive Sundar Pichai was quick to back the proposal, that leaked online this week, over concerns the technology could be misused. Meanwhile, Microsoft President and chief legal officer Brad Smith said an outright ban would be a step too far and called for a more measured response.

    The post Google and Microsoft clash over proposed EU facial recognition ban appeared first on Techerati.


Diamond Sponsor

Headline Sponsor

Platinum Sponsor

Stream Sponsors


Stream Sponsors

Gold Sponsors

Gold Sponsors


Silver Sponsors


Silver Sponsors


Silver Sponsors



Security Education Partner


Event Partner


Event Partner


Media Partner


Media Partner


Media Partner


Media Partner


Media Partner


Media Partner


Media Partner


Media Partner


Media Partner


Media Partner


Media Partner