Cloud & Cyber Security Expo 2022 - Themes

Zero Trust

Are you using a Zero Trust security model yet? The Zero Trust approach assumes that every time a device accesses your systems it could be a threat. The user must provide multi-factor authentication each time they log on.

This makes a lot of sense in theory, yet also introduces a lot of challenges. An over-zealous set of protections will slow down productivity and cause endless complaints. Too much trust opens you up to more threats in a cloud-first world.

This theme will help you frame your own Zero Trust definitions and balance the risks and rewards of the approach.  

  • Zero Trust Journey
  • Identity-led security

Security for a Multi Cloud World

How confident are you that all the cloud-based tools your employees use are fully trustworthy? Companies are using more cloud environments than ever to boost flexibility and use the best software available. But that leaves IT teams with less visibility, a confusing range of management tools and plenty of uncertainty about how data is being moved between environments. You’ll need a strategy and the right tools to adapt to this multi-cloud world, and so these sessions will get you up to speed on best practice.

  • Digital Risk Protection
  • The security challenge presented by multi-cloud

Cyber Resilience

When it comes to cyber-attacks, it’s no longer a question of ‘if’ you’ll get breached, but ‘when’. Cyber resilience is a practical and realistic approach to managing risks and preparing for the high likelihood your systems will succumb to an attack at some point. It’s about having protocols in place to detect and address attacks when they happen. But it’s also about being able to continue operating and delivering for customers even if you are breached.

This theme will get you up to speed with the cyber resilience concept and help you develop an appropriate strategy.

  • Network Security
  • Threat Intelligence & Response
  • Breach and attack stimulation / 3rd party audit and vulnerabilities
  • Convergence of IT and OT security

Human Factors

The leading cause of cybersecurity breaches has always been human error. And this has become even more challenging as we adapt to a world of hybrid working. Much of the training you will have previously invested in is no longer as relevant now that people are often working away from the normal office environment. Staff will need to learn new skills and be aware of the new kinds of phishing and social engineering techniques criminals are using. This theme will help you address these challenges.

  • Upskilling the workforce
  • Workforce adoption and training
  • Securing remote/hybrid working
  • Security awareness and Training
  • Cultural adoption of new tech/tools
  • Communicating and working with the board/top leadership

Emerging Tech

How do you weigh up the security risks and rewards of using emerging technologies? A new generation of IT tools can help you win more customers, enter new markets and innovate. Yet IoT, mobile, AI tools and other new technologies can also be exploited by malicious actors as a gateway into your systems. It is essential to design security considerations into your deployments of emerging tech right from the beginning. In this theme, we’ll be looking at how to do that.

  • Mobile & IoT Security
  • Manufacturing & Logistics – Digital Security
  • AI/ML
  • DevSecOps
  • Cryptography and Cryptanalysis
  • Confidential computing

Hotel & Travel

Sponsors

Silver Sponsor

  • Secfense
  • SSL247

 

Lunch & Learn Sponsor

  • Duo

 

Lunch & Learn Sponsor

  • Crowdstrike

 

Technical Workshop Sponsor

  • DarkTrace

 

Technical Workshop Sponsor

  • Sentinel One

 

Technical Workshop Sponsor

  • Manage Engine

 

Media Partner

  • Linux Magazine
  • ADMIN Magazine
  • CyberSecurityJobSite.com
  • Elite Business

 

Knowledge Partner

  • ISC2

 

Media Partner

  • Computing Security
  • Network Computing

 

Media Partner

  • Paybis
  • CEX.io

 

Newsletter Sign Up