Conference Programme

CCSE

 

We are thrilled to share with you our biggest and best programme to date with 5 theatres, 166 speakers and 10 brand new streams of content!

Join us and meet our incredible line-up of speakers, and hear their industry insights and experiences. With presentations, case studies and panel discussions across two days, there are plenty of learning opportunities.

Also, be sure to visit Exclusive Network's Open Theatre at their stand S810, who will be running continuous, invaluable sessions throughout both days.

We’re excited to see you there.

Register now

Exclusive Networks

Loading
Keynote
menlo security ESET logo white
  1. Keynote
    Many large businesses are adopting complex cloud environments which offer great flexibility, scalabi ...
  2. Keynote
    Why is the average tenure of executive infosec professionals around 18 months? Because security depa ...
  3. Keynote
    Watch Jake unfold a targeted phishing attack on the CEO of a company and how easy it is to manipulat ...
  4. Keynote
    Automated Security Information and Event Management promises to save IT departments countless tediou ...
  5. Keynote
    The digital battleground has shifted from nation-states to corporations. With attacks causing damage ...
  6. Keynote
    Despite increased media exposure, tougher fines and reputational damage, data breaches continue to b ...
  7. Keynote
    Businesses are rapidly moving away from the traditional data centre and security solutions that they ...
  8. Keynote
    Making sure that all levels of an organization understand the value of security is no longer merely ...
  9. Keynote
    Attend this session to learn how to protect your digital valuables with the highest classification i ...
  10. Keynote
    When details of 106m people were stolen from the Capital One bank’s Amazon Web Services instance in ...
Cloud and Cyber Security Keynote
  1. Keynote
    There are huge shortages of skilled cyber security staff and many organisations are forced to outsou ...
Threat detection, intelligence and response
SOPHOS
  1. Theatre 2
    The cybersecurity industry is maturing and taking a step towards an outcome orientated approach that ...
  2. Theatre 1
    In this session, Alex will discuss how digital transformation has turned the traditional view of cyb ...
  3. Theatre 2
    Recent studies report that 90% of insider data loss, leak and theft goes undetected internally. Even ...
  4. Theatre 1
    We’re facing a constant battle of trying to get ahead of hackers. But how can we not only get ahead, ...
  5. Theatre 1
    How UK policing are tackling cybercrime. Pursuing those who seek to exploit how we live and work onl ...
  6. Theatre 2
    With thousands of new attacks occurring daily, impacting all aspects of our lives, ransomware has pr ...
  7. Theatre 2
    In the last 24 months, the security industry has seen a great deal of consolidation, disappearance a ...
Securing network environments
  1. Theatre 3
  2. Theatre 3
    Today, solutions like Microsoft Azure Virtual WAN are a great alternative to traditional MPLS based ...
  3. Theatre 4
    In this session we will learn how best to identify the gaps in your network, and discover the latest ...
  4. Theatre 4
    As companies continue their journey in digital transformation, combining the best user experience wi ...
  5. Theatre 4
    Cyber is now the fifth dimension of warfare and adversaries are using tactics and techniques designe ...
Enterprise cloud security
McAfee
  1. Theatre 3
  2. Theatre 3
    Cloud security is a team sport – and it requires people from security, networking, GRC, legal, LOB a ...
  3. Theatre 4
  4. Theatre 4
    Cloud security is simpler than you think. A recent winner of CRN’s Coolest Cloud Companies for 2020, ...
  5. Theatre 3
    In the antivirus industry a large emphasis is placed on protecting Windows endpoints. Windows deskto ...
  6. Theatre 4
    The elasticity and short lifespan of servers, paired with the up-and-coming wave of containerisation ...
  7. Theatre 3
    Adoption of cloud, mobile form factors, BYOD and the growth of contractors has fueled remote working ...
  8. Theatre 3
    With so many different options available nowadays, how do you choose the best cloud strategy for you ...
  9. Theatre 4
    Most organizations are quick to embrace the cloud, but … now what? Join DivvyCloud for a presentatio ...
Application security and DevSecOps
snyk
  1. Theatre 1
    Open Source - The last 10 years have seen a massive proliferation in the use of Open Source. About 9 ...
  2. Theatre 1
    Enterprises today face competing priorities. Compliance burdens require internal segmentation of inc ...
  3. Theatre 2
  4. Theatre 1
    What can we learn from 8.3 million software security findings? Plenty, and the presenter has the vis ...
  5. Theatre 2
    Learn about the key attacks that Neustar has mitigated on behalf of its customers over the last year ...
  6. Theatre 1
    Handling file uploads and processing URLs should be easy, right? Well, it turns out there are many t ...
  7. Theatre 2
Data protection, encryption and privacy
BigID logo
  1. Theatre 4
  2. Theatre 2
    Everybody knows that unstructured data growth is out of control; we’ve all heard the stats. Egnyte’s ...
  3. Theatre 1
    Traditional privacy governance models with centralised controls and oversight do not align well with ...
  4. Theatre 4
  5. Theatre 2
  6. Theatre 2
    Learn the overlaps between ICO requirements and UK-relevant sectoral law breach obligations Understa ...
  7. Theatre 1
    A data breach can wreak havoc for any organisation – small or large – severely impacting your reputa ...
Governance, risk management and compliance
IRM
  1. Theatre 1
    First GDPR, and now CCPA. The regulation train is fast approaching and there’s no way of avoiding it ...
  2. Theatre 1
    What protection mechanisms are there around sensitive data? Our recommendations if you are a supplie ...
  3. Theatre 2
    Envisioning a new model for data governance that begins and ends at the source of the content.Enterp ...
  4. Theatre 1
    Nigel Gibbons will provide the audience with an introduction to third party resilience within the cl ...
  5. Theatre 2
    IONOS' Sab Knight will point out how you can maintain data sovereignty while serving your companies ...
  6. Theatre 1
    Review roles and responsibilities to effectively to shift database maintenance to technology tools a ...
IoT security, privacy and trust
cyberx
  1. Theatre 3
    As organizations move to outsource more of their services, operations, and network infrastructure, t ...
  2. Theatre 3
  3. Theatre 4
    Using Mobility Device Management software you can transform business processes and increase the effi ...
  4. Theatre 4
Privilege, identity and access management
  1. Theatre 3
    more details to follow
Security strategies and zero-trust
Cloudflare
  1. Theatre 4
    While the role of cloud in ICS is in its infancy, the expected uptake of ICSaaS over the next few ye ...
  2. Theatre 3
    People are often described as the weakest link in your organisation, however they could in fact be t ...
  3. Theatre 4
    Businesses are rapidly moving away from the traditional data centre and security solutions that they ...
  4. Theatre 3
    A strong information security strategic plan puts an organisation in a strong place to mitigate, tra ...
  5. Theatre 3
    With organizations now leveraging an average of five public and private clouds, IT administrators ar ...
  6. Theatre 4
  7. Theatre 3
Keynote
menlo security ESET logo white
  1. Keynote
    It is the major dilemma for CISOs and other security professionals: you don’t want to eternally be s ...
  2. Keynote
    It’s the new arms race. Competing governments are increasingly weaponising intelligence to influence ...
  3. Keynote
    The common security challenges faced in the cloud stem from misconfiguration, compliance, and an exp ...
  4. Keynote
    In this talk Deepak Daswani will explain how the cyberspace and hacking world works, how incidents a ...
  5. Keynote
    Customers expect hassle-free online purchases and easy access to your products and services. They al ...
  6. Keynote
  7. Keynote
Cloud and Cyber Security Keynote
  1. Keynote
    In this session, Alex will discuss how digital transformation has turned the traditional view of cyb ...
  2. Keynote
    Why legacy appliance-based security is not going to cut it in the age of cloud Why a detection based ...
Threat detection, intelligence and response
SOPHOS
  1. Theatre 1
    2019, was once again a year which cyber breaches were common place reported within the UK media, mos ...
  2. Theatre 2
    The cybersecurity industry is maturing and taking a step towards an outcome orientated approach that ...
  3. Theatre 2
    With the annual cost of cyber-crime forecast to hit $6 trillion by the end of this year, investment ...
Securing network environments
  1. Theatre 3
  2. Theatre 4
    Organisations should not need to accept the short comings of solutions that cannot solve the problem ...
Enterprise cloud security
McAfee
  1. Theatre 3
    Whether you’re in the cloud already, migrating, multi-cloud, hybrid or somewhere in between the chal ...
  2. Theatre 3
    Technology has disrupted traditional business models and over seventy percent of companies either ha ...
  3. Theatre 4
    Amazon Web Services, Microsoft Azure, and Google Cloud Platform are all going strong. Organizations ...
  4. Theatre 4
  5. Theatre 4
    In a world that is increasingly more global and fast paced, content collaboration platforms are an e ...
  6. Theatre 3
    Organisations should not need to accept the short comings of solutions that cannot solve the problem ...
Application security and DevSecOps
snyk
  1. Theatre 2
    Many of the Dev*Ops talks revolve around tools and culture. There are some good, fascinating talks a ...
  2. Theatre 1
    Is ‘DevSecOps’ just another term? Or is it actually proving successful to businesses today? Join us ...
  3. Theatre 1
      With the rise of the use of CI/CD pipelines how can we assure that the code we are deploying is se ...
  4. Theatre 2
    There are recognised benefits of shifting our application security concerns closer to developers. We ...
  5. Theatre 1
    Handling file uploads and processing URLs should be easy, right? Well, it turns out there are many t ...
  6. Theatre 2
    Websites sit at the forefront of customer to business interactions online – while simultaneously pro ...
Data protection, encryption and privacy
BigID logo
  1. Theatre 1
    Data Protection is a crucial element to be considered when outsourcing to cloud service providers. T ...
  2. Theatre 2
    The (relatively) new era of Cloud, Microservices architecture, and distributed data stores, brings a ...
  3. Theatre 1
  4. Theatre 2
  5. Theatre 2
    With data breaches becoming a norm, the demand for greater accountability continues to sky-rocket. W ...
Governance, risk management and compliance
IRM
  1. Theatre 1
    In a world of quantitative and qualitative measure of cyber risk, there is a question around which m ...
  2. Theatre 2
    Nigel Gibbons – Associate Director & Senior Advisor leading the NCC Group Cloud Security Practice, w ...
  3. Theatre 2
    Review the drivers and challenges organizations face when managing third-party vendor risk Identify ...
  4. Theatre 1
    In an industry that has no rules, no beginning, or end is key - how can you build your infinite game ...
  5. Theatre 2
    With increased focus on cyber security from boards, senior management and investors, security teams ...
Security strategies and zero-trust
Cloudflare
  1. Theatre 4
    With technology providing the opportunity for employees to work from anywhere and on any device, the ...
  2. Theatre 3
    In this seminar, Jeremy will present an introduction to leading strategies for managing cloud at sca ...
  3. Theatre 4
  4. Theatre 3
      With the rise of the use of CI/CD pipelines how can we assure that the code we are deploying is se ...

Sponsors

Diamond Sponsor

  • Sophos

Headline Sponsor

  • IBM

Lead Sponsor

  • Oracle

Keynote sponsor

  • Eset
  • Menlo security

 

Theatre sponsors

  • IMSM
  • appcheck
  • Manage engine
  • Trend Micro
  • Crowdstrike
  • AppGate

 

Platinum Sponsor

  • Tresorit
  • Barracuda
  • CrowdStrike
  • cloudflare
  • KnowBe4

Stream Sponsors

  • BigID
  • Bitdefender
  • Sophos
  • Cloudflare
  • snyk

 

Stream Sponsors

  • McAfee
  • IRM
  • DarkTrace
  • Sophos

Gold Sponsors

  • Darktrace
  • Distology
  • Heficed
  • Egnyte
  • DivvyCloud
  • Whitesource
  • Exclusive Networks
  • vm ware- carbon black

Gold Sponsors

  • Esentire
  • TripWire
  • Wandera
  • IRM
  • NCC Group
  • SafeGuard Cyber

 

Silver Sponsors

  • Global SIgn
  • Code42
  • illumio
  • VeraCode
  • Locke & Mccloud

 

Silver Sponsors

  • Istorage
  • Neustar
  • Owl

 

Silver Sponsors

  • SOTI
  • cloudbric
  • PCYSYS
  • SentinelOne

 

Partners

Security Education Partner

  • ISC2

 

Event Partner

  • CyberSecurotyJobsite

 

Event Partner

  • Crest
  • tech HQ
  • cisco

 

Media Partner

  • CIO Applications
  • Jicara

 

Media Partner

  • CIO Net
  • Frontier Enterprise

 

Media Partner

  • Cyber Defense Magazine
  • Cyber Security Europe
  • Elite Business Magazine

 

Media Partner

  • Computing Security
  • Network computing
  • Storage magazine

 

Media Partner

  • CPO Magazine
  • Brilliance security magazine

 

Media Partner

  • UK Cyber Security Association
  • Digital agency network

 

Media Partner

  • Silicon
  • Tech Target

 

Media Partner

  • Start up city
  • Gigabit

 

Media Partner

  • Admin Magazine
  • DevOps Online

 

Media Partner

  • Alphr.com
  • Cloud pro

 

Media Partner

  • channel pro
  • IT Pro

 

TV Partner

  • disruptive live