CSE London Conference 2022

Subpage Hero



Cyber strategies: How to make working with third-parties safer

02 Mar 2022
Cloud Security Theatre 1
Cyber Resilience
Cyber strategies: How to make working with third-parties safer

Giving third parties access to your systems is an increasingly common and valuable business practice – be that a freelancer working on designs, a contractor writing code or partner company you’re collaborating with on a project. But breaches associated with third party access are on the rise. Your partners might not have the same security standards as you, and malicious actors can exploit them as a weak point in your systems. A focus on identity is the most effective way of validating third parties each time they and their devices log onto your system. In this conversation, we’ll explore:


·       The current threat landscape with third party data breaches

·       Assessing the security of your third-party connections

·       What to focus on when reviewing your vendor management process

·       How to have secure partner connections from onboard to offboard

Paul Harragan, Associate Partner, Cybersecurity, UK&I Transaction Strategy and Execution - EY Parthenon
Vladimir Krupnov, Threat Intelligence Lead - Revolut
Matt Kay, Deputy DPO - Metro Bank
Henrik Kietzer, Head of IT Operations (Cyber Security and Infrastructure) - National Trust
Richard Davis, Head of Cyber Security Strategy EMEA - Netskope

2022 Sponsors

Tech Show London Headline Sponsor

  • IBM


Tech Main Stage Sponsor

  • Oracle


Diamond Sponsor

  • Threatlocker


Stream Sponsors

  • eSentire
  • Appgate
  • Checkpoint


Theatre Sponsor

  • Netskope
  • Sysdig


Platinum Sponsors

  • Aqua
  • Darktrace
  • Sentinel One
  • Snyk
  • Trend Micro
  • Forcepoint


Gold Sponsor

  • Crowdstrike
  • Orca Security


Silver Sponsor

  • Sectigo


2022 Partners

Media Partner

  • Linux Magazine
  • ADMIN Magazine
  • CyberSecurityJobSite.com
  • Elite Business
  • Top Business Tech
  • Cloud Industry Forum
  • ISACA London Chapter


Media Partner

  • Computing Security
  • CIOCoverage
  • TechUK
  • Packt


Media Partner

  • Crest
  • Paybis
  • CEX.io
  • Cyber Defense Magazine
  • CIOInsights
  • Computer Weekly


Security Education Partner

  • ISC2


Media Partner

  • Electronic Specifier
  • Startups Magazine
  • Enterprise Security Magazine
  • Trusted Computing Group
  • EM360


  • Soc.Os
  • Probely
  • Forcepoint

Subscribe to our newsletter!