Programme Snapshot

Curious for what's in store?

Our conference programme will be live in January, but here's a quick taste of some of our sessions confirmed for Cloud & Cyber Security 2022...

Creating a security-first culture

A security-first culture is one where everyone in your organisation shares responsibility for identifying threats and avoiding risky practices. Non-technical employees take an active role in protecting the company’s data and follow best practices in all their activities. But how do you change a company’s culture and ingrain these behaviours into the mindset of hundreds or even thousands of staff? In this panel discussion, we explore techniques and strategies to change people’s relationships with cybersecurity and ensure they consider it in everything they do. You will learn:
• How to make the case for a culture change
• Tips for communicating cybersecurity best practices
• How to use incentives and rewards to instil culture change
• Ways to encourage changemakers
• Gamification, training and other methods

Zero Trust: How to get started?

Zero Trust is becoming the de facto security model for organisations that are operating in the cloud. It assumes that no device can be trusted, and multifactor authentication is required each time a device tries to connect to your network. This requires a very different mindset to security models in legacy systems and means IT departments and end-users must learn to connect to corporate content in a very different way. Aimed at those who are new to the Zero Trust model, this panel discussion will introduce you to:
• A working definition of what Zero Trust means
• Key principles of the Zero Trust model
• How to design a Zero Trust model that’s secure yet user friendly
• Ways to monitor the effectiveness of your model
• Overview of vendors and solutions

How does Zero Trust sit with your legacy systems?

The Zero Trust model is ideal for digitally transformed, cloud-first organisations. You can monitor and protect modern hardware and software with sophisticated security measures. However, if you’re still running critical applications on legacy systems, it can be much more complex to integrate them into the Zero Trust model. Unpatched legacy infrastructure is a weak point that malicious actors will exploit. In this discussion, our panel experts look at how companies can apply Zero Trust principles to legacy systems. You’ll learn about:
• The challenges of legacy systems for Zero Trust
• How to identify and map legacy systems
• How to create security policies for these endpoints
• How to use micro-segmentation

Cloud cybersecurity in a hybrid working world

The cloud is, in many ways, the perfect technology to support a hybrid workplace, with staff connecting to enterprise systems as seamlessly from home as they do at the office. But this opens up several new fronts for your networks to be breached. Be that an employee’s weak password on their home internet router, physically losing hardware while travelling between home and the office, or ‘switching off’ from safe security behaviours when working away from the office. This panel will look at the issues:
• What the threats associated with hybrid working are
• Simple protocols to reduce the risks
• Social aspects of security with hybrid working
• How to communicate best practices and expectations

How to make working with third-parties safer

Giving third parties access to your systems is an increasingly common and valuable business practice – be that a freelancer working on designs, a contractor writing code or a partner company you’re collaborating with on a project. But breaches associated with third party access are on the rise. Your partners might not have the same security standards as you, and malicious actors can exploit them as a weak point in your systems. A focus on identity is the most effective way of validating third parties each time they and their devices log onto your system. In this conversation, we’ll explore:
• The current threat landscape with third party data breaches
• Assessing the security of your third-party connections
• What to focus on when reviewing your vendor management process
• How to have secure partner connections from onboard to offboard

2025 Sponsors

Gold Sponsors


 

Theatre Sponsors


 

Platinum Sponsor


 

2025 Partners

Media partner

excel london

Media partner

cybersecurity jobsite

Media partner

cyber security council

Media partner

WiCyS logo

Media partner

ISC2 logo

Media partner

she can code