Streams

CCSE

Following on from our first round of rigorous industry research, we are delighted to present our new streams for 2020:

Application security and DevSecOps

Application security needs to be made an integral part of the full software development lifecycle, which is easier said than done. A DevSecOps approach will also support application security but what processes, tools and automation are needed to achieve this? This stream will explore the key components of this, including security auditing, penetration testing, threat modelling, design reviews and security unit testing. How can we achieve agility as well as share the responsibility for security business-wide? Also considered will be the rising serverless trend, its impact, and the demand for expertise as the lines between infrastructure and applications blur.

Threat detection, intelligence and response

With cyber threats becoming increasingly frequent and sophisticated in nature, we need to use an intelligence driven approach to ensure we are one step ahead. Gain insight into organisations who have already adopted machine learning for both threat detection and intelligence. Learn about deploying various methods to cover the scope of attacks, adjusting to new threats and determining a heat map of where to concentrate business efforts. Join us as we break the stigma around cyber attacks and finally hear from those unfortunate enough to have suffered a significant breach. How best can we respond when faced with a threat and effectively protect our data, all whilst minimising the associated financial and reputational repercussions?

Sponsored by: 

 Sophos

Automation, AI and ML security

Hackers have typically been ahead of the game using automation, AI and RPA to circumnavigate security protocols. But these technologies are now allowing organisations to fight back. From deep learning, including NLP, machine learning for fraud detection and many others, there is a growing demand for solutions to detect hackers and spot system vulnerabilities. However, AI is also subject to bias. As we’ve already seen in the US, an AI algorithm to predict the likelihood of criminals reoffending was proven to be biased towards black people. How do we tackle this and should we combine decision making with human capabilities and common sense?

Sponsored by: 

 Darktrace

Data protection, encryption and privacy

After recent high profile attacks, customers are understandably more concerned and businesses are under increasing pressure to adapt to growing expectations and regulation. Most organisations already have, or are in the process of implementing their security strategy. How do we ensure this is continuously monitored and updated and how do we highlight the importance of the fundamental basics that underpin this. As organisations continue to grapple with GDPR and other personal data regulations, there is greater demand for accountability, especially when used for commercial gain. Get insight into how to reach your business objectives whilst maintaining customer trust. Also we will explore encryption including cryptography and highlight how to protect and encrypt data you’ve not been made aware of.

Governance, risk management and compliance

GRC represents the foundation of a true security strategy, yet we need to balance this with business objectives and user experience. Also holding data in the cloud, in the wake of GDPR, has highlighted the lack of awareness from companies on how this is regulated, their responsibilities and how to ensure they are compliant. As businesses expand globally, they are also faced with contrasting regulatory landscapes. We will explore not only GRC trends and tools but in addition how we can work together with third parties and stakeholders to mitigate risk and ensure compliance.

Sponsored by: 

IRM Security

Securing network environments

Let’s talk about vulnerability. To protect your network, multiple lines of defense are required. Securing this is not just part of your ‘to-do list’, it should be considered at every stage of the security lifecycle. Rising trends such as BYOD workforces and remote working pose a huge threat. How can all of these devices interact and communicate securely? From firewalls and antivirus software to data encryption and VPNs for the mobile employee, the importance of individual security responsibility is increasingly a top priority. Alongside the shift to cloud computing, the growth in device numbers blurs the line and risks of where business data lives and who is responsible for it. Join the discussion on how best to navigate our network vulnerabilities and identify appropriate measures for detection, prevention and response.

Sponsored by: 

 Bitdefender

Enterprise cloud security

Cloud services are swiftly becoming the norm in enterprise IT. The majority of organisations have moved at least one application or part of their computing infrastructure, embracing the flexibility and scalability cloud offers. But how do we tackle cloud security in hybrid and multi environments and who’s responsible for what? With recent cases of cloud downtime, are you at risk of a 3rd party data breach and if faced with an outage, what is your contingency plan to continue “business as usual”? Let’s get to grips with how to secure our diverse IT infrastructure and achieve a centralised overview to identify gaps in security.

Sponsored by: 

 McAfee

IoT security, privacy and trust

IoT devices continue to be a prime target for cyber attacks, yet security and privacy have been often overlooked. The accelerating number of cyber threats has been encouraged by the growing number of connected IoT devices, and the lack of industry-wide standards. With the adoption of IoT supporting the likes of driverless cars, smart homes and virtual assistants, it is becoming increasingly difficult to secure the sheer amount of data generated. From misinformation in hospitals to malfunctioning autonomous vehicles, the risk of attacks goes far beyond data loss and the business repercussions associated with this; people’s lives are at stake. Join the discussion on the tools and approaches to prevent this and how to drive industry standards to foster consumer trust.

Privilege, Identity and Access Management

Operational silos, multiple data platforms and increasing numbers of devices, creates inevitable obstacles in identity and access management. Without a thorough strategy in place, the risks to enterprise security and compliance are high. We want to have the right data accessible to the right people, at the right time, but how do we implement this? Join us to discuss the key IAM trends including next-generation adaptive access services, PAM, blockchain-enabled & decentralised identities. 

Security strategy and leadership

Employees can be our weakest link, as all too often the target for malicious cyber attacks. Alongside this, unsurprisingly, the growing regularity of high-profile attacks is raising C-suite concern about enterprise security policies. In short, security needs to be central to company culture. The question is how do we promote strategic collaboration and actively raise security awareness throughout the enterprise? How do we recruit skills for the future and upskill roles that can be in part automated? And, what is the role of you, the CISO, in all of this? In a fast-paced, global, technology environment training is required at all levels of the organisation. This stream will be a forum to discuss these obstacles and tackle the overarching issue of the increasing industry skills gap.

If you’re interested to present your story within one of the above streams, click the button below and complete the form:

Present at CCSE

Our 2020 stream sponsors include:

bitdefender      Darktrace         McAfee     Sophos    IRM Security

Latest News

  • 05-Dec-2019
    10:26

    The NSPCC has warned Facebook that it risks becoming a “one-stop grooming shop” if it presses ahead with plans to encrypt across all its messaging services. Facebook is considering end-to-end encryption on Facebook Messenger and Instagram Direct – on top of WhatsApp, which is already encrypted – but there has been a deep concern that the move could prevent child abusers from being caught.

    The post Facebook to become a ‘one-stop grooming shop’ warns NSPCC ahead of proposed encryption plans appeared first on Techerati.

  • 03-Dec-2019
    12:09

    There is no doubt 5G has the potential to revolutionise the way we interact with the physical and virtual world. Yet, guesstimates of how much of a generational shift in technology it will become range from “super-fast internet at some point” to “minority report-like daily lives.” But for gaming technologies such as Virtual Reality (VR), it’s clear that 5G rollout will be a catalyst in mainstream adoption. 

    Starting with what is usually hyped, we can look at the speeds of 5G. We can probably expect somewhere around 300-1000 Mb/s in the beginning, but there have been tests showcasing speeds towards 25Gb/s in specific environments.  For example, in Mitsubishi Electric and NTT DOCOMO’s 5G Outdoor Trials. In these conditions, it would be about 250 times faster than the average speed of 4G. If we equate this to Usain Bolt’s top sprinting speed (about 44km/h), it means 5G would make a person run at 11,180 km/h, or as fast as the fastest unmanned plane in the world, the Hypersonic aircraft X-43A. 

    The post 5G and gaming: Spotlight on virtual reality appeared first on Techerati.

  • 03-Dec-2019
    11:26

    Lincoln-based startup uses groundbreaking cooling technology coolDC has opened its award-winning data centre in Boole Technology Centre at Lincoln Science and Innovation Park. Launched in 2017, coolDC designs hyper-efficient, environmentally-friendly data centres that use renewable energy and convert surplus heat into energy. In June, the company received a Gold-level Certified Energy Efficient Datacentre Award (CEEDA)... Read More

    The post coolDC opens first data centre in Lincoln appeared first on Techerati.

Sponsors

Diamond Sponsor

Platinum Sponsor

Stream Sponsors


 

Stream Sponsors

Gold Sponsors

Gold Sponsors


 

Silver Sponsors


 

Silver Sponsors


 

Silver Sponsors


 

Partners

Security Education Partner


 

Event Partner


 

Event Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner