SPEAKERS

SAMPLE OF KEYNOTE SPEAKERS AND THEIR CASE STUDIES

Matt LEMON

CISO

CASE STUDY / DAY 1

The Role of Zero Trust Security Model in Cyber Security

In most modern enterprise environments, corporate networks consist of multiple interconnected segments, cloud-based services and infrastructure, connections to remote and mobile environments, and increasingly, connections to non-conventional IT, such as IoT devices. The traditional approach of trusting devices within a perceived corporate perimeter, or devices connected to it via VPN, makes less sense in such highly diverse and distributed environments. The zero trust approach advocates mutual authentication, including checking the identity and integrity of devices irrespective of location, and providing access to applications and services based on the confidence of device identity and device health in combination with user authentication. The main concept behind zero trust is that devices should not be trusted by default, even if they are connected to a managed corporate network such as the corporate LAN and even if they were previously verified.

  • What is Zero Trust?
  • How can it benefit organisations?
  • What are some best practice implementations?
  • What are the key points gotcha’s?
CASE STUDY / DAY 1

“The Eye of the Cyber” with Mastercard

As we seek to protect our digital ecosystem and operational integrity from the cyber attacks and data breaches, organised criminal groups and nation states continue to perform targeted and persistent reconnaissance against our network. Recent events have demonstrated the critical nature of third-party compromise and how we must improve our third-party risk management, increase our cyber resilience and proactively address those vulnerabilities that exist, in order to secure out networks.

  • Safeguarding an evolving ecosystem goes beyond protecting the transaction
  • Identification, Automation, Prioritisation & Mitigation
  • Cyber Resilience superseding Cyber Security

Steven BROWN

Director, Cyber Security

SUMMIT WILL HOST SPEAKERS FROM THE WORLD’S LEADING COMPANIES

Matt LEMON

CISO

CASE STUDY DAY 1

The Role of Zero Trust Security Model in Cyber Security

In most modern enterprise environments, corporate networks consist of multiple interconnected segments, cloud-based services and infrastructure, connections to remote and mobile environments, and increasingly, connections to non-conventional IT, such as IoT devices. The traditional approach of trusting devices within a perceived corporate perimeter, or devices connected to it via VPN, makes less sense in such highly diverse and distributed environments. The zero trust approach advocates mutual authentication, including checking the identity and integrity of devices irrespective of location, and providing access to applications and services based on the confidence of device identity and device health in combination with user authentication. The main concept behind zero trust is that devices should not be trusted by default, even if they are connected to a managed corporate network such as the corporate LAN and even if they were previously verified.

• What is Zero Trust?
• How can it benefit organisations?
• What are some best practice implementations?
• What are the key points gotcha’s?

Steven BROWN

Director, Cyber Security

CASE STUDY DAY 1

The Eye of the Cyber” with Mastercard

As we seek to protect our digital ecosystem and operational integrity from the cyber attacks and data breaches, organised criminal groups and nation states continue to perform targeted and persistent reconnaissance against our network. Recent events have demonstrated the critical nature of third-party compromise and how we must improve our third-party risk management, increase our cyber resilience and proactively address those vulnerabilities that exist, in order to secure out networks.

• Safeguarding an evolving ecosystem goes beyond protecting the transaction
• Identification, Automation, Prioritisation & Mitigation
• Cyber Resilience superseding Cyber Security

Istvan RAGO

Head of Digital Security

CASE STUDY DAY 2

How COVID-19 Changed Trends and Methods of Cyber Fraud in Online Banking

Customers of online banking solutions have always been in the focus of fraudsters. COVID-19 has fundamentally changed life and criminals also adjusted methods and tools they use in order to maximise their financial gain.

• Pre-COVID cyber fraud landscape
• Methods for deception
• Techniques used for the actual fraud
• Possible approaches for defence

Joyce RODRIGUEZ

Head of Cyber Threat Prevention

CASE STUDY DAY 2

The Role of Data Analytics in Cyber Security

The speaker intends to talk about the importance of collecting data, enriching data, the use of AI/ML technologies together with data science skills to build advanced cyber prevention and detection capabilities.

• What data do we collect?
• How do we determine the use cases for the data?
• How do we use AI/ ML to process large volumes of data with examples?

Nir CHERVONI

Head of Data Security

CASE STUDY DAY 2

Data Protection in The New Era – Effective Approach

The new era of cloud, Microservices architecture, and distributed data stores, brings a different security risk which is more challenging to mitigate, mainly at scale – at least from a practical standpoint. In this session, we will review the data security challenges in the new era, potential risk mitigation strategies and tactics, and how to approach it effectively.

• Short historical review
• Data dimensions
• Key data security challenges in cloud
• Data security tactics and techniques
• Conclusions

Istvan RAGO

Head of Digital Security

CASE STUDY / DAY 2

How COVID-19 Changed Trends and Methods of Cyber Fraud in Online Banking

Customers of online banking solutions have always been in the focus of fraudsters. COVID-19 has fundamentally changed life and criminals also adjusted methods and tools they use in order to maximise their financial gain.

  • Pre-COVID cyber fraud landscape
  • Methods for deception
  • Techniques used for the actual fraud
  • Possible approaches for defence
CASE STUDY / DAY 2

The Role of Data Analytics in Cyber Security

The speaker intends to talk about the importance of collecting data, enriching data, the use of AI/ML technologies together with data science skills to build advanced cyber prevention and detection capabilities.

  • What data do we collect?
  • How do we determine the use cases for the data?
  • How do we use AI/ ML to process large volumes of data with examples?

Joyce RODRIGUEZ

Head of Cyber Threat Prevention

I liked the distribution, variety of the topics and the quality of the presentations

Group Chief Information Security Officer at Commerzbank

Event programme

Fill your details in the form and we will
send you the whole brochure filled with all details

Your copy of the brochure is prepared.

Inside you will find

  • What keynote speakers will be taking part in the exclusive speaking panel
  • What Case Studies will be discussed by our senior corporate speakers
  • The minute by minute breakdown of the conference