29TH & 30TH JUNE 2 0 2 1 VIRTUAL EVENT
www.cybereason.com
We’re delighted that you have chosen to join us at the virtual Security IT Summit – a unique event, tailor-made to meet your individual requirements. We have carefully planned out your itinerary to ensure your time here is worthwhile: Connect with businesses relevant to your current and forthcoming projects in our matchmade one-to-one meetings.
6
4
9
Seminars
Our Partners
Delegates
How It’s Done, And What To Look Out For Peaks and Pitfalls – 3 decades of IT, InfoSec and Data Protection
11 Supplier Directory
Hosted by
Contact Us: 01992 374100 James Howe
j.howe@forumevents.co.uk
Senior Sales Manager
securityitsummit.co.uk
DIARY DATES Smarter Payments Summit 8th September 2021 - Hilton London Canary Wharf 8th March 2022 - Hilton London Canary Wharf Total Security Summit 12th & 13th October 2021 - The Queens Hotel, Leeds Security IT Summit 4th November 2021 - Hilton London Canary Wharf Hospitality Tech & Innovation Forum 27th January 2022 - Hilton London Canary Wharf
@SecIT_Summit #SITSummit
Partners & Supporters
4
UNIQUE EVENT FOR THE CYBERSITSSECURITY SECTOR NOVEMBER AD 4th November 2021 Hilton London Canary Wharf The Security IT Summit is a hybrid event which continues to follow the award-winning structure of pre-arranged one-to-one meetings between IT and Cyber Security professionals, and leading industry solution providers. Virtual attendance options are available. Free for industry buyers to attend.
James Howe 01992 374096 j.howe@forumevents.co.uk
securityitsummit.co.uk
SEMINARS TUESDAY 29TH JUNE 2021
09.00 – 09.30
How It’s Done, And What To Look Out For I will relate my story, utilising anecdotes and stories to show how I managed it, as well as giving advice on how to avoid being a victim. Ex-fraudster Elliot Castro spent £2 million of other people’s money. Reformed by jail time, he now advises major companies on risk and how to avoid being scammed. Elliot relates the systems he used on both the card companies and individuals and demonstrates how human nature makes forms of manipulation so easy to achieve.
Elliot Castro Owner, EC Consultancy
WEDNESDAY 30TH JUNE 2021 09.00 – 09.30
Peaks and Pitfalls – 3 decades of IT, InfoSec and Data Protection After a background in IT, and a further 15 years as an InfoSec professional at a large, global systems integrator and consultancy, I moved to a small but rapidly growing company with their own challenges around security and compliance. 2½ years later, this is a review of that experience: how I got here; the highs and lows; challenges and learning experiences. A cautionary tale, or an inspiration – you decide! With around 30 years working in IT, and over half of that focussed on information security, Tim is an experienced information security consultant, advocating a businessled approach to risk awareness, data protection and threat mitigation.
TIm Burnett Security & Compliance Manager / DPO, Sykes Holiday Cottages
6
Work is an activity ty, ty y, not a place – now more than ever. Quickly and simply secure your entire workforce, wherever they are. Stop sophisticated attacks before they enter the kill chain Save time and money with consolidated security services 100% cloud-based, accelerating time to value
SECURE REMOTE WORKING
CONSOLIDATED CLOUD SECURITY IN A SINGLE PLATFORM
AUTONOMOUS SECURITY ENGINE
www.censornet.com | +44 (0) 845 230 9590 | sales@censornet.com
Cyber Defense Magazine AD
DELEGATES
Admiral Recuritment
CTO
Avanti Communications
Head of Information Security
BehaviourLab
CIO
Bestway Retail
Head of IT
Blue Sky Building
IT Manager
BMCE Bank International
IT Infrastucture, Security & Cyber Security Manager
BNP Paribas
Group Head of Risk Domains (Cyber & Technology) Risk Manager
BSI
CISO
Clifford Chance
Senior Cyber Security Analyst
Crowe U.K. LLP
Senior Manager IT Audit
Cushman & Wakefield
Global Deputy CISO
Diabeties UK
Head of IT
Ercol Furniture
IT Manager
Hiscox
IT Vendor Manager
HMRC
Cyber Security Specialist
HSBC
Digital Risks & Controls Manager
Johnnie Johnson Housing
IT Technical Services Manager
Jigsaw Insurance Service LTD
IT Service Delivery Manager Systems Administrator
Leadec
IT Manager
Mastercard
Security Monitoring and Repsonse Manager
MBDA
CISO Senior Cyber and Information Security Manager
Nord Anglia Education
Global Head of Cybersecurity
North West London CCG (NHS)
Head of Client Systems
Pannone Corporate
IT Manager
RSA
Senior Cyber Programme Manager
Sanne
Group Head of Information Security
Scrutton Bland
IT Director
Spotlight Sports Group
CSO & Enterprise IT Director
Swan Housing
IT Business Partner IT Security & Change Manager
The Nuffield Trust
IT Manager
UBS
Senior Threat Intel Analyst
Watson Farley & Williams
Global Head of IT Services and Information Governance
Workspace Group PLC
Head of IT Operations
Wrekin College
Head of Computer Science
9
INTERESTED IN ADVERTISTING? Do you want to reach senior Security industry professionals and key buyers quickly and easily? Security Briefing is an industry resource delivering up to date content, news and topical discussion from across the industry, directly to the people who matter – through a dedicated online portal and a fortnightly email newsletter to 5,600 subscribers.
briefing ad
Security Briefing puts you in front of a cross section of senior buyers from the Security marketplace, including; Security Director / Manager, Loss Protection Director / Manager, Procurement Director / Manager and Business Continuity Director / Manager. Start working with Security Briefing today to publicise your company, products and services.
CONTACT US For further information on how you can promote your For further information on how youspeak can promote your services within this platform, please to Courtney services within this374088 platform, please speak to James Howe Saggers on 01992 or email on 01992 374067 or email j.howe@forumevents.co.uk c.saggers@forumevents.co.uk
totalsecuritysummit.co.uk/briefing
SUPPLIER DIRECTORY Accedian
07784 683193 / cmanta@accedian.com / accedian.com Accedian Skylight powered Security is a behavior-based intrusion detection solution. It gives you the data and visibility needed to detect real-time suspicious, malicious, and anomalous behaviors. Skylight provides a single source of truth for critical IT assets in the enterprise core, datacenter, and hybrid cloud architectures, monitoring every user, database, transaction, and packet with in-depth precision and unrivalled accuracy. With Skylight, your team can detect advanced, targeted cyber breaches and other evasive attacks that are notably more difficult for organizations to find and prevent. Protect your organization with economically viable visibility across ALL attack surfaces. The same Skylight sensors providing 100% visibility into all transactions, users, and applications are also the basis of our network performance monitoring and diagnostics solution. Accedian provides full-stack unified network and application monitoring (SaaS) and performance analytics for improved experience visibility and problem resolution; for physical, hybrid, and cloud environments.
Censornet
0845 230 9590 / ali.yates@censornet.com / censornet.com With accelerated adoption of cloud technologies, a cloud security product that seamlessly protects users across core attack vectors, providing robust security wherever the user is, while also simplifying management and improving 360-degree visibility, is more imperative for organisations, than ever. Censornet is the leading force in innovative and automated cloud security, offering robust consolidated solutions for organisations of all sizes. Flexible, scalable, and easy to implement, we protect users no matter where they are. Our cloud security platform integrates email and web security, cloud access security broker (CASB) and adaptive multi-factor authentication (MFA), enabling our Autonomous Security Engine (ASE) to go beyond alert driven security and into real-time automated attack prevention, 24x7, 365 days a year.
Conosco
07917 247947 / mike.hooper@conosco.com / conosco.com Conosco is an industry-leading technology expert helping our clients navigate digital and workplace transformation. With cyber attacks becoming more frequent and sophisticated, cyber security is top of many businesses’ priority lists. With over 20 years of experience, our team of security experts will help you navigate the vast threat landscape and meet regulatory requirements, as well as build a robust security strategy and roadmap to combat risk. Our goal is to deliver IT security that is focused on your business needs, proportionate to the threats you face and aligned to the way that you work. Our holistic portfolio of solutions includes: • • • •
Strategic Consulting & Leadership - vCISO, vCIO, vCTO and vDPO 24/7 IT Managed Services & Security Operations Centre IT Professional Services - Microsoft, AWS, Cloud, Networking Information & Cyber Security Solutions
11
SUPPLIER DIRECTORY Cybereason UK Ltd
07875 134440 / nixonkate@btinternet.com / cybereason.com Who we are. Cybereason is the champion for today’s cyber defenders with future-ready attack protection that extends from the endpoint, to the enterprise, to everywhere What we do. Detection in Seconds, Remediation in Minutes How we do it. Our platform combines intelligence-based threat blocking and NGAVbased behavioural and machine learning techniques to prevent known and unknown threats for prevention, detection, and response across the network, cloud infrastructure, and productivity suites.
Darktrace
01223 394100 / anastasia.putt@darktrace.com / darktrace.com/en Darktrace is a leading autonomous cyber security AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 4,700 organizations to protect against threats to the cloud, email, SaaS, traditional networks, IoT devices, endpoints, and industrial systems. The company has over 1,500 employees and is headquartered in Cambridge, UK. Every second, Darktrace AI fights back against a cyberthreat, before it can cause damage.
e2e-assure
07904 556855 / dan.young@e2e-assure.com / e2e-assure.com At e2e, we believe that passionate and diverse people are key to creating and evolving a world-class security operation. We do this through hiring great people and investing in them throughout their careers at e2e with 20% of their time devoted to professional development. We build processes around them with our expert cyber consultants, taking into account priorities and nuances of customer networks. All of ours and our customer’s people are supported by our in-house developed technology, Cumulo, delivering alerts as a single pane of glass, automating the mundane & allowing complete transparency with our customers. We don’t buy into technology being a silver bullet to improve your cybersecurity and as a result of this, save many customers money through improving their cyber maturity, not plugging gaps with the latest tech. These principles support all of our SOC services, from simple SIEM-as-a-service to hybrid SOCs and full outsourced models.
12
SUPPLIER DIRECTORY EveryCloud
0207 8872 825 / liz.shah@everycloud.co.uk / everycloud.co.uk Optimise your Cloud BackUp solutions with EveryCloud, in partnership with Acronis With over 20 years’ experience, EveryCloud Ensures that your business systems stay protected. It’s especially important now - remote working has become a way of life, and it’s crucial that system stability comes first. Partnering with Acronis, we help businesses improve security and avoid downtime, whilst eliminating complexity and reducing cost. We help you modernise your Cloud BackUp with a complete integrated solution. Acronis Cloud BackUp is the only solution that natively integrates cyber security, data protection and management to protect endpoints, systems and data. Integration and automation provide unmatched protection – increasing productivity while decreasing TCO. Make sure you avoid downtime, protect data, improve security and reduce costs. Talk to us or visit our website.
Helpsystems Data Security
08456 434 063 / Emily.Stephens@handd.co.uk / handd.co.uk HelpSystems is a software company focused on helping organisations Build a Better IT™. Our cybersecurity and automation software simplifies critical IT processes to give customers peace of mind. We know IT transformation is a journey, not a destination. For IT and security leaders looking for data visibility and control, HelpSystems Data Security offers integrated, automated data security solutions to keep sensitive data safe. No matter where data is stored or moved, threats are minimised and compliance is maintained. Our suite supports data protection across the data lifecycle, including data classification, email security, secure file transfer and collaboration, and encryption. In partnership with HANDD Business Solutions, an independent specialist in data security. Working with market leading vendors such as Helpsystems HANDD delivers solutions that protect data through every aspect of its journey including classification, managed file transfer, identity access management, data loss prevention, data governance, encryption, incident response, vulnerability and UEBA.
iomart
01419 316400 / chris.lindsay@iomart.com / iomart.com iomart is a cloud computing and IT managed services business providing hybrid cloud infrastructure, network connectivity, security and digital workplace capability. That sounds like a lot, but our mission is simple: to make your business unstoppable by enabling you to connect, secure and scale anywhere, anytime.
14
SUPPLIER DIRECTORY LastPass by LogMeIn
0800 640 4005 / natasha.griffin@logmein.com / lastpass.com For more than 47,000 businesses of all sizes, LastPass reduces friction for employees while increasing control and visibility for IT with an access solution that’s easy to manage and effortless to use. From single sign-on and password management to adaptive authentication, LastPass gives superior control to IT and frictionless access to users. For more information, visit www.LastPass. com . LastPass is a trademark of LogMeIn in the U.S. and other countries.
Neustar UK Limited
01784 448 444 / ken.woods@team.neustar / security.neustar Neustar is at the forefront of protecting online businesses from all types of cyberattacks through robust security solutions. For over 12 years, the company has been leveraging their expertise to deliver industryleading solutions in Marketing, Risk, Communications and Security that responsibly connect data on people, devices, and locations, continuously corroborated through billions of transactions. To ensure 100% website availability for our clients, our enterprise-grade UltraDNS solution is a managed authoritative DNS service with built-in security for superior protection. To protect both applications and networks of an enterprise from denial-of-service attacks, the company offers UltraWAF and UltraDDoS Protect. Additionally, Neustar’s IP Intelligence Services, including UltraGeoPoint and UltraThreat Feeds, help organizations identify and block fraudulent transactions, enabling them to drive better business decisions through powerful and predictive insights. As these services are cloud-based, they can be easily configured individually or together to best suit the customer’s needs.
Remediant Inc
07469 202 868 / keithcs@remediant.com / remediant.com Remediant was founded in response to a growing need to secure privileged accounts in the most relevant and innovative way. Because most data breaches involve compromised privilege accounts, our team understood the crucial role privilege access play in security. While some of our competitors have built their solution on the concept of a password vault, SecureONE is the first PAM (privileged access management) solution to utilise the concepts of agent-less and vaultless workflows into a streamlined, user-friendly approach.
15
SUPPLIER DIRECTORY Varonis
07825 564204 / hsumpter@varonis.com / varonis.com Varonis is a pioneer in data security and analytics, specializing in software for data protection, threat detection and response, and compliance. Varonis protects enterprise data by analyzing data activity, perimeter telemetry, and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.
NOTES
16
Complete Office 365 Protection with Acronis Cyber BackUp Cloud
Fast recovery even after permanent deletion in O365
Convenient cloud-to-cloud solution with nothing to install
Quick access to backup data via comprehensive search
Reliable point-in-time recovery of single files & entire sites
Simple, affordable per-user pricing with no upfront costs for cloud BackUp
Multi-tenant, multi-tier solution that's made for simple administration of business units
Visit https://www.everycloud.co.uk/protect/cloud-backup/ for more information
NOTES
18
It's not a fair game
Cyber criminals will use AI to supercharge their moves. New technological innovations are helping drive stealthier, faster and more effective cyber-attacks, which blend into background activity. Learn how to fight AI - with AI. darktrace.com
Cyber Resiliency Suite Mapped to Adaptive Security Framework Cyber resiliency: Consulting & advisory for C-suites and boards, penetration test/ethical hacking/vulnerability assessment
Preventive services: DevSecOps, vCISCO and security hardening
Adaptive Security Framework
Policy Predict ∙ Access risk/prioritize exposure ∙ Anticipate threats/ attacks ∙ Baseline systems & security posture
Adjust posture Adjust posture
Implement posture
Continuous visibility & assessment
Respond
Prevent ∙ Harden systems ∙ Isolate systems ∙ Prevent attacks
∙ Remediate ∙ Design/model policy change ∙ Investigate incidents/ conduct retrospective analysis IR plan definition: Reporting, training, and recommendations as business practices evolve & digital transformation occurs
accedian.com
Monitor posture
Detect ∙ Detect incidents ∙ Confirm & prioritize risk ∙ Contain incidents
Managed detection & response orchestration and automation