Security IT Summit Event Guide

Page 1

29TH & 30TH JUNE 2 0 2 1 VIRTUAL EVENT


www.cybereason.com


We’re delighted that you have chosen to join us at the virtual Security IT Summit – a unique event, tailor-made to meet your individual requirements. We have carefully planned out your itinerary to ensure your time here is worthwhile: Connect with businesses relevant to your current and forthcoming projects in our matchmade one-to-one meetings.

6

4

9

Seminars

Our Partners

Delegates

How It’s Done, And What To Look Out For Peaks and Pitfalls – 3 decades of IT, InfoSec and Data Protection

11 Supplier Directory

Hosted by

Contact Us: 01992 374100 James Howe

j.howe@forumevents.co.uk

Senior Sales Manager

securityitsummit.co.uk

DIARY DATES Smarter Payments Summit 8th September 2021 - Hilton London Canary Wharf 8th March 2022 - Hilton London Canary Wharf Total Security Summit 12th & 13th October 2021 - The Queens Hotel, Leeds Security IT Summit 4th November 2021 - Hilton London Canary Wharf Hospitality Tech & Innovation Forum 27th January 2022 - Hilton London Canary Wharf

@SecIT_Summit #SITSummit


Partners & Supporters

4


UNIQUE EVENT FOR THE CYBERSITSSECURITY SECTOR NOVEMBER AD 4th November 2021 Hilton London Canary Wharf The Security IT Summit is a hybrid event which continues to follow the award-winning structure of pre-arranged one-to-one meetings between IT and Cyber Security professionals, and leading industry solution providers. Virtual attendance options are available. Free for industry buyers to attend.

James Howe 01992 374096 j.howe@forumevents.co.uk

securityitsummit.co.uk


SEMINARS TUESDAY 29TH JUNE 2021

09.00 – 09.30

How It’s Done, And What To Look Out For I will relate my story, utilising anecdotes and stories to show how I managed it, as well as giving advice on how to avoid being a victim. Ex-fraudster Elliot Castro spent £2 million of other people’s money. Reformed by jail time, he now advises major companies on risk and how to avoid being scammed. Elliot relates the systems he used on both the card companies and individuals and demonstrates how human nature makes forms of manipulation so easy to achieve.

Elliot Castro Owner, EC Consultancy

WEDNESDAY 30TH JUNE 2021 09.00 – 09.30

Peaks and Pitfalls – 3 decades of IT, InfoSec and Data Protection After a background in IT, and a further 15 years as an InfoSec professional at a large, global systems integrator and consultancy, I moved to a small but rapidly growing company with their own challenges around security and compliance. 2½ years later, this is a review of that experience: how I got here; the highs and lows; challenges and learning experiences. A cautionary tale, or an inspiration – you decide! With around 30 years working in IT, and over half of that focussed on information security, Tim is an experienced information security consultant, advocating a businessled approach to risk awareness, data protection and threat mitigation.

TIm Burnett Security & Compliance Manager / DPO, Sykes Holiday Cottages

6


Work is an activity ty, ty y, not a place – now more than ever. Quickly and simply secure your entire workforce, wherever they are. Stop sophisticated attacks before they enter the kill chain Save time and money with consolidated security services 100% cloud-based, accelerating time to value

SECURE REMOTE WORKING

CONSOLIDATED CLOUD SECURITY IN A SINGLE PLATFORM

AUTONOMOUS SECURITY ENGINE

www.censornet.com | +44 (0) 845 230 9590 | sales@censornet.com


Cyber Defense Magazine AD


DELEGATES

Admiral Recuritment

CTO

Avanti Communications

Head of Information Security

BehaviourLab

CIO

Bestway Retail

Head of IT

Blue Sky Building

IT Manager

BMCE Bank International

IT Infrastucture, Security & Cyber Security Manager

BNP Paribas

Group Head of Risk Domains (Cyber & Technology) Risk Manager

BSI

CISO

Clifford Chance

Senior Cyber Security Analyst

Crowe U.K. LLP

Senior Manager IT Audit

Cushman & Wakefield

Global Deputy CISO

Diabeties UK

Head of IT

Ercol Furniture

IT Manager

Hiscox

IT Vendor Manager

HMRC

Cyber Security Specialist

HSBC

Digital Risks & Controls Manager

Johnnie Johnson Housing

IT Technical Services Manager

Jigsaw Insurance Service LTD

IT Service Delivery Manager Systems Administrator

Leadec

IT Manager

Mastercard

Security Monitoring and Repsonse Manager

MBDA

CISO Senior Cyber and Information Security Manager

Nord Anglia Education

Global Head of Cybersecurity

North West London CCG (NHS)

Head of Client Systems

Pannone Corporate

IT Manager

RSA

Senior Cyber Programme Manager

Sanne

Group Head of Information Security

Scrutton Bland

IT Director

Spotlight Sports Group

CSO & Enterprise IT Director

Swan Housing

IT Business Partner IT Security & Change Manager

The Nuffield Trust

IT Manager

UBS

Senior Threat Intel Analyst

Watson Farley & Williams

Global Head of IT Services and Information Governance

Workspace Group PLC

Head of IT Operations

Wrekin College

Head of Computer Science

9


INTERESTED IN ADVERTISTING? Do you want to reach senior Security industry professionals and key buyers quickly and easily? Security Briefing is an industry resource delivering up to date content, news and topical discussion from across the industry, directly to the people who matter – through a dedicated online portal and a fortnightly email newsletter to 5,600 subscribers.

briefing ad

Security Briefing puts you in front of a cross section of senior buyers from the Security marketplace, including; Security Director / Manager, Loss Protection Director / Manager, Procurement Director / Manager and Business Continuity Director / Manager. Start working with Security Briefing today to publicise your company, products and services.

CONTACT US For further information on how you can promote your For further information on how youspeak can promote your services within this platform, please to Courtney services within this374088 platform, please speak to James Howe Saggers on 01992 or email on 01992 374067 or email j.howe@forumevents.co.uk c.saggers@forumevents.co.uk

totalsecuritysummit.co.uk/briefing


SUPPLIER DIRECTORY Accedian

07784 683193 / cmanta@accedian.com / accedian.com Accedian Skylight powered Security is a behavior-based intrusion detection solution. It gives you the data and visibility needed to detect real-time suspicious, malicious, and anomalous behaviors. Skylight provides a single source of truth for critical IT assets in the enterprise core, datacenter, and hybrid cloud architectures, monitoring every user, database, transaction, and packet with in-depth precision and unrivalled accuracy. With Skylight, your team can detect advanced, targeted cyber breaches and other evasive attacks that are notably more difficult for organizations to find and prevent. Protect your organization with economically viable visibility across ALL attack surfaces. The same Skylight sensors providing 100% visibility into all transactions, users, and applications are also the basis of our network performance monitoring and diagnostics solution. Accedian provides full-stack unified network and application monitoring (SaaS) and performance analytics for improved experience visibility and problem resolution; for physical, hybrid, and cloud environments.

Censornet

0845 230 9590 / ali.yates@censornet.com / censornet.com With accelerated adoption of cloud technologies, a cloud security product that seamlessly protects users across core attack vectors, providing robust security wherever the user is, while also simplifying management and improving 360-degree visibility, is more imperative for organisations, than ever. Censornet is the leading force in innovative and automated cloud security, offering robust consolidated solutions for organisations of all sizes. Flexible, scalable, and easy to implement, we protect users no matter where they are. Our cloud security platform integrates email and web security, cloud access security broker (CASB) and adaptive multi-factor authentication (MFA), enabling our Autonomous Security Engine (ASE) to go beyond alert driven security and into real-time automated attack prevention, 24x7, 365 days a year.

Conosco

07917 247947 / mike.hooper@conosco.com / conosco.com Conosco is an industry-leading technology expert helping our clients navigate digital and workplace transformation. With cyber attacks becoming more frequent and sophisticated, cyber security is top of many businesses’ priority lists. With over 20 years of experience, our team of security experts will help you navigate the vast threat landscape and meet regulatory requirements, as well as build a robust security strategy and roadmap to combat risk. Our goal is to deliver IT security that is focused on your business needs, proportionate to the threats you face and aligned to the way that you work. Our holistic portfolio of solutions includes: • • • •

Strategic Consulting & Leadership - vCISO, vCIO, vCTO and vDPO 24/7 IT Managed Services & Security Operations Centre IT Professional Services - Microsoft, AWS, Cloud, Networking Information & Cyber Security Solutions

11


SUPPLIER DIRECTORY Cybereason UK Ltd

07875 134440 / nixonkate@btinternet.com / cybereason.com Who we are. Cybereason is the champion for today’s cyber defenders with future-ready attack protection that extends from the endpoint, to the enterprise, to everywhere What we do​. Detection in Seconds, Remediation in Minutes How we do it. Our platform combines intelligence-based threat blocking and NGAVbased behavioural and machine learning techniques to prevent known and unknown threats for prevention, detection, and response across the network, cloud infrastructure, and productivity suites.

Darktrace

01223 394100 / anastasia.putt@darktrace.com / darktrace.com/en Darktrace is a leading autonomous cyber security AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 4,700 organizations to protect against threats to the cloud, email, SaaS, traditional networks, IoT devices, endpoints, and industrial systems. The company has over 1,500 employees and is headquartered in Cambridge, UK. Every second, Darktrace AI fights back against a cyberthreat, before it can cause damage.

e2e-assure

07904 556855 / dan.young@e2e-assure.com / e2e-assure.com At e2e, we believe that passionate and diverse people are key to creating and evolving a world-class security operation. We do this through hiring great people and investing in them throughout their careers at e2e with 20% of their time devoted to professional development. We build processes around them with our expert cyber consultants, taking into account priorities and nuances of customer networks. All of ours and our customer’s people are supported by our in-house developed technology, Cumulo, delivering alerts as a single pane of glass, automating the mundane & allowing complete transparency with our customers. We don’t buy into technology being a silver bullet to improve your cybersecurity and as a result of this, save many customers money through improving their cyber maturity, not plugging gaps with the latest tech. These principles support all of our SOC services, from simple SIEM-as-a-service to hybrid SOCs and full outsourced models.

12



SUPPLIER DIRECTORY EveryCloud

0207 8872 825 / liz.shah@everycloud.co.uk / everycloud.co.uk Optimise your Cloud BackUp solutions with EveryCloud, in partnership with Acronis With over 20 years’ experience, EveryCloud Ensures that your business systems stay protected. It’s especially important now - remote working has become a way of life, and it’s crucial that system stability comes first. Partnering with Acronis, we help businesses improve security and avoid downtime, whilst eliminating complexity and reducing cost. We help you modernise your Cloud BackUp with a complete integrated solution. Acronis Cloud BackUp is the only solution that natively integrates cyber security, data protection and management to protect endpoints, systems and data. Integration and automation provide unmatched protection – increasing productivity while decreasing TCO. Make sure you avoid downtime, protect data, improve security and reduce costs. Talk to us or visit our website.

Helpsystems Data Security

08456 434 063 / Emily.Stephens@handd.co.uk / handd.co.uk HelpSystems is a software company focused on helping organisations Build a Better IT™. Our cybersecurity and automation software simplifies critical IT processes to give customers peace of mind. We know IT transformation is a journey, not a destination. For IT and security leaders looking for data visibility and control, HelpSystems Data Security offers integrated, automated data security solutions to keep sensitive data safe. No matter where data is stored or moved, threats are minimised and compliance is maintained. Our suite supports data protection across the data lifecycle, including data classification, email security, secure file transfer and collaboration, and encryption. In partnership with HANDD Business Solutions, an independent specialist in data security. Working with market leading vendors such as Helpsystems HANDD delivers solutions that protect data through every aspect of its journey including classification, managed file transfer, identity access management, data loss prevention, data governance, encryption, incident response, vulnerability and UEBA.

iomart

01419 316400 / chris.lindsay@iomart.com / iomart.com iomart is a cloud computing and IT managed services business providing hybrid cloud infrastructure, network connectivity, security and digital workplace capability. That sounds like a lot, but our mission is simple: to make your business unstoppable by enabling you to connect, secure and scale anywhere, anytime.

14


SUPPLIER DIRECTORY LastPass by LogMeIn

0800 640 4005 / natasha.griffin@logmein.com / lastpass.com For more than 47,000 businesses of all sizes, LastPass reduces friction for employees while increasing control and visibility for IT with an access solution that’s easy to manage and effortless to use. From single sign-on and password management to adaptive authentication, LastPass gives superior control to IT and frictionless access to users. For more information, visit www.LastPass. com . LastPass is a trademark of LogMeIn in the U.S. and other countries.

Neustar UK Limited

01784 448 444 / ken.woods@team.neustar / security.neustar Neustar is at the forefront of protecting online businesses from all types of cyberattacks through robust security solutions. For over 12 years, the company has been leveraging their expertise to deliver industryleading solutions in Marketing, Risk, Communications and Security that responsibly connect data on people, devices, and locations, continuously corroborated through billions of transactions. To ensure 100% website availability for our clients, our enterprise-grade UltraDNS solution is a managed authoritative DNS service with built-in security for superior protection. To protect both applications and networks of an enterprise from denial-of-service attacks, the company offers UltraWAF and UltraDDoS Protect. Additionally, Neustar’s IP Intelligence Services, including UltraGeoPoint and UltraThreat Feeds, help organizations identify and block fraudulent transactions, enabling them to drive better business decisions through powerful and predictive insights. As these services are cloud-based, they can be easily configured individually or together to best suit the customer’s needs.

Remediant Inc

07469 202 868 / keithcs@remediant.com / remediant.com Remediant was founded in response to a growing need to secure privileged accounts in the most relevant and innovative way. Because most data breaches involve compromised privilege accounts, our team understood the crucial role privilege access play in security. While some of our competitors have built their solution on the concept of a password vault, SecureONE is the first PAM (privileged access management) solution to utilise the concepts of agent-less and vaultless workflows into a streamlined, user-friendly approach.

15


SUPPLIER DIRECTORY Varonis

07825 564204 / hsumpter@varonis.com / varonis.com Varonis is a pioneer in data security and analytics, specializing in software for data protection, threat detection and response, and compliance. Varonis protects enterprise data by analyzing data activity, perimeter telemetry, and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.

NOTES

16


Complete Office 365 Protection with Acronis Cyber BackUp Cloud

Fast recovery even after permanent deletion in O365

Convenient cloud-to-cloud solution with nothing to install

Quick access to backup data via comprehensive search

Reliable point-in-time recovery of single files & entire sites

Simple, affordable per-user pricing with no upfront costs for cloud BackUp

Multi-tenant, multi-tier solution that's made for simple administration of business units

Visit https://www.everycloud.co.uk/protect/cloud-backup/ for more information


NOTES

18


It's not a fair game

Cyber criminals will use AI to supercharge their moves. New technological innovations are helping drive stealthier, faster and more effective cyber-attacks, which blend into background activity. Learn how to fight AI - with AI. darktrace.com


Cyber Resiliency Suite Mapped to Adaptive Security Framework Cyber resiliency: Consulting & advisory for C-suites and boards, penetration test/ethical hacking/vulnerability assessment

Preventive services: DevSecOps, vCISCO and security hardening

Adaptive Security Framework

Policy Predict ∙ Access risk/prioritize exposure ∙ Anticipate threats/ attacks ∙ Baseline systems & security posture

Adjust posture Adjust posture

Implement posture

Continuous visibility & assessment

Respond

Prevent ∙ Harden systems ∙ Isolate systems ∙ Prevent attacks

∙ Remediate ∙ Design/model policy change ∙ Investigate incidents/ conduct retrospective analysis IR plan definition: Reporting, training, and recommendations as business practices evolve & digital transformation occurs

accedian.com

Monitor posture

Detect ∙ Detect incidents ∙ Confirm & prioritize risk ∙ Contain incidents

Managed detection & response orchestration and automation


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.