T HUR S D AY 5TH NO VEMBER VIRTUAL EVENT
CENSORNET IS THE LEADING FORCE IN INNOVATIVE & AUTOMATED CLOUD SECURITY Award-winning cyber security provider Trusted by over 1,500 organisations 100% cloud-based security solutions
www.censornet.com | +44 (0) 845 230 9590 | sales@censornet.com
We’re delighted that you have chosen to join us at the virtual Security IT Summit – a unique event, tailor-made to meet your individual requirements. We have carefully planned out your itinerary to ensure your time here is worthwhile: Connect with businesses relevant to your current and forthcoming projects in our matchmade one-to-one meetings.
8
4
9
Seminars
Our Partners
Delegates
It’s Who’s Inside That Counts! Fraud: How It’s Done, And What To Look Out For
6 Itinerary
11 Supplier Directory
Thursday 5th November
Hosted by
Contact Us: 01992 374100 c.cannon@forumevents.co.uk Chris Cannon Head of Sales
Charley Thake
Delegate Sales Executive
c.thake@forumevents.co.uk securityitsummit.co.uk
VIRTUAL EVENTS Hospitality Tech & Innovation Forum 28th & 29th January 2021 eTailing Summit 11th & 12th February 2021 Smarter Payments Summit 8th & 9th March 2021 Total Security Summit 22nd & 23rd March 2021
@SecIT_Summit #SITSummit
Gold Partners
Silver Partners
Partners & Supporters
4
INTERESTED IN ADVERTISTING? Do you want to reach senior cyber security professionals and key security buyers quickly and easily? IT Security Briefing is an industry resource delivering news & analysis from across the industry, directly to the people who matter – through a dedicated online portal and a fortnightly email newsletter to 7,100 subscribers. IT Security Briefing puts you in front of a cross section of senior buyers from the cyber security marketplace, including; IT Directors, Security Directors, IT Consultants, Network Infrastructure Managers, IT Analysts, Compliance Officers, Information Security Managers, IT Infrastructure Architects, Systems Managers and more. Start working with IT Security Briefing today to publicise your company, products and services.
CONTACT US For further information on how you can promote your services within this platform, please speak to Chris Cannon on 01992 374096 or email c.cannon@forumevents.co.uk
securityitsummit.co.uk/briefing
ITINERARY THURSDAY 5TH NOVEMBER
6
09.00 – 09.30
Webinar ‘It’s Who’s Inside That Counts!’ Simon Cuthbert - Founder & CEO, VARChannels
09.40 - 12.50
Meetings
12.50 - 13.20
Lunch Break
13.20 - 15.40
Meetings
15.40 – 16.10
Webinar ‘Fraud: How It’s Done, And What To Look Out For’ Elliot Castro - Owner, EC Consultancy
£ f Your protection should too Cybercriminals are becoming more sophisticated in their attacks – using new malware variants, compromised websites, and cunning phishing attacks to try and steal your business-critical data. While backups are still essential for restoring your data, they’re not enough to protect your business alone. You need to adopt a comprehensive cyber protection approach to help mitigate the risks associated with today’s modern threats.
68%
of InfoSec professionals have seen the frequency of attacks against their endpoints increase over the last 12 months. (Ponemon)
93%
of organizations have been attacked within the past three years. (IDC)
Global ransomware damage costs will reach
LÂł= f
by 2021 – that’s 57X more than it was in 2015. (Cybersecurity Ventures)
# !%", /*1$ 3'* 4$ & $ 01'&$+&%'" 3'* "$$- + " $ - *"&%", 8 8 *& %& -'$/"S& 4$ &' $
-'"S& )$& +3 $1+1%#%" )/ & !$ +'"&1') '( 3'*1 */%"$//V Best practices to help you protect your business Implement an advanced backup and disaster recovery solution Secure common threat vectors Use strong passwords and multi-factor authentication Establish safe network connections Update your systems often Set user-based permissions Educate employees
www.everycloud.co.uk
SEMINARS THURSDAY 5TH NOVEMBER
09.00 – 09.30
It’s Who’s Inside That Counts! Internal breaches are a constant threat to each and every business. What is an Internal Breach and how should you pro-actively address them? • • •
What is an Internal Breach? Why should you care about them? How can you pro-actively reduce the threats posed by Insider threats?
Simon is a 30 year veteran of the Security industry. Over that time he has amassed a wealth of knowledge while holding senior leadership roles with the likes of AEP Networks, Content Technologies & Varonis. As well as running VARChannels, Simon also leads Business Development for tenfold GMBH a leading Identity & Access Management company based in Austria
Simon Cuthbert Founder & CEO, VARChannels
15.40 – 16.10
Simons knowledge spans several security disciplines including encryption and ransomware attacks but has a focus on Insider Threat Management, a topic on which he speaks about at length and with great knowledge.
Fraud: How It’s Done, And What To Look Out For I will relate my story, utilising anecdotes and stories to show how I managed it, as well as giving advice on how to avoid being a victim. Ex-fraudster Elliot Castro spent £2 million of other people’s money. Reformed by jail time, he now advises major companies on risk and how to avoid being scammed. Elliot relates the systems he used on both the card companies and individuals and demonstrates how human nature makes forms of manipulation so easy to achieve.
Elliot Castro Owner, EC Consultancy
8
DELEGATES
AB Agri
Head of Risk & Security
Belron
IT Manager
Belvoir Group
Head of IT
Brunswick Group
CISO
Carpenters Group
Head of IT
Croydon NHS
Deputy IT Director
Essex County Council
Technology Policy & Assurance Manager
Glass wall Solutions
Head of IT and InfoSec
HMG
Principal Security Advisor
JD Sports PLC
Group Information Security Manager
Jonnie Johnson Housing
ICT Project Manager
Kennet Equipment
Intern IT Director
KPMG
Information Security Officer
Law Society
IT Security Manager
Marshall Motor Group
IT Architecture & Security Lead
Odey Asset Management t LLP
Head of IT
Orlebar Brown
IT Director
Playtech
GRC Security Manager
Prism
IT Manager
Racing Post
CSO & Enterprise IT Director
Refinitiv
Director Data Insight
Royal Borough of Kensington & Chelsea
Head of ICT & Digital - Housing
SBE
Regional IT Manager
Scope
Information Security & GDPR Manager
Sofology / DFS
Head of IT
Southampton Football Club
Head of IT
Stella McCartney
IT Director
University of Cambridge
Head of Security & Strategy Architect
University Hospital Southampton NHS
Information Technology Analyst
University of Manchester
Head of Information Governance
Volkswagen Financial Services
CIO
Withers LLP
IT Security Analyst
Whitbread
Head of Information Security - Digital
9
UNLIMITED ONLINE COURSES FOR 12 MONTHS Learn new skills, improve existing ones and arm yourself with new expertise to put yourself on the path to future career development and progression with our range of online learning courses. We have a selection of high value, low cost course bundles available covering areas, including HR, Management, Leadership & Business Operations, Health & Safety, Education & Social Care, Sales & Marketing, IT and Personal Development. All courses are easy to access and navigate, with certiďŹ cates available to download on completion. You’ll also have a year to access the courses within each bundle. Use this time to level up your career and personal development!
01992 374100
ONLINE COURSES INCLUDE: Unlimited Corporate License Bundle Unlimited Course Selection Healthcare IT and Personal Development Education & Social Care Skills Health & Safety Customer Services Management, Leadership & Business Operations Human Resources Sales & Marketing
info@forumevents.co.uk forumevents.co.uk/online-courses
Personal & Professional Development Sports & Personal Development
SUPPLIER DIRECTORY Accedian
+46 70 239 7207 / kloffler@accedian.com / accedian.com Accedian Skylight powered Security is a behaviour-based, next-generation intrusion detection solution. It gives you the data and visibility needed to detect real-time suspicious, malicious and anomalous behaviors. Skylight provides a single source of truth for critical IT assets in the enterprise core, data center, and hybrid cloud architectures, monitoring every user, database, transaction, and packet with in-depth precision and unrivaled accuracy. With Skylight, your team can detect advanced, targeted cyber breaches and other evasive attacks that are notably more difficult for organizations to find and prevent. Protect your organization with economically viable visibility across ALL attack surfaces. The same Skylight sensors providing 100% visibility into all transactions, users and applications are also the basis of our network performance monitoring and diagnostics solution. Accedian provides full-stack unified network and application monitoring (SaaS) and performance analytics for improved experience visibility and problem resolution; for physical, hybrid and cloud environments.
ALSID
+33 64 802 3790 / lea.petit@alsid.com / alsid.com Alsid is a cybersecurity vendor specializing in defending the common denominator of most attacks we see in the wild nowadays: Active Directory (AD) infrastructures. As a fully-automated cloud solution, Alsid for AD provides users with step-by-step, tailored recommendations for hardening their AD, a real-time attack detection engine, as well as capabilities for investigating AD breaches when they unfortunately occur. Whether in the cloud or on premise, Alsid is easy to deploy and operate- no specialized security knowledge required. Founded by former ANSSI technical experts, Alsid is protecting over 6 million users across the world to help safeguard against advanced attacks. With the numerous recent attacks exploiting Active Directory weaknesses, it’s time to care about your AD security.
Censornet
0845 230 9590 / roxanne.lewington@censornet.com / censornet.com Censornet is the leading force in innovative and automated cloud security, offering robust consolidated solutions for organisations of all sizes. With Censornet’s 100% cloud-based security platform, unique architecture and flexible agent/gateway deployment, organisations can achieve full spectrum threat protection for users - no matter where they are. Scalable, cost-effective and easy to implement, the Censornet Platform integrates email and web security, cloud application security (CASB) and adaptive MFA, managed through a single intuitive UI, to simplify management without compromising on security. Add Censornet’s Autonomous Security Engine (ASE), to go beyond alert driven security, into real-time automated attack prevention, 24x7, 365 days a year. Only a solution that is born in the cloud and built from the ground up to integrate core security products can meet the needs of today’s security team. Speak to us to find out how we can help solve your specific security challenges.
11
SUPPLIER DIRECTORY Conosco
07917 247947 / mike.hooper@conosco.com / conosco.com Conosco is an industry-leading technology and business communications expert helping our customers navigate digital and workplace transformation.We provide a holistic portfolio of solutions that are underpinned by security in everything we do and cover the following: • • • • •
Strategic Consulting & Leadership - vCISO, vCIO, vCTO and vDPO 24/7 IT Managed Services & Security Operations Centre IT Professional Services - Microsoft, AWS, Cloud, Networking Information & Cyber Security Business Communications - Mobile, UCAAS, Fixed, VOIP & Connectivity
We are the intelligent partner that gives you the type of leadership, confidence, and resilience needed to protect and defend: business as usual.
Darktrace
01223 394100 / anastasia.putt@darktrace.com / darktrace.com/en Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modelled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems. This includes insider threat, industrial espionage, IoT compromises, zero-day malware, data loss, supply chain risk and long-term infrastructure vulnerabilities. The company has over 1,000 employees, 40 offices and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.
Digital Shadows
0203 393 7002 / aimee.moreau@digitalshadows.com / digitalshadows.com Digital Shadows makes threat intelligence accessible to all organizations by distilling your external exposure down to actionable, validated information your teams can immediately act on reducing your organizational risk. Our flagship solution, SearchLight, scans the most sources across the surface, deep, and dark web for your organizations’ exposed assets or signals that threat actors are targeting your company, delivering validated, risk-scored alerts that your team. Spare your limited resources from doing manually digging and validating of external threat intelligence, get started with Digital Shadows today. Learn more at www. digitalshadows.com.
12
Secure Advancement Happens Here. Break down barriers. Innovate with confidence. See how with Rapid7.
TO LE ARN MORE :
Visit us at www.rapid7.com Or email us at: anzsales@rapid7.com
SUPPLIER DIRECTORY EveryCloud Security / Acronis
0800 470 1820 / paul.richards@everycloud.co.uk / everycloud.co.uk EveryCloud Security is an award-winning cloud security and cloud communications business, having won Best Enterprise Cloud Solution, Best Vertical Market Solution and Enterprise Reseller of The Year at the 2020 Comms National Awards. Through our technology partner Acronis, we unify data protection and cybersecurity to deliver integrated, automated cyber protection that solves the safety, accessibility, privacy, authenticity and security challenges of the modern digital world. With flexible deployment models that fit the demands of service providers and IT professionals, Acronis Cyber Protect is the only solution that natively integrates cybersecurity, data protection and management to protect endpoints, systems and data. With award-winning AI-based antimalware and blockchain-based data authentication technologies, Acronis protects any environment – from cloud to hybrid to on-premise – at a low and predictable cost. Acronis solutions are trusted by more than 5.5 million home users and 500,000 companies, FTSE 100 and top-tier professional sports teams.
EveryCloud Security / IRONSCALES
0800 470 1820 / rob.mukherjee@everycloud.co.uk / everycloud.co.uk The best time to stop phishing emails is before they hit the mailbox. Yet 25% of attacks get past existing defences - because these tools rely on scripts and rules, which are no match for the volume and magnitude of email attacks and evolving malware variants. With 82 seconds on average until the first click is lured, the risks are clear. IRONSCALES is a comprehensive self-learning email security platform, designed to quickly detect nefarious emails slipping through traditional anti-phishing defences, responding to them automatically in seconds – and blocking them for good. Benefitting both security teams and end-users, we offer a single platform with push-button protection, giving you simplicity and speed for accelerated visibility and control that works from the inside out to protect you from all types of phishing attacks. Talk to us to see how we can help you continuously fight phishing where it hurts most... inside your inbox.
Handd & Agari
08456 434 063 / emily.stephens@handd.co.uk / handd.co.uk HANDD are independent specialists in global data security, partnered with Agari, a leading cybersecurity company specialising in protecting their partners and customers from advanced email phishing attacks. As a respected HANDD partner, Agari automates phishing prevention to safeguard your organization’s brand by preventing cyber criminals from using your good name to commit email fraud. Using a combination of sender analytics, a fully hosted email authentication platform, and proven business processes to maintain compliance, Agari eliminates administrative functions to help achieve DMARC enforcement faster than other approaches. We stop inbound spear phishing, business email compromise, and email account takeover attacks from reaching employees that legacy security control miss. With Agari protecting the inbox, your organisation can stay focused and avoid business disruption from costly advanced email attacks.
14
Agari DMARC authentication and Enterprise Email Defence Advanced email attacks target a major security vulnerability that legacy email security controls do not address. In partnership with Agari, HANDD helps customers, partners and employees have the confidence to trust their inbox and prevent brand abuse.
A
Self Learning
Email Security Platform to Stop Tomorrow’s Phishing Attacks Today
Phishing Training & Simulation
Advanced Malware & URL Protection
Virtual SOC Analyst
AI Powered Incident Response
Mailbox-Level BEC Protection
Threat Protection
SUPPLIER DIRECTORY iomart
01419 316400 / chris.lindsay@iomart.com / iomart.com iomart have been delivering digital transformation and managed IT infrastructure for over 20 years, helping you maximise the cost effectiveness, flexibility and security of the cloud. Our agnostic approach allows us to provide independent advice and deliver bespoke solutions tailored to your needs. Our Managed Security Service encompasses round-the-clock network monitoring, vulnerability management and data loss prevention to proactively secure your organisation against external and internal threats. As an accredited Managed Security Service Provider, we monitor, correlate, and analyse every potential cyber security threat via our Security Information and Event Management system. When a potential threat to your network security is detected, immediate action is taken to halt the attack or prevent a vulnerability being exploited. Our Managed Security experts will work with you 24/7 to quickly implement corrective action and keep your business secure.
LogMeIn
+353 1 254 1490 / natasha.griffin@logmein.com / logmein.com LastPass by LogMeIn - is a next generation identity platform that combines password management and single sign on (SSO) functionality with adaptive multifactor authentication (MFA) to secure access to applications, providing granular control to IT teams and easy access to users.
LogRhythm
07387 411991 / megan.treacy@logrhythm.com / logrhythm.com LogRhythm empowers more than 4,000 customers across the globe to measurably mature their security operations program. LogRhythm’s award-winning NextGen SIEM Platform delivers comprehensive security analytics; user and entity behaviour analytics (UEBA); network detection and response (NDR); and security orchestration, automation, and response (SOAR) within a single, integrated platform for rapid detection, response, and neutralisation of threats. Built by security professionals for security professionals, LogRhythm enables security professionals at leading organisations NASA, XcelEnergy, and Temple University to promote visibility for their cybersecurity program and reduce risk to their organisation each and every day. LogRhythm is the only provider to earn the Gartner Peer Insights’ Customer Choice for SIEM designation four years in a row. To learn more, please visit logrhythm.com.
17
SUPPLIER DIRECTORY Loop1—A SolarWinds Partner
01285 647900 / helen.owens@loop1.com / loop1.com Loop1 is a leading global IT Operations Management (ITOM) company specialising in the SolarWinds® ITOM product offering; and Cisco Partner with specialisations in unified communications and Webex collaboration. We help our clients to ‘Know What’s Next’ through our unique methodology ITOMPlus, incorporating L1M3 (Loop1 Monitoring Maturity Model), that delivers a simplified roadmap and scorecard to enable organisations to measure and improve the value of their overall IT operations. Headquartered in Austin TX, US, with offices in the UK, Ireland, Australia, Sri Lanka, and Singapore; the group has more than 100 employees across 4 continents, clients in more than 60 countries, and 50+ SolarWinds SCP, and Cisco-certified engineers holding CCNP’s & CCIE’s Meet Loop1 at the Security IT Summit where we will be showcasing SolarWinds IT Security Management Tools—Access Rights Management, Security Information & Event Management, Account Takeover Prevention, Configuration Monitoring, Patch Management, Managed File Transfer, and FTP Server.
Osirium
0118 324 0740 ext 201 / kat.webster@osirium.com / osirium.com Osirium is a leading vendor of Privileged Access Security (PAS) solutions. Osirium’s cloud and on-premise products protect critical shared IT infrastructure and endpoints, and securely streamline IT operations to deliver digital transformation fast. Osirium’s PAS solution includes modern Privileged Access Management (PAM) to protect valuable services and enables managed access by third-party vendors and partners. It includes high-availability clustered servers, session recording, just-in-time approvals and simple deployment. PAS also includes Privileged Process Automation (PPA) to automate privileged tasks for streamlined and secure IT operations. Secure automation allows tasks that normally need multiple IT experts to be delegated to first-line help desk engineers or users across the business. It also includes Privileged Endpoint Management (PEM) to remove local administrator accounts and manage applications approved to run with elevated privileges. Removing local admin rights is a critical part of any “least privilege” policies.
Rapid7
0118 207 9300 / fleur_haggerty@rapid7.com / rapid7.com The Rapid7 Insight cloud equips you with the visibility, analytics, and automation you need to unite your teams and work faster (and smarter). Security, IT, and Development now have one-click access to vulnerability management, application security, incident detection and response, automation, and more. • Unify Data Collection • Collect data once from across your IT environment, enabling your Security, IT, and DevOps teams to collaborate effectively as they analyse shared data. • Scale with Ease • Expanding your use of the Insight cloud to include multiple solutions is easy. Once your data collectors are installed, launching new Insight products is just a few clicks away. • Integrate Seamlessly • Get faster analysis, prioritisation, and remediation, with your existing tools. The Insight cloud integrates with your existing technology stack, acting as a force multiplier to already-deployed solutions.
19
SUPPLIER DIRECTORY Redscan Cyber Security
0203 972 2523 / kevin.spencer@redscan.com / redscan.com Redscan is an award-winning provider of managed security services, specialising in Managed Detection and Response, Penetration Testing and Red Teaming. Possessing a deep knowledge of offensive security, Redscan’s experts are among the most qualified in the industry, working as an extension of clients’ in-house resources to expose and address vulnerabilities plus swiftly identify, contain and shut down breaches. By understanding how attackers operate and leveraging cutting-edge tools and threat intelligence, Redscan’s cyber security professionals can be trusted to provide the insight and support needed to successfully mitigate information security risk and achieve compliance standards.Redscan looks forward to a series of productive introductory meetings at the IT Security Summit to establish how organisations can improve their security defences against the latest cyber threats by working with us a security partner.
NOTES
20
The expertise to navigate your security landscape Information Security & Data Protection Consultancy Managed Security Operations Centre (SOC) Vulnerability Scanning & Management Mobile Device Management & Security Security Training & Awareness Workshops
e. info@conosco.com
t. 020 3507 0418
w. conosco.com
NOTES
22
22 & 23 March 2021
TSS advert
Virtual Event
A Virtual Meet The Buyer Event For The Security Sector The Total Security Summit continues to follow the award-winning structure, that bring key security buyers together with leading solution providers for focused one-to-one meeting via a pre-arranged itinerary of business meetings.
Contact Us Contact Courtney Saggers on 01992 374088 I c.saggers@forumevents.co.uk
totalsecuritysummit.co.uk