Security IT Summit Event Guide

Page 1

T HUR S D AY 5TH NO VEMBER VIRTUAL EVENT


CENSORNET IS THE LEADING FORCE IN INNOVATIVE & AUTOMATED CLOUD SECURITY Award-winning cyber security provider Trusted by over 1,500 organisations 100% cloud-based security solutions

www.censornet.com | +44 (0) 845 230 9590 | sales@censornet.com


We’re delighted that you have chosen to join us at the virtual Security IT Summit – a unique event, tailor-made to meet your individual requirements. We have carefully planned out your itinerary to ensure your time here is worthwhile: Connect with businesses relevant to your current and forthcoming projects in our matchmade one-to-one meetings.

8

4

9

Seminars

Our Partners

Delegates

It’s Who’s Inside That Counts! Fraud: How It’s Done, And What To Look Out For

6 Itinerary

11 Supplier Directory

Thursday 5th November

Hosted by

Contact Us: 01992 374100 c.cannon@forumevents.co.uk Chris Cannon Head of Sales

Charley Thake

Delegate Sales Executive

c.thake@forumevents.co.uk securityitsummit.co.uk

VIRTUAL EVENTS Hospitality Tech & Innovation Forum 28th & 29th January 2021 eTailing Summit 11th & 12th February 2021 Smarter Payments Summit 8th & 9th March 2021 Total Security Summit 22nd & 23rd March 2021

@SecIT_Summit #SITSummit


Gold Partners

Silver Partners

Partners & Supporters

4


INTERESTED IN ADVERTISTING? Do you want to reach senior cyber security professionals and key security buyers quickly and easily? IT Security Briefing is an industry resource delivering news & analysis from across the industry, directly to the people who matter – through a dedicated online portal and a fortnightly email newsletter to 7,100 subscribers. IT Security Briefing puts you in front of a cross section of senior buyers from the cyber security marketplace, including; IT Directors, Security Directors, IT Consultants, Network Infrastructure Managers, IT Analysts, Compliance Officers, Information Security Managers, IT Infrastructure Architects, Systems Managers and more. Start working with IT Security Briefing today to publicise your company, products and services.

CONTACT US For further information on how you can promote your services within this platform, please speak to Chris Cannon on 01992 374096 or email c.cannon@forumevents.co.uk

securityitsummit.co.uk/briefing


ITINERARY THURSDAY 5TH NOVEMBER

6

09.00 – 09.30

Webinar ‘It’s Who’s Inside That Counts!’ Simon Cuthbert - Founder & CEO, VARChannels

09.40 - 12.50

Meetings

12.50 - 13.20

Lunch Break

13.20 - 15.40

Meetings

15.40 – 16.10

Webinar ‘Fraud: How It’s Done, And What To Look Out For’ Elliot Castro - Owner, EC Consultancy


£ f Your protection should too Cybercriminals are becoming more sophisticated in their attacks – using new malware variants, compromised websites, and cunning phishing attacks to try and steal your business-critical data. While backups are still essential for restoring your data, they’re not enough to protect your business alone. You need to adopt a comprehensive cyber protection approach to help mitigate the risks associated with today’s modern threats.

68%

of InfoSec professionals have seen the frequency of attacks against their endpoints increase over the last 12 months. (Ponemon)

93%

of organizations have been attacked within the past three years. (IDC)

Global ransomware damage costs will reach

LÂł= f

by 2021 – that’s 57X more than it was in 2015. (Cybersecurity Ventures)

# !%", /*1$ 3'* 4$ & $ 01'&$+&%'" 3'* "$$- + " $ - *"&%", 8 8 *& %& -'$/"S& 4$ &' $

-'"S& )$& +3 $1+1%#%" )/ & !$ +'"&1') '( 3'*1 */%"$//V Best practices to help you protect your business Implement an advanced backup and disaster recovery solution Secure common threat vectors Use strong passwords and multi-factor authentication Establish safe network connections Update your systems often Set user-based permissions Educate employees

www.everycloud.co.uk


SEMINARS THURSDAY 5TH NOVEMBER

09.00 – 09.30

It’s Who’s Inside That Counts! Internal breaches are a constant threat to each and every business. What is an Internal Breach and how should you pro-actively address them? • • •

What is an Internal Breach? Why should you care about them? How can you pro-actively reduce the threats posed by Insider threats?

Simon is a 30 year veteran of the Security industry. Over that time he has amassed a wealth of knowledge while holding senior leadership roles with the likes of AEP Networks, Content Technologies & Varonis. As well as running VARChannels, Simon also leads Business Development for tenfold GMBH a leading Identity & Access Management company based in Austria

Simon Cuthbert Founder & CEO, VARChannels

15.40 – 16.10

Simons knowledge spans several security disciplines including encryption and ransomware attacks but has a focus on Insider Threat Management, a topic on which he speaks about at length and with great knowledge.

Fraud: How It’s Done, And What To Look Out For I will relate my story, utilising anecdotes and stories to show how I managed it, as well as giving advice on how to avoid being a victim. Ex-fraudster Elliot Castro spent £2 million of other people’s money. Reformed by jail time, he now advises major companies on risk and how to avoid being scammed. Elliot relates the systems he used on both the card companies and individuals and demonstrates how human nature makes forms of manipulation so easy to achieve.

Elliot Castro Owner, EC Consultancy

8


DELEGATES

AB Agri

Head of Risk & Security

Belron

IT Manager

Belvoir Group

Head of IT

Brunswick Group

CISO

Carpenters Group

Head of IT

Croydon NHS

Deputy IT Director

Essex County Council

Technology Policy & Assurance Manager

Glass wall Solutions

Head of IT and InfoSec

HMG

Principal Security Advisor

JD Sports PLC

Group Information Security Manager

Jonnie Johnson Housing

ICT Project Manager

Kennet Equipment

Intern IT Director

KPMG

Information Security Officer

Law Society

IT Security Manager

Marshall Motor Group

IT Architecture & Security Lead

Odey Asset Management t LLP

Head of IT

Orlebar Brown

IT Director

Playtech

GRC Security Manager

Prism

IT Manager

Racing Post

CSO & Enterprise IT Director

Refinitiv

Director Data Insight

Royal Borough of Kensington & Chelsea

Head of ICT & Digital - Housing

SBE

Regional IT Manager

Scope

Information Security & GDPR Manager

Sofology / DFS

Head of IT

Southampton Football Club

Head of IT

Stella McCartney

IT Director

University of Cambridge

Head of Security & Strategy Architect

University Hospital Southampton NHS

Information Technology Analyst

University of Manchester

Head of Information Governance

Volkswagen Financial Services

CIO

Withers LLP

IT Security Analyst

Whitbread

Head of Information Security - Digital

9


UNLIMITED ONLINE COURSES FOR 12 MONTHS Learn new skills, improve existing ones and arm yourself with new expertise to put yourself on the path to future career development and progression with our range of online learning courses. We have a selection of high value, low cost course bundles available covering areas, including HR, Management, Leadership & Business Operations, Health & Safety, Education & Social Care, Sales & Marketing, IT and Personal Development. All courses are easy to access and navigate, with certiďŹ cates available to download on completion. You’ll also have a year to access the courses within each bundle. Use this time to level up your career and personal development!

01992 374100

ONLINE COURSES INCLUDE: Unlimited Corporate License Bundle Unlimited Course Selection Healthcare IT and Personal Development Education & Social Care Skills Health & Safety Customer Services Management, Leadership & Business Operations Human Resources Sales & Marketing

info@forumevents.co.uk forumevents.co.uk/online-courses

Personal & Professional Development Sports & Personal Development


SUPPLIER DIRECTORY Accedian

+46 70 239 7207 / kloffler@accedian.com / accedian.com Accedian Skylight powered Security is a behaviour-based, next-generation intrusion detection solution. It gives you the data and visibility needed to detect real-time suspicious, malicious and anomalous behaviors. Skylight provides a single source of truth for critical IT assets in the enterprise core, data center, and hybrid cloud architectures, monitoring every user, database, transaction, and packet with in-depth precision and unrivaled accuracy. With Skylight, your team can detect advanced, targeted cyber breaches and other evasive attacks that are notably more difficult for organizations to find and prevent. Protect your organization with economically viable visibility across ALL attack surfaces. The same Skylight sensors providing 100% visibility into all transactions, users and applications are also the basis of our network performance monitoring and diagnostics solution. Accedian provides full-stack unified network and application monitoring (SaaS) and performance analytics for improved experience visibility and problem resolution; for physical, hybrid and cloud environments.

ALSID

+33 64 802 3790 / lea.petit@alsid.com / alsid.com Alsid is a cybersecurity vendor specializing in defending the common denominator of most attacks we see in the wild nowadays: Active Directory (AD) infrastructures. As a fully-automated cloud solution, Alsid for AD provides users with step-by-step, tailored recommendations for hardening their AD, a real-time attack detection engine, as well as capabilities for investigating AD breaches when they unfortunately occur. Whether in the cloud or on premise, Alsid is easy to deploy and operate- no specialized security knowledge required. Founded by former ANSSI technical experts, Alsid is protecting over 6 million users across the world to help safeguard against advanced attacks. With the numerous recent attacks exploiting Active Directory weaknesses, it’s time to care about your AD security.

Censornet

0845 230 9590 / roxanne.lewington@censornet.com / censornet.com Censornet is the leading force in innovative and automated cloud security, offering robust consolidated solutions for organisations of all sizes. With Censornet’s 100% cloud-based security platform, unique architecture and flexible agent/gateway deployment, organisations can achieve full spectrum threat protection for users - no matter where they are. Scalable, cost-effective and easy to implement, the Censornet Platform integrates email and web security, cloud application security (CASB) and adaptive MFA, managed through a single intuitive UI, to simplify management without compromising on security. Add Censornet’s Autonomous Security Engine (ASE), to go beyond alert driven security, into real-time automated attack prevention, 24x7, 365 days a year. Only a solution that is born in the cloud and built from the ground up to integrate core security products can meet the needs of today’s security team. Speak to us to find out how we can help solve your specific security challenges.

11


SUPPLIER DIRECTORY Conosco

07917 247947 / mike.hooper@conosco.com / conosco.com Conosco is an industry-leading technology and business communications expert helping our customers navigate digital and workplace transformation.We provide a holistic portfolio of solutions that are underpinned by security in everything we do and cover the following: • • • • •

Strategic Consulting & Leadership - vCISO, vCIO, vCTO and vDPO 24/7 IT Managed Services & Security Operations Centre IT Professional Services - Microsoft, AWS, Cloud, Networking Information & Cyber Security Business Communications - Mobile, UCAAS, Fixed, VOIP & Connectivity

We are the intelligent partner that gives you the type of leadership, confidence, and resilience needed to protect and defend: business as usual.

Darktrace

01223 394100 / anastasia.putt@darktrace.com / darktrace.com/en Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modelled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems. This includes insider threat, industrial espionage, IoT compromises, zero-day malware, data loss, supply chain risk and long-term infrastructure vulnerabilities. The company has over 1,000 employees, 40 offices and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.

Digital Shadows

0203 393 7002 / aimee.moreau@digitalshadows.com / digitalshadows.com Digital Shadows makes threat intelligence accessible to all organizations by distilling your external exposure down to actionable, validated information your teams can immediately act on reducing your organizational risk. Our flagship solution, SearchLight, scans the most sources across the surface, deep, and dark web for your organizations’ exposed assets or signals that threat actors are targeting your company, delivering validated, risk-scored alerts that your team. Spare your limited resources from doing manually digging and validating of external threat intelligence, get started with Digital Shadows today. Learn more at www. digitalshadows.com.

12


Secure Advancement Happens Here. Break down barriers. Innovate with confidence. See how with Rapid7.

TO LE ARN MORE :

Visit us at www.rapid7.com Or email us at: anzsales@rapid7.com


SUPPLIER DIRECTORY EveryCloud Security / Acronis

0800 470 1820 / paul.richards@everycloud.co.uk / everycloud.co.uk EveryCloud Security is an award-winning cloud security and cloud communications business, having won Best Enterprise Cloud Solution, Best Vertical Market Solution and Enterprise Reseller of The Year at the 2020 Comms National Awards. Through our technology partner Acronis, we unify data protection and cybersecurity to deliver integrated, automated cyber protection that solves the safety, accessibility, privacy, authenticity and security challenges of the modern digital world. With flexible deployment models that fit the demands of service providers and IT professionals, Acronis Cyber Protect is the only solution that natively integrates cybersecurity, data protection and management to protect endpoints, systems and data. With award-winning AI-based antimalware and blockchain-based data authentication technologies, Acronis protects any environment – from cloud to hybrid to on-premise – at a low and predictable cost. Acronis solutions are trusted by more than 5.5 million home users and 500,000 companies, FTSE 100 and top-tier professional sports teams.

EveryCloud Security / IRONSCALES

0800 470 1820 / rob.mukherjee@everycloud.co.uk / everycloud.co.uk The best time to stop phishing emails is before they hit the mailbox. Yet 25% of attacks get past existing defences - because these tools rely on scripts and rules, which are no match for the volume and magnitude of email attacks and evolving malware variants. With 82 seconds on average until the first click is lured, the risks are clear. IRONSCALES is a comprehensive self-learning email security platform, designed to quickly detect nefarious emails slipping through traditional anti-phishing defences, responding to them automatically in seconds – and blocking them for good. Benefitting both security teams and end-users, we offer a single platform with push-button protection, giving you simplicity and speed for accelerated visibility and control that works from the inside out to protect you from all types of phishing attacks. Talk to us to see how we can help you continuously fight phishing where it hurts most... inside your inbox.

Handd & Agari

08456 434 063 / emily.stephens@handd.co.uk / handd.co.uk HANDD are independent specialists in global data security, partnered with Agari, a leading cybersecurity company specialising in protecting their partners and customers from advanced email phishing attacks. As a respected HANDD partner, Agari automates phishing prevention to safeguard your organization’s brand by preventing cyber criminals from using your good name to commit email fraud. Using a combination of sender analytics, a fully hosted email authentication platform, and proven business processes to maintain compliance, Agari eliminates administrative functions to help achieve DMARC enforcement faster than other approaches. We stop inbound spear phishing, business email compromise, and email account takeover attacks from reaching employees that legacy security control miss. With Agari protecting the inbox, your organisation can stay focused and avoid business disruption from costly advanced email attacks.

14


Agari DMARC authentication and Enterprise Email Defence Advanced email attacks target a major security vulnerability that legacy email security controls do not address. In partnership with Agari, HANDD helps customers, partners and employees have the confidence to trust their inbox and prevent brand abuse.


A

Self Learning

Email Security Platform to Stop Tomorrow’s Phishing Attacks Today

Phishing Training & Simulation

Advanced Malware & URL Protection

Virtual SOC Analyst

AI Powered Incident Response

Mailbox-Level BEC Protection

Threat Protection


SUPPLIER DIRECTORY iomart

01419 316400 / chris.lindsay@iomart.com / iomart.com iomart have been delivering digital transformation and managed IT infrastructure for over 20 years, helping you maximise the cost effectiveness, flexibility and security of the cloud. Our agnostic approach allows us to provide independent advice and deliver bespoke solutions tailored to your needs. Our Managed Security Service encompasses round-the-clock network monitoring, vulnerability management and data loss prevention to proactively secure your organisation against external and internal threats. As an accredited Managed Security Service Provider, we monitor, correlate, and analyse every potential cyber security threat via our Security Information and Event Management system. When a potential threat to your network security is detected, immediate action is taken to halt the attack or prevent a vulnerability being exploited. Our Managed Security experts will work with you 24/7 to quickly implement corrective action and keep your business secure.

LogMeIn

+353 1 254 1490 / natasha.griffin@logmein.com / logmein.com LastPass by LogMeIn - is a next generation identity platform that combines password management and single sign on (SSO) functionality with adaptive multifactor authentication (MFA) to secure access to applications, providing granular control to IT teams and easy access to users.

LogRhythm

07387 411991 / megan.treacy@logrhythm.com / logrhythm.com LogRhythm empowers more than 4,000 customers across the globe to measurably mature their security operations program. LogRhythm’s award-winning NextGen SIEM Platform delivers comprehensive security analytics; user and entity behaviour analytics (UEBA); network detection and response (NDR); and security orchestration, automation, and response (SOAR) within a single, integrated platform for rapid detection, response, and neutralisation of threats. Built by security professionals for security professionals, LogRhythm enables security professionals at leading organisations NASA, XcelEnergy, and Temple University to promote visibility for their cybersecurity program and reduce risk to their organisation each and every day. LogRhythm is the only provider to earn the Gartner Peer Insights’ Customer Choice for SIEM designation four years in a row. To learn more, please visit logrhythm.com.

17



SUPPLIER DIRECTORY Loop1—A SolarWinds Partner

01285 647900 / helen.owens@loop1.com / loop1.com Loop1 is a leading global IT Operations Management (ITOM) company specialising in the SolarWinds® ITOM product offering; and Cisco Partner with specialisations in unified communications and Webex collaboration. We help our clients to ‘Know What’s Next’ through our unique methodology ITOMPlus, incorporating L1M3 (Loop1 Monitoring Maturity Model), that delivers a simplified roadmap and scorecard to enable organisations to measure and improve the value of their overall IT operations. Headquartered in Austin TX, US, with offices in the UK, Ireland, Australia, Sri Lanka, and Singapore; the group has more than 100 employees across 4 continents, clients in more than 60 countries, and 50+ SolarWinds SCP, and Cisco-certified engineers holding CCNP’s & CCIE’s Meet Loop1 at the Security IT Summit where we will be showcasing SolarWinds IT Security Management Tools—Access Rights Management, Security Information & Event Management, Account Takeover Prevention, Configuration Monitoring, Patch Management, Managed File Transfer, and FTP Server.

Osirium

0118 324 0740 ext 201 / kat.webster@osirium.com / osirium.com Osirium is a leading vendor of Privileged Access Security (PAS) solutions. Osirium’s cloud and on-premise products protect critical shared IT infrastructure and endpoints, and securely streamline IT operations to deliver digital transformation fast. Osirium’s PAS solution includes modern Privileged Access Management (PAM) to protect valuable services and enables managed access by third-party vendors and partners. It includes high-availability clustered servers, session recording, just-in-time approvals and simple deployment. PAS also includes Privileged Process Automation (PPA) to automate privileged tasks for streamlined and secure IT operations. Secure automation allows tasks that normally need multiple IT experts to be delegated to first-line help desk engineers or users across the business. It also includes Privileged Endpoint Management (PEM) to remove local administrator accounts and manage applications approved to run with elevated privileges. Removing local admin rights is a critical part of any “least privilege” policies.

Rapid7

0118 207 9300 / fleur_haggerty@rapid7.com / rapid7.com The Rapid7 Insight cloud equips you with the visibility, analytics, and automation you need to unite your teams and work faster (and smarter). Security, IT, and Development now have one-click access to vulnerability management, application security, incident detection and response, automation, and more. • Unify Data Collection • Collect data once from across your IT environment, enabling your Security, IT, and DevOps teams to collaborate effectively as they analyse shared data. • Scale with Ease • Expanding your use of the Insight cloud to include multiple solutions is easy. Once your data collectors are installed, launching new Insight products is just a few clicks away. • Integrate Seamlessly • Get faster analysis, prioritisation, and remediation, with your existing tools. The Insight cloud integrates with your existing technology stack, acting as a force multiplier to already-deployed solutions.

19


SUPPLIER DIRECTORY Redscan Cyber Security

0203 972 2523 / kevin.spencer@redscan.com / redscan.com Redscan is an award-winning provider of managed security services, specialising in Managed Detection and Response, Penetration Testing and Red Teaming. Possessing a deep knowledge of offensive security, Redscan’s experts are among the most qualified in the industry, working as an extension of clients’ in-house resources to expose and address vulnerabilities plus swiftly identify, contain and shut down breaches. By understanding how attackers operate and leveraging cutting-edge tools and threat intelligence, Redscan’s cyber security professionals can be trusted to provide the insight and support needed to successfully mitigate information security risk and achieve compliance standards.Redscan looks forward to a series of productive introductory meetings at the IT Security Summit to establish how organisations can improve their security defences against the latest cyber threats by working with us a security partner.

NOTES

20


The expertise to navigate your security landscape Information Security & Data Protection Consultancy Managed Security Operations Centre (SOC) Vulnerability Scanning & Management Mobile Device Management & Security Security Training & Awareness Workshops

e. info@conosco.com

t. 020 3507 0418

w. conosco.com


NOTES

22



22 & 23 March 2021

TSS advert

Virtual Event

A Virtual Meet The Buyer Event For The Security Sector The Total Security Summit continues to follow the award-winning structure, that bring key security buyers together with leading solution providers for focused one-to-one meeting via a pre-arranged itinerary of business meetings.

Contact Us Contact Courtney Saggers on 01992 374088 I c.saggers@forumevents.co.uk

totalsecuritysummit.co.uk


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.