Business in Progress

5th June 2018 - 7th June 2018

Overview

Once again, we find ourselves fast approaching the dreaded three days of vendor booths, product launches, plastic lightsabers and over-subscribed talks that make up InfoSecurity Europe.

This year and in keeping with RANTs usual post-show networking evenings, Progress Distribution and RANT Events are proud to be providing three days of talks, debates, networking, meetings, food, drinks, competitions and workshops for the end-user community located just down the road from the big show.

We’re taking over the Famous Three Kings Pub for the duration  and are offering a unique hub for those looking to take a deep dive into Cyber Visibility and Vulnerability Management.

So why not pop down to meet, chat, network, enjoy our hospitality (and sit down) with RANT, Progress and our vendors and partners who are offering some of the hottest cyber security technologies in the market today.

Topics, speakers and further details on theme tbc over the coming weeks, but if you would like to put your name forward to contribute to the agenda as a speaker or panellists, just let us know!

Agenda

Day 1

  • 09:30 - 10:00
    Join us for a breakfast of tea, coffee, bacon sandwiches and pastries
  • 10:00 - 10:30
    Boring the Board? How to bring cyber security to life and energise your stakeholders
  • 10:30 - 11:15
    Active Cyber Defence & Securing trust as well as technology
  • 11:15 - 12:00
    Security Metrics That Don’t Suck

    This talk deals with lessons learned from over a decade of helping organizations as they struggle to measure the elusive concept of security.  Getting the right measure to the right audience is a delicate art, and there are many ways to do it wrong.

  • 12:00 - 13:00
    Lunch
  • 13:00 - 13:45
    Zersetzung, a cold war intelligence ideology brought back to life with technology, modernized and more effective than ever.

    A brief history review of one of the most ruthless, yet effective, counterintelligence organizations ever, the Stasi. A look into their development and use of a methodology coined Zersetzung which they implemented, and perfected, to influence and control the masses. Individuals and countries are still being affected by their efforts 30 years after their ruthless techniques were used.

    Their perfected methodologies can be seen today, implemented using modern technologies to facilitate large scale counterintelligence activities. These efforts have been ongoing for years and have swayed world opinion on a regular basis at critical moments. Coupled with the direct-action capabilities, this methodology is now used in conjunction with modern warfare as seen in a short case study.

  • 13:45 - 14:30
    Rethinking the Human Factor - the importance of building a strong Cyber Security Culture

    With human errors being the #1 cause of cyber incidents and data breaches, it is now a CISO imperative to tackle behavioural change and focus on building a cyber risk aware culture. There are multiple drivers behind the rise of cyber security culture as a recognised need within organisations. It reflects the acceptance that how an organisation behaves is dependent on the shared beliefs, values and actions of its employees, and that this includes their attitudes towards cybersecurity. There is the recognition that traditional awareness raising campaigns (e.g. CBT, phishing simulations) are not, in themselves, affording sufficient protection against ever evolving cyber-attacks.

    Key topics covered in this presentation:
    • People-related challenges and frustrations the industry is facing
    • Why a new approach to awareness and culture is required
    • Innovative approaches adopted by leading organisations

    Your organisation can only be secure if you strengthen the human firewall and make people your strongest defence. Attend this session to discuss how to turn your “weakest link” into your biggest advantage in cyber security!

  • 14:30 - 15:00
    GDPR - Cut the crap, what's it really about?
  • 15:00 - 15:30
    The Trouble with Threat Intelligence is… It doesn’t help!

    Consuming and using threat intelligence is an emerging discipline,  listen to how organisations are adapting their strategy towards threat intelligence towards better metrics, better security (less infections remediated faster) and augmenting human  security resources not consuming human security resources.

  • 15:30 - 16:00
    How an octopus caught a phish

    What is the best approach to prevent email phishing, the world’s biggest cybersecurity problem? The ideal solution would “see” an email like a human would, but then instantly analyze the email like a smart machine would, detecting brand impersonation, forgery and anything suspicious. Let’s talk about why this is a challenge, and how the best cybersecurity solutions should have the lowest friction – they should be effective, of course – but also easy to deploy, flexible, and helpful for end-users.

  • 16:00 - 17:30
    Happy Hour- Cyber Soapbox

    Topics include: “ Privacy – who cares?”

  • 17:30 - 19:30
    After the hype; what became of last year's buzzwords

    RANT and ISSA-UK bring you an expert panel who will take a retrospective look at overhyped security tools/techniques and how they actually turned out – good, bad or ugly.

     

  • 19:30 - 22:00
    Bar snacks and drinks
  • 22:00 -
    Event Close

Day 2

  • 9:30 - 10:00
    Join us for a breakfast of tea, coffee, bacon sandwiches and pastries
  • 10:00 - 10:30
    Avengers Initiative: What comics taught me about building security teams.

    “There was an idea; Stark knows this. Called the Avengers Initiative. The idea was to bring together a group of remarkable people, see if they become something more. See if they can work together when we needed them to. To fight the battles that we never could.” ―Nick Fury

  • 10:30 - 11:15
    Cybersecurity 101 – a multi-layered approach
    • Understanding the threats you’re facing before spending money to counter them
    • How to achieve a layered approach within a tight budget
    • How to avoid asking the board for large sums of money
    • The downsides to a multi-layered approach

     

  • 11:15 - 12:00
    Panel Discussion from Cofense
  • 12:00 - 13:00
    LUNCH
  • 13:00 - 13:45
    A quick History of Deception and why it should be applied to the cyber realm

    Deception has longed been used in the physical realm to great success, especially by strategic thinking military commanders to win complex battles. During this talk, we’ll discuss some of the great applications of deception over the millennia in battles and how it’s become a common part of warfare. Today the cyber realm is also a domain that militaries acknowledge they must fight and defend to protect their countries. We’ll discuss how the fight though isn’t limited to militaries in the cyber domain and that CISOs have a globally interconnected enterprise that’s also under continuous attack from nation-states, organized crime, and other malicious actors. We’ll discuss how deception is broadly applicable in the cyber realm and how it can help CISOs be more strategic in their approach to help win battles against their adversaries.

  • 13:45 - 14:30
    "The Psychology of Security"
  • 14:30 - 15:15
    "Attribution. And I don't mean hackers"
  • 15:15 - 15:45
    Your Biggest Assets are your Biggest Risks

    The greatest cyber security threat an organisation faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders – the contractors, vendors, privileged users and business users who already have full access to your company’s systems and sensitive data. Addressing this type of threat requires a different approach than addressing external threats; whether unintentional or malicious, organisations with sensitive customer data need to quickly identify and eliminate insider threat. Join us to learn best practices and hear real life examples for building and maintaining an effective insider threat program, so your biggest assets remain just that!

  • 15:45 - 16:15
    The classic security architecture is broken – bring in the cavalry

    The classic cyber security architecture relies on gathering huge amounts of information and using expensive technology and even more expensive people to find the occasional needle in digital haystacks. This cannot scale to match the exponential growth of tomorrow’s problems. There has to be another approach. Will today’s users be tomorrow’s knights in shining armour?

  • 16:15 - 17:30
    Happy Hour
  • 17:30 - 19:00
    The Cyber Skills Gap – Lots of talk, not enough action. Where are we now and what can we, as an industry do, to combat it?
  • 19:00 - 22:00
    Bar snacks and drinks
  • 22:00 -
    Event close

Day 3

  • 09:30 - 10:00
    Join us for a breakfast of tea, coffee, bacon sandwiches and pastries
  • 10:30 - 11:15
    Privacy vs Security: A Pointless False Dichotomy
  • 11:15 - 12:00
    Cyber for SME’s – ‘Falling between the cracks’
    • -Why SMEs are better targets
    • -Current State
    • -The oncoming IoT revolution
    • -Cyber Resilience
    • -What SME boards need to do different
  • 12:00 - 13:00
    Lunch and closing comments

Venue

Famous Three Kings

171 North End Road, Fulham, London, W14 9NL

View venue website

Are you interested in sponsoring?

Contact Tom Odams, Head of Sales, on todams@rantevents.com or 020 3874 1568 to discuss your requirements and tailor your sponsorship package.

gold
silver
silver
silver
silver
silver
bronze
bronze
bronze
partner
partner
partner
partner
partner
partner
partner
partner
partner
partner

Informative, fun and great discussion/debate as usual. Cracking Event. Keep on doing what you do so well!

A RANT Conference attendee

The RANT Roundtable Dinner was a very good evening. I met some interesting people and there was some lively discussion on various topics. I’d also like to mention some positive engagement that came about after last year’s Infosec Rant. Thanks to a very topical discussion at RANT on Neurodiversity, I was introduced to a group of neuro diverse students studying Information Security in Worcester, who joined me on a Pentesting project within my organisation. This project provided them with exceptional work experience and allowed us all to learn from each other. This successful project will hopefully be run again this year, and is all thanks to a conversation held at a Rant event.

Neil Cornfoot, Principal Security Engineer, Telefonica UK