Once again, we find ourselves fast approaching the dreaded three days of vendor booths, product launches, plastic lightsabers and over-subscribed talks that make up InfoSecurity Europe.
This year and in keeping with RANTs usual post-show networking evenings, Progress Distribution and RANT Events are proud to be providing three days of talks, debates, networking, meetings, food, drinks, competitions and workshops for the end-user community located just down the road from the big show.
We’re taking over the Famous Three Kings Pub for the duration and are offering a unique hub for those looking to take a deep dive into Cyber Visibility and Vulnerability Management.
So why not pop down to meet, chat, network, enjoy our hospitality (and sit down) with RANT, Progress and our vendors and partners who are offering some of the hottest cyber security technologies in the market today.
Topics, speakers and further details on theme tbc over the coming weeks, but if you would like to put your name forward to contribute to the agenda as a speaker or panellists, just let us know!
This talk deals with lessons learned from over a decade of helping organizations as they struggle to measure the elusive concept of security. Getting the right measure to the right audience is a delicate art, and there are many ways to do it wrong.
A brief history review of one of the most ruthless, yet effective, counterintelligence organizations ever, the Stasi. A look into their development and use of a methodology coined Zersetzung which they implemented, and perfected, to influence and control the masses. Individuals and countries are still being affected by their efforts 30 years after their ruthless techniques were used.
Their perfected methodologies can be seen today, implemented using modern technologies to facilitate large scale counterintelligence activities. These efforts have been ongoing for years and have swayed world opinion on a regular basis at critical moments. Coupled with the direct-action capabilities, this methodology is now used in conjunction with modern warfare as seen in a short case study.
With human errors being the #1 cause of cyber incidents and data breaches, it is now a CISO imperative to tackle behavioural change and focus on building a cyber risk aware culture. There are multiple drivers behind the rise of cyber security culture as a recognised need within organisations. It reflects the acceptance that how an organisation behaves is dependent on the shared beliefs, values and actions of its employees, and that this includes their attitudes towards cybersecurity. There is the recognition that traditional awareness raising campaigns (e.g. CBT, phishing simulations) are not, in themselves, affording sufficient protection against ever evolving cyber-attacks.
Key topics covered in this presentation:
• People-related challenges and frustrations the industry is facing
• Why a new approach to awareness and culture is required
• Innovative approaches adopted by leading organisations
Your organisation can only be secure if you strengthen the human firewall and make people your strongest defence. Attend this session to discuss how to turn your “weakest link” into your biggest advantage in cyber security!
Consuming and using threat intelligence is an emerging discipline, listen to how organisations are adapting their strategy towards threat intelligence towards better metrics, better security (less infections remediated faster) and augmenting human security resources not consuming human security resources.
What is the best approach to prevent email phishing, the world’s biggest cybersecurity problem? The ideal solution would “see” an email like a human would, but then instantly analyze the email like a smart machine would, detecting brand impersonation, forgery and anything suspicious. Let’s talk about why this is a challenge, and how the best cybersecurity solutions should have the lowest friction – they should be effective, of course – but also easy to deploy, flexible, and helpful for end-users.
Topics include: “ Privacy – who cares?”
RANT and ISSA-UK bring you an expert panel who will take a retrospective look at overhyped security tools/techniques and how they actually turned out – good, bad or ugly.
“There was an idea; Stark knows this. Called the Avengers Initiative. The idea was to bring together a group of remarkable people, see if they become something more. See if they can work together when we needed them to. To fight the battles that we never could.” ―Nick Fury
Deception has longed been used in the physical realm to great success, especially by strategic thinking military commanders to win complex battles. During this talk, we’ll discuss some of the great applications of deception over the millennia in battles and how it’s become a common part of warfare. Today the cyber realm is also a domain that militaries acknowledge they must fight and defend to protect their countries. We’ll discuss how the fight though isn’t limited to militaries in the cyber domain and that CISOs have a globally interconnected enterprise that’s also under continuous attack from nation-states, organized crime, and other malicious actors. We’ll discuss how deception is broadly applicable in the cyber realm and how it can help CISOs be more strategic in their approach to help win battles against their adversaries.
The greatest cyber security threat an organisation faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders – the contractors, vendors, privileged users and business users who already have full access to your company’s systems and sensitive data. Addressing this type of threat requires a different approach than addressing external threats; whether unintentional or malicious, organisations with sensitive customer data need to quickly identify and eliminate insider threat. Join us to learn best practices and hear real life examples for building and maintaining an effective insider threat program, so your biggest assets remain just that!
The classic cyber security architecture relies on gathering huge amounts of information and using expensive technology and even more expensive people to find the occasional needle in digital haystacks. This cannot scale to match the exponential growth of tomorrow’s problems. There has to be another approach. Will today’s users be tomorrow’s knights in shining armour?