RANT Reloaded: bringing you the very best of RANT to date. Join us on Thursday 25th February 2016 from 12pm where we will take RANT back to its roots, and provide you with a day of controversial discussions, exciting debates, peer to peer networking, a unique RANT Soapbox and of course lots of networking time and beer!
As with all our RANT events, RANT Reloaded is for senior level Information Security professionals working within an End User environment only. Your registration will be declined if you do not meet this criteria, as per the Terms and Conditions.
RANT Reloaded will provide a unique platform for the End User Information Security community to discuss and debate real-life, pertinent and controversial industry topics in a range of formats that encourage participation and controversial debate. All RANT Events operate under the Chatham House Rule.
By joining us you will get to be part of enlightening and informative presentations and intriguing and interactive panel debates, our RANT soapbox packed with mini topical rants all presented by a selection of the industry’s top Ranters, thought leaders, evangelists and entertaining speakers.
It is a chance to network with like-minded professionals in an informal environment. Guests are encouraged to pitch in with their opinions, views, and suggestions throughout the talks.
RANT prides itself on being a completely sales-free zone and hence it is closed to security vendors and consultancies except for sponsorship.
Please sign up using your work email or contact the organiser if it is your first time at RANT so we can verify you meet our attendance criteria.
You can’t RANT on an empty stomach. So grab some delicious lunch and coffee, and get prepared for an afternoon of exciting RANT discussions.
rant (verb) – “
Chatham House Rule (noun) – “When a meeting, or part thereof, is held under the Chatham House Rule, participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed.”
debate (noun) – “A
In the last year, 71 percent of breaches in the UK came from a threat on the inside of the enterprise!
The insider threat is possibly the most successful yet least publicised ways to attack a company, past and current employees post a cyber threat so large, why are we not doing more to tackle these? This exciting panel will explore the many ways in which they understand this threat can be targeted, managed and prevented.
Should IT security vendors be trusted? Are they the peddlers of magic beans and snake oil that claim to solve all your cyber security ills. Or can you achieve the same or greater levels of protection with open source and DIY security? Can IT security vendors give you an unbiased view on the state of a threat and the types of solutions required to protect yourself, or are they just looking for a quick sale? Not all of them are evil sales orientated vendors and if targeted correctly they can bring a deal of productive input. During this panel discussion led by Orlando Scott-Cowley from Mimecast you can discuss the frustrations some may feel at such a ruling or if you think it would open the flood gates to a host of people who wouldn’t add any value to the proceedings.
Cyber attacks are up in the last 12 months, cybercrime costs the global economy $568bn annually, and cyber breaches increasingly dominating the front pages.
So why can’t we engage with colleagues and bosses on the importance of cyber security?” The answer is largely down to the ‘communication gap’ and the inability to win people’s hearts and minds. Why? IT professionals couldn’t communicate their way out of a paper bag!
So how do we turn the tide? How do you communicate complex concepts? How can you convey emerging dangers in ways that will elicit action? And how can you offer insight on risks the business faces in a way that is actionable and quantifiable? The panel will provide a range of techniques to help the community to start winning the cyber security communication battle within your organisation.
In the beginning, there was A/V, and it was good. But threats became more sophisticated, attackers got smarter and A/V alone couldn’t keep networks secure. Enter network sandboxing, and it too was good. But once again, attackers got smarter and found ways around it.
So what have we learned? You need an approach to security. There’s no silver bullet that can protect against every security threat. Adding next-gen endpoint security to your arsenal provides you with the visibility and response capabilities you need to keep pace with ever-evolving advanced attackers.
Kane will rant about what a true next-gen end point security solution should encompass and provide a guide to navigating the noise and understanding what your options really are.
Get ready for a fast-paced series of short and snappy RANTs from a selection of well-known RANTers, Rookies and Rebels. Each will have just six minutes to voice their opinions on the topics that they find most frustrating in the industry. Governed by our specialist judging panel, armed with buzzers and heckles, you can rest assured that there won’t be a dull moment. Be sure to grab them after the session to further elaborate on, and question their RANT, as we’re going to be pushing the clock.
Join us at our exclusive pop-up pub where you will enjoy an excellent selection of craft beers and fine wines. We will have a final classic beer-in-hand style RANT at 18:30 so you have plenty of time to visit our sponsors and catch up with your colleagues beforehand.
As our regular RANT’ers will know, the best RANTs happen with a beer in hand. So grab yourself a drink from our pop-up pub, and stick around to see one of our top RANTers take to the floor in the exhibition area for the final RANT of the day…
Emerging threats, sure…But what about the ones staring you in the face?
Before you start spending precious budgets and exploring disruptive technologies to combat advanced attackers and new threats, you still have a lot of work to do. The basics are still not being addressed effectively enough. Out of date infrastructure, flawed or non-existent patch regimes and the machine that no one is allowed to touch are just some of the real-world issues that must be addressed as an unavoidable first step on your journey to effective security, and yet no one appears to be doing it!