The Future of IT & Cybersecurity

CXO Think Tank

October 18, 2022 - London, UK

Visionaries

Leo Cunningham (1) Owkin Inc
Leo Cunningham

CISO

Owkin Inc

Think Tank Speaker

Leo has a successful track record working within different blue-chip companies and industries ranging from Start-ups/Scale-ups, Banking, FinTech, SaaS and eCommerce, providing insight, consultancy and strategy across global remits covering Information Security, Cyber Security, GRC, Auditing, Cloud and a multitude of compliance remits including PCI DSS, SOX and GDPR. At Flo Health, the number one health and wellbeing app. His team protects the data of 250 million users, equating to 300 billion data points. He is currently an advisor to multiple start-ups from the Palta Group. He has been instrumental in leading security efforts within HealthTech and FemTech. In June 2022, Flo Security delivered the industry’s first ISO 27001 certification. Leo is a multi-award winner. A Snyk influencer. A Keynote speaker worldwide and was added to the CISO Platform Top 100

Khadir Fayaz CBRE
Khadir Fayaz

VP CISO, Cybersecurity

CBRE

Think Tank Speaker

Khadir Fayaz is a progressive Cyber Security Digital Executive Leader with more than 18 years of experience in driving large scale digital security initiatives, cyber resiliency programs and business information security engagements. Delivered successfully global digital security transformational programs with multi-million dollar investments. Transformed security as an enabler and accelerator for the business through frictionless services to meet both compliance & privacy requirements such as PCI DSS and GDPR. Dynamic, metrics-driven leader of international and virtual teams’ adept at integrating people, business processes, and technology assets into effective risk reduction strategies to elevate organizational security posture from external and internal threats. Significantly improved the risk culture and security maturity in some of the world’s largest PropTech, Learning, FMCG, Financial, Manufacturing, Technology Consulting, Hospitality & Travel companies. Built strong customer and business partner relationships, effective teams across the full spectrum of information security services. Hired and developed global talent, and operated truly globally having extensive hands-on experience in Asia Pacific, UK and USA. A highly sought-after speaker who has contributed immensely to the industry through tech start-up mentoring and holding non-executive director roles.

Cameron Brown Deloitte
Cameron Brown

Director - CyberSecurity - Risk Advisory

Deloitte

Think Tank Speaker

Cameron is a seasoned cyber defence advisor and information security strategist who has worked for the United Nations, governmental and law enforcement agencies, as well as leading multinational corporations. He consults across verticals to guide his clients in maturing strategic and tactical security capabilities, incident response measures, proactive defence, and resilience investments, and devising effective countermeasures to insider threats. Cameron has also conducted in-depth research into emerging trends in cybercrime offending, forensic science, data protection, and cyber-warfare. He is an author and contributor to books and articles on many aspects of cybersecurity and a regular speaker at international conferences. He holds multiple bachelor and master level degrees in law, behavioural science, international security, policing, intelligence, and counterterrorism, in addition to vendor neutral technical certifications and accreditations. Cameron enjoys working at the intersection of technology, security and law and building capable teams to deliver services that organisations need to operate safely, competitively, and effectively in today’s digital world.

Leo Cunningham Flo Health Inc.
Leo Cunningham

Former CISO

Flo Health Inc.

Think Tank Speaker

Leo has a successful track record working within different blue-chip companies and industries ranging from Start-ups/Scale-ups, Banking, FinTech, SaaS and eCommerce, providing insight, consultancy and strategy across global remits covering Information Security, Cyber Security, GRC, Auditing, Cloud and a multitude of compliance remits including PCI DSS, SOX and GDPR. At Flo Health, the number one health and wellbeing app. His team protects the data of 250 million users, equating to 300 billion data points. He is currently an advisor to multiple start-ups from the Palta Group. He has been instrumental in leading security efforts within HealthTech and FemTech. In June 2022, Flo Security delivered the industry’s first ISO 27001 certification. Leo is a multi-award winner. A Snyk influencer. A Keynote speaker worldwide and was added to the CISO Platform Top 100

Jimmy Jones ZARIOT
Jimmy Jones

Head Of Security

ZARIOT

Think Tank Speaker

Jimmy Jones is a telecoms cybersecurity expert and Head of Security at ZARIOT. Jimmy’s experience in telecoms spans over twenty years in which time he has built a thorough understanding of the industry working in diverse roles but all building from early engineering positions within major operators, such as WorldCom (now Verizon), and vendors including Nortel, Genband & Positive Technologies. In 2005 Jimmy started to focus on telecom security, eventually transitioning completely in 2017 to work for a specialist cyber security vendor. He now brings all his industry experience to deliver agile and secure digital transformation with ZARIOT.

Philip Hoyer Videojet Technologies
Philip Hoyer

CTO Software BU

Videojet Technologies

Think Tank Speaker

Philip Hoyer CTO – Software BU at Videojet – a Danaher company, where, as chief connector of dots, he inspires the various software teams at Videojet to build software and IOT platforms the right way. Philip is an experienced technology executive in the security and identity space, previously also leading the Strategic Innovation function at HID Global, exploring machine - learning, frictionless access, Blockchain, securing the internet of things and augmented reality. He managed strategic alliances such as Microsoft and represented HID Global on standards bodies such as GlobalPlatform (Strategic Director and Chair of Identity Task Force), Smart Card Alliance, IETF and OATH. He is a recognised subject matter expert on Innovation, IoT, RFID / NFC, TSMs, Mobile Security, Identity, Access Control, Cloud Security and Payment Standards, especially in financial services and e-government, who regularly speaks at major conferences. He has over 25 years experience architecting, building and delivering IT solutions, much of which was gained working as a solutions architect for a large consultancy. He holds a first class honours degree in Software Engineering from Westminster University.

Steven Gillham Capital One
Steven Gillham

Cyber Security Specialist

Capital One

Think Tank Speaker

Steve is an experienced Cyber Security Specialist who has worked in many financial organisations. With over 15 years in Cyber Security and a further 25 years in IT in general giving Steve and wide knowledge based to build upon. Steve’s speciality is Vulnerability and Risk Management and is a mentor to junior members of the Security Teams.

Simon Gooch Accenture
Simon Gooch

CIO Director of Security

Accenture

Think Tank Speaker

As CISO for Accenture’s CIO and Global Digital Identity Lead for the IT powering the Accenture business, I have a key role in securing the critical technology that runs the Accenture business. Accenture’s IT supports a 150B+ company with 780k people, in 120+ countries and 400+ office locations. Reporting to Accenture’s CIO and working directly with Accenture’s CISO, I have overall responsibility for the enablement of Accenture's digital identity vision. In this role, Simon leads the strategy through to implementation and run of all new Identity and Access Management services. Simon is also accountable for the security strategy, architecture and compliance for all IT services that power Accenture that are run by the office of the CIO.

Thomas Kinsella Tines
Thomas Kinsella

Co-Founder & COO

Tines

Think Tank Speaker

Thomas Kinsella is the Co-Founder and COO of Tines, a no-code automation platform for security teams. Before Tines, Thomas led security teams in companies like Deloitte, eBay, and DocuSign. As COO, Thomas is responsible for customer success, professional services, and more. Thomas has a degree in Management Science and Information Systems Studies from Trinity College in Dublin.

Dr. David Movshovitz RevealSecurity
Dr. David Movshovitz

Co-Founder & CTO

RevealSecurity

Think Tank Speaker

Dr. David Movshovitz is an expert in software development and information security. David was previously the co-founder and VP R&D at Algotec Systems (acquired by Kodak), CTO and VP R&D of Magnifire (acquired by F5 Networks), and CTO and Co-Founder of Navajo Systems (acquired by Salesforce.com). David also headed an R&D team in the Israeli Defense Forces and is the recipient of the Israeli Defense Award. Dr. Movshovitz earned his PhD in Physics from Bar-Ilan University and teaches Information Technology, System Architecture, developing secure applications, and web security at the Inter Disciplinary Center (IDC) and Tel-Aviv University (TAU).

Lino Gambella Defenx
Lino Gambella

Chief Technology Officer

Defenx

Think Tank Speaker

Lino Gambella is a cyber security expert with over 20 years of experience. He is currently the Chief Technology Officer at Defenx Limited. Lino has a long standing relationship with Akamai technologies, first as a client and subsequently as a partner. He has a vast knowledge of Akamai solutions and uses them to custom fit perimeters around businesses ensuring maximum security. Lino is an advocate for the Zero Trust model and has helped many businesses adapt and implement this approach. He works closely with in-house technical teams to create an infrastructure that is reliable and secure.

Richard Meeus Akamai Technologies
Richard Meeus

Director, Security Technology & Strategy

Akamai Technologies

Think Tank Speaker

Richard Meeus has over 20 years of experience in designing and building secure solutions working as pre/post-sales, in addition to consulting roles. He has worked on some of the world's largest enterprise security solutions through Mirapoint, to being a key pre-sales component of Prolexic as it spearheaded the DDOS protection space.

James Hughes Rubrik
James Hughes

Vice President - Sales Engineering & Enterprise CTO EMEA

Rubrik

Think Tank Speaker

James Hughes is VP of Sales Engineering at Rubrik and formerly a field CTO focusing on our global enterprises. James joins us from Schroders where he was Global Head of Infrastructure & Shared Services Technology.  As a technology executive, he was responsible for their complete infrastructure transformation, building the global team, changing the operating models, leading DevOps & Agile, cloud adoption, automation and building a code-driven infrastructure. There he changed the user experience & perception of technology by building a platform which allowed global users to work from anywhere. Coupled with this were new channels to get insight & data, get new technology and support adopting a more Amazon & Apple approach to tech, rather than traditional financial services. Previously he was Head of Production Services at Premium Credit, VP of Infrastructure at PIMCO and Head of Central IT for Investec Bank Plc.  He is a Chartered Information Technology Professional with the British Computer Society and board member of various governance & standards bodies.

Nana-Ampofo Ampofo-Anti Cortex - Palo Alto Networks
Nana-Ampofo A.

Enterprise Security Architect - SecOps

Cortex - Palo Alto Networks

Think Tank Speaker

Nana-Ampofo is a seasoned IT, networking and InfoSec professional with a passion for using technology to transform the way we live, work and play. Nana’s experience ranges from developing technology solutions > safeguarding endangered rhinos > to assisting clients on global security transformation projects. Today, Nana works with some of the largest organizations in the world to provide his bespoke expert advice on their complex Security Operations challenges which are often impeding the SOC’s ability to succeed as a business

David Lomax Abnormal Security
David Lomax

Senior Systems Engineer

Abnormal Security

Think Tank Speaker

David is a Senior SE, with over 20 years of experience working in the technology industry, covering a variety of networking and engineering roles. He has experience of both on premise and cloud solutions in the cybersecurity space, helping customers and partners solve complex business problems.

October 18, 2022

Agenda

All times United Kingdom Time

12:30 PM-1:00 PM

Welcome & Registration


1:20 PM-1:45 PM
Keynote

The Future of SecOps?

What to Expect
Artificial Intelligence, Machine Learning, Automation - these terms get bandied about a lot in modern technology circles. At Palo Alto Networks we believe it will be the rise of the Centaurs [Humans augmented by Machine technology] and not only The Rise Of the Machines that will reshape Security Operations.
Join our speaker on this 30 minute tour of the world of AI, ML and automation and learn how the rise of the centaurs will change everything in SecOps as we know it
In partnership with:
Palo Alto Networks + Cortex

1:40 PM-1:55 PM
Disruptor

Staff Shortages

We have always suffered from a shortage of good security employees. Is it any wonder we have trouble recruiting and motivating good security people?


The shift to work from home that was accelerated by the start of the COVID pandemic has resulted in a sharp increase in cyberattacks. Companies of all sizes were simply unprepared for the sudden and massive switch to remote work. As a result, data exfiltration and leakage has increased most sharply. Phishing, ransomware, VPN breaches and other security events have all shot up as well. Inevitably the sheer persistence of these attacks led to more hours of work needed leading to staff burnout, often more severe at organizations that are still trying to fight present battles with yesterday’s tools. Many believe that a new approach is needed to prevent cybersecurity staff burnout increasing the demand for more automated solutions since yesterday’s tools are not nearly as successful at stopping attacks as state-of-the-art methods, in addition to increasing the workload for cybersecurity staff, using them also exposes organizations to major losses.

In partnership with:
Tines

1:55 PM-2:10 PM

Networking Break


2:15 PM-3:00 PM
Fireside Chat

Have You Been Breached Yet?

Preventing and Protecting Your Organisation against an Inevitable Cyber Security Breach.

Fallen victim to a data breach yet? If not, your organisation is one of the lucky ones - for now. Cyber attackers are using ever more sophisticated attempts to execute cyber-attacks on a daily basis. Realistically, it's unlikely that an organisation can swerve an attack without robust cyber security measures already in-place to prevent, detect and mitigate cyber threats.

Hear from Akamai's EMEA Director of Security Technology and Strategy Richard Meeus and Defenx’s Chief Technology Officer:

  • From DDoS & Zero Day vulnerabilities to phishing - understand the common attacks in the cyber threat landscape.
  • Discover cyber security models and strategies to protect your organisation should it fall victim to an attack.
  • Learn how you can provide your users with risk-free access to applications and services.
In partnership with:
Defenx

3:05 PM-4:00 PM
Panel

Ransomware/Extortionware

CISOs face a huge headache trying to understand how to know when they were attacked, what data attackers have corrupted? How quickly can they recover from the attack? And do they have to pay a ransom to get the data back?
Ransomware remains a significant challenge for companies, not simply because it has become ubiquitous, but also because of the significant impact a single ransomware attack may have on a company and every other company or customer that relies on that company.

Cybersecurity and risk management have always been vital for the flow of any business. However, the current condition of the global supply chain makes it exceptionally vulnerable to severe damage from an attack more so than usual. When the supply chain is barely getting by, criminals are more likely to assume they have leverage over businesses. A ransomware attacker may be more brazen and exercise higher demands than they might have a few years ago.

In partnership with:
Rubrik, Inc

4:00 PM-4:15 PM

Networking Break


4:15 PM-5:10 PM
Panel

Monitoring Authenticated Users in Business Applications to Detect Imposters and Rogue Insiders

The risks posed by rogue insiders and external attackers make application detection a massive pain point for enterprises, especially in regards to core business applications. External attackers leverage stolen credentials to impersonate an insider and connect to applications, while at the same time insiders are not sufficiently monitored in SaaS and home-grown applications. Examples are a fraudster’s takeover of a checking account via social engineering, or a customer service agent modifying an insurance policy to add themselves as a beneficiary, or a salesperson downloading a report of all customers before switching to work at a competitor. Current detection solutions are application-specific and in most cases ineffective, therefore requiring a new approach. However, the problem goes beyond detection itself, because even after the enterprise receives a complaint or is otherwise suspicious, investigating these suspicions usually consists of manual sifting through tons of log data from multiple sources, which is time consuming and ineffective in many cases.

This panel will explore the growing need for application detection and the problems with current rule-based techniques for application monitoring. Panelists will discuss potential solutions using real examples, such as the analysis of user journeys within the application and across applications to accurately detect malicious activities performed by authenticated users.

In partnership with:
RevealSecurity

5:15 PM-5:30 PM
Disruptor

Key Considerations for Choosing the Right Cloud Email Security Platform

Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.

Unfortunately, email threats are only growing in number. Business email compromise accounts for 35% of all losses to cybercrime, and the Verizon Data Breach Investigations Report holds that phishing remains the top entry point for breaches - a position it has held for years.

Does that mean email is doomed, and we should give up? Quite the opposite. But the shift to cloud email requires one major thing: a shift to cloud email security.

Attend the Abnormal Security session for answers to your most pressing questions, including:

  • What are modern email threats, and how are they different from legacy attacks?
  • Which email threats are most concerning, and how can we defend against them in the cloud environment?
  • Which technical capabilities are required when protecting cloud email?
  • How can cloud email security platforms detect the most dangerous attacks?
In partnership with:
Abnormal Security

5:30 PM-5:35 PM

Closing Remarks


5:35 PM-6:35 PM

Cocktail Hour