The Kia Oval, London 24 March 2022, 8:00am - 4:00pm
Tell people not to click a link, pat each other on the back, and ride off into the sunset. If only security awareness training was that simple.
In this session, Javvad Malik, Lead Security Awareness Advocate for KnowBe4, will explain how to take your security awareness to the next level and prevent it from going stale. Changing behaviours and creating a culture of security can only be achieved by adopting the right mindset and techniques.
In this session you will learn:
A brief review of some of the latest findings from the latest CrowdStrike Global Threat Report, what to expect next and how to protect our organisations, colleagues and customers.
Mobile SIMs can be the gateway to disaster or freedom. Discover how a solid cyber resilience plan for mobile will boost and secure connectivity whilst protecting your public sector organisation against compromise and ransomware.
Akamai’s EMEA Director of Security Technology and Strategy Richard Meeus will outline cyber security best practices for public sector organisations in today's threat-filled landscape.
Attend the session to:
When it comes to securing their networks, what public institutions have at their disposable is far outweighed by the tooling and techniques of their adversaries. Due also to the prolonged pandemic, challenges such as remote work and learning, overloaded healthcare systems, and compromised security perimeters have been more commonplace than ever.
So what should the public sector consider to better navigate the complex security landscape? How can they keep their data safe while performing and facilitating often vital work for members of the public?
Steve Nurton, Senior Technical Account Manager at F-Secure will discuss the above questions in light of a recent case study. This will be followed by a brief overview of what flexible, cost-effective security should entail for organisations looking to maintain or build on their security posture.
Managing the ever-expanding threat landscape, especially given how busy security teams already are, is becoming increasingly difficult. As an innovative security leader you’re working hard to keep your organisation safe. But in order to do that, you need to be faster at finding the vulnerabilities that are most critical.
In this session you will learn:
Join ThreatLocker's Director of Cybersecurity, Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. Understand how businesses are enhancing their cyber resilience and significantly limiting the damage ransomware can inflict with a Zero Trust architecture.
Following in the footsteps of a cyber-criminal and uncovering their digital footprint. This is a journey inside the mind of an ethical hacker's response to a ransomware incident that brought a business to a full stop, and discovering the evidence left behind to uncover their attack path and the techniques used. Malicious attackers look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access sensitive information. This session will show you the attacker's techniques used and how they went from zero to full domain admin compromise that resulted in a nasty CryLock ransomware incident.
In this session I will cover a real-world incident response to the CryLock ransomware showing the techniques used by the attackers. The footprints left behind and uncovering the techniques used.
• How attackers gained access to system
• Established staging
• What tools were used
• What commands were executed
• How the ransomware was delivered
• How AD elevation was achieved
*programme subject to change
The web browser you are using to access this website is unsupported, which means certain aspects of the site wont work properly.
To use the website we recommend upgrading to a modern web browser such as Edge, Safari, Chrome, or Firefox if possible.