The Kia Oval, London 20 October 2022, 9:00am - 4:00pm
This panel session will explore the challenges and opportunities in diversifying the Cyber Security workforce both within the NHS, and in the UK Healthcare sector more broadly.
AI for HealthSec - A Dynamic and Self-Organized Artificial Swarm Intelligence Solution for Security and Privacy Threats in Healthcare ICT Infrastructures
From the Goldacre Review to the NHS Innovation HUBS there is a balance of maintaining the utility of data whilst privacy is preserved. Trusted Research Environments (TREs) as a concept is not new but has gained a lot of attention recently. Whether it is the silver bullet encapsulating security, data protection compliance and with the ability to save lives is garnering excitement. This talk explores the TRE concept from a first person point of view from the first person to successfully add non-governmental Children's Social Care data to the Office for National Statistics arguably the first TRE in existence.
Preventing and Protecting Your Organisation against an Inevitable Cyber Security Breach
Fallen victim to a data breach yet? If not, your organisation is one of the lucky ones - for now. Cyber attackers are using ever more sophisticated attempts to execute cyber-attacks on a daily basis. Realistically, it's unlikely that an organisation can swerve an attack without robust cyber security measures already in-place to prevent, detect and mitigate cyber threats.
Hear from Akamai's EMEA Director of Security Technology and Strategy Richard Meeus and:
It’s hard to know what’s more complex these days, the threats, or the plethora of tools we use to contain them. What if the solution doesn’t involve buying any more cybersecurity product, but instead making better use of what you have?
Join Delinea as we go through the journey of a successful PAM implementation. As 80% of cyber-attacks come from breached privileged accounts, there is a growing importance to manage at risk credentials and take control over you’re your vulnerable infrastructure. During this session we’ll discuss the importance of PAM, where to start and how to effectively increase your security posture by maturing your privileged access management.
Why join?
It’s hard to believe, but Ransomware is decades old. However, in the last 5+ years its notoriety has really grown, going through nearly as many evolutions both in capabilities & the degree of organizational structures behind it. The scale of businesses targeted grew from 55% to 75% in just the last 12 months alone. With so much evolution and change, are existing prevention, detection & response strategies and capabilities still fit for purpose?
David Hodnett, Head of Operations, NHS App
The web browser you are using to access this website is unsupported, which means certain aspects of the site wont work properly.
To use the website we recommend upgrading to a modern web browser such as Edge, Safari, Chrome, or Firefox if possible.