Andy Bates, executive director of the Global Cyber Alliance, shares his insights on key cybersecurity and fraud challenges facing UK organizations in the year ahead, with an emphasis on:
How defenders and defenses must adapt
As global CISO of one of the world's oldest and largest consumer goods enterprises, Bobby Ford sees not only the accelerated journey cybersecurity leaders have experienced in 2020, but also where the trip may be headed in 2021. In this exclusive keynote interview, Ford discusses the challenges of the current year and ...
Jasbir Solanki, CEO of the Homeland and Cyber Security division of Mahindra Defense System Limited, likes to call his group "The special services of cybersecurity." In this exclusive session, Solanki shares his unique perspective on what to expect in 2021, including:
Lasting impacts of COVID-19
Evolving threats ...
2020 saw major challenges for the world, not least for the cybersecurity industry. So as organizations and societies recover from pandemic-battling postures, what strategic adjustments and controls must CISOs employ as we enter 2021, particularly at a time when resources may be limited and uncertainty looms? Join this ...
Modern cyberattacks are not limited to network intrusions from outside by hackers. "Internal threat actors" can often be found at the center of a complex mix of simple social engineering attacks and sophisticated, multi-staged infections and data breaches.
The Zero Trust model, based on the simple principle of ...
The global pandemic has accelerated digital transformation and cloud adoption for all organisations. This journey to cloud has created some challenges for the security teams, who already are overwhelmed with volumes of security events and suffering with the security data spread across multiple tools, clouds and IT ...
Ransomware is a prevalent cybersecurity threat. Threat actors are constantly changing tactics looking for new ways to force ransom payments. With each new emerging ransomware threat family, the size and scope of threats are more aggressive too. This has led to incredible increases in the average ransoms paid over the ...
In the age of digital transformation, new privacy legislation and a greater emphasis on both security and privacy by design, security and privacy leaders are forced into a whole new level of collaboration. There can be natural tension between the disciplines, but it can be healthy tension.
In this exclusive panel ...
Join this session to learn about IBM Cloud Pak for Security, an open platform that helps you uncover hidden threats, make more informed risk-based decisions and prioritise your team's time. With IBM Cloud Pak for Security you can:
Gain Security insights: connect to your existing data sources to generate deeper ...
Security orchestration, automation, and response (a.k.a. SOAR) is the cool kid on the block in security right now. Implementing SOAR requires a both a strategic and a tactical approach, in order to avoid pitfalls and ensure ongoing success. The benefits of SOAR are many-fold - such as improving operational efficiency ...
At the start of 2020, the legal and compliance communities were focused on the enactment of CCPA and other global privacy initiatives. A worldwide pandemic later, and the focus is on business resiliency, insider risk and visibility into a new army of endpoint devices. Many enterprises accepted new risk to deploy their ...
Many businesses are implementing software security solutions. But as hackers get more sophisticated, threats are attacking the hardware layer. Hardware-based security features built-in to the hardware provide an important layer of protection for business devices, applications, and data. The Intel vPro® platform ...
Business Email Compromise (BEC) attacks are increasingly used by attackers as a way of targeting organizations. According to Gartner, through to 2023, BEC attacks will continue to double each year to over $5 billion and lead to large financial losses for enterprises. How can CISOs respond to this ever increasing ...
Web and mobile apps now represent the single most lucrative set of targets for cybercriminals - which means that application security has never been more important. Together, our combined F5 and Shape Security solutions deliver a comprehensive application security stack that marries best-in-class defences with the ...
Andy Bates joined the Global Cyber Alliance (GCA) in September 2017 as its Executive Director for the United Kingdom, Europe, Middle East and Africa. He brings more than 25 years of experience to GCA, having served as a Chief Engineer, Business Development Consultant, Product Development Director, IT Director in Racal, Cable & Wireless and Level3. Bates most recently served as the CTO at Verizon EMEA.
While working across a range of technologies such as network, cloud, mobile, VOIP & identity, he has tended to specialize in large secure solutions for governments and challenging the status quo and conventional wisdom of security. He was deeply involved with systems such as Government Secure Intranet, PSN, Police National Network, as well as working with all the major UK government departments and international government customers and agencies, including NATO.
Bates is a Chartered Engineer and Fellow of the Chartered Management Institute. He has presented at multiple conferences including RUSI, EU Parliament, Johannesburg, and Budapest.
CEO - Homeland & Cyber Security, Mahindra Defence Systems Limited
Jasbir is the Chief Executive Officer of Mahindra Defence System Limited (Division - Homeland & Cyber Security), a Mahindra & Mahindra Ltd company.
He is an Armed Forces Veteran and global business leader with extensive experience in business development, new product & concept creation, collaboration & strategic partnership, sales & project management team development in Defence, Homeland Security & Smart Cities industry.
His lead from front style of leadership, combined with sharp focus on customer experience has helped Mahindra Defence emerge as one the leading Defence & Security solution providers in India.
In a career spanning 18+ years, Jasbir has held several leading & challenging positions with Indian Navy & Mahindra group. He was the youngest head of technical department who prepared Indian Navy sail ship INS Tarangini for the first circumnavigation voyage and sailed onboard it for seven months. Among few in the world who have been fortunate to sail across Atlantic Ocean on a sail ship. He was awarded on the spot Chief of Navy Staff commendation for saving/salvage operations of INS Agray, Anti Submarine Warfare ship at sea. He lead Mahindra team to win & deliver the World's Largest Integrated Police Emergency Management system catering to 220 Million population from a single command & control centre which include our vehicles, people & technology.
A mechanical graduate with distinction from Pune University, Marine Engineer certification from Indian Naval Institute, Lonavla, Master in Financial Management from Jamnalal Bajaj Institute of Management, Mumbai, Armed Force Management Certification, MDI Gurgaon are some of his key educational qualification.
Jasbir has been a key note speaker at some of the leading defence & security conferences such as Counter Terror Expo- London, Oil & Gas summits-Singapore, Smart Cities - Delhi, Port Security- Mumbai. He is a distinguish member of FICCI Homeland Security committee and plays active role in industry collaboration bodies & Government committees on National Security domain.
Miller is the owner and director of Aedile Consulting, a U.K.-based company specializing in cybersecurity. Previously, he was CISO for Brevan Howard, a global hedge fund, and security operations lead for IG, a financial services firm that provides a derivatives trading platform. He began his career at the UK intelligence agency GCHQ, working on cybersecurity, counter-terrorism and other issues.
Mentioned on the '100 Global CISOs for 2020' list and awarded 'CISO of the Year, 2020' by SC Awards Europe, Becky Pinkard is a renowned practitioner and commentator on the information security sector who has been working in information technology and security since 1996.
A security transformation expert, Becky is experienced with business case preparation and execution through to funding and implementation. She has excellent communication and presentation skills with the ability to distil highly technical concepts for an executive audience. Becky has strong vendor management and relationship-building capabilities. Her background and experience to date has provided her with broad information security expertise, coupled with in-depth, technical capabilities around cyber security and data monitoring, vulnerability and risk assessment, web application security and policy development.
Becky is an active advocate for promoting diversity and inclusion in business and is a co-founder of the 'We Empower Diversity in Start-ups' (WEDS) group. She has been a CyLon mentor since 2017, providing cyber security, operations and client success guidance to entrepreneurs. She also co-hosts a monthly podcast, Cyber Warrior Princess, focused on current cyber security related commentary.
Becky was a SANS Certified Instructor for over a decade and served as a GIAC Certified Intrusion Analyst advisory board member and on the Strategic Advisory Council for the Center of Internet Security. She co-authored "Nmap in the Enterprise" and "Intrusion Prevention and Active Response, Deploying Network and Host IPS". Becky has shared her expertise in numerous publications, both written and in live interviews all over the world, including: The Wall Street Journal, Forbes, ChannelPost, The Telegraph, The New York Times, BBC News, Channel 4 News, and more.
An information security professional with over 20 years of experience leading teams in technical environments, across highly regulated industries and delivering complex solutions.
Historically I have designed, built and supported integrated security solutions on-premise or in data centres and have transformed this experience and my skills to apply to the Cloud. I have a broad understanding across all security domains and specialise in applying this agnostically to Public Cloud and DevOps environments. Having supported production workloads for UK Government on AWS from 2010 onwards I have seen the public cloud emerge and mature. Initially I supported clients to understand the cloud landscape technically and influence decision makers and accreditors to gain approval to transform and modernise workloads, whilst maintaining necessarily high levels of security. Now my team and I design and delivery solutions across all Cloud Service Providers and industries with a recent focus on enterprise level Financial Services.
Goettl is the Director of Product Management for security products at Ivanti. Chris has over 15 years of experience working in IT, where he supports and implements security solutions for Ivanti customers and guides the security strategy and vision for Ivanti security products. He is also a security evangelist speaking at security events globally where he gives guidance around modern cyber threats and how to combat them effectively. Chris hosts a monthly webinar focusing on Patch Tuesday and security vulnerabilities, and frequently blogs about security topics. You can find contributed articles as well as commentary from Chris in notable security news sources like SC Magazine, Redmond Magazine, ComputerWorld, ThreatPost, Help Net Security, and more.
MSSP & Cloud Pak for Security Sales Leader, IBM EMEA
Lee Harris served eight years in the British Army before embarking on a career in IT Sales. With 26 years sales experience across IT, he has spent the last 15 years in Cyber Security. Joining IBM 6 years ago specialising in Threat Detection and Remediation, he has worked in most sectors of the market, concentrating on MSSP's for the last three.
He now leads the Sales Strategy in EMEA for MSSP's and Cloud Pak for Security.
Samantha has 20 years of experience in cyber security, and during this time has held a plethora of roles, one of her favourite titles being Global Threat Response Manager, which definitely sounds more glamorous than it was in reality. She has defined strategy for multiple security products and technologies, helped hundreds of organisations of all shapes, sizes, and geographies recover and learn from cyberattacks, and trained anyone who'll listen on security concepts and solutions.
In her current regeneration, she's thoroughly enjoying being a part of the global product marketing team at Exabeam, where she has responsibility for EMEA, SaaS, plus anything that has "cloud" in the name. Sam's a go-to person for data compliance related questions, and has to regularly remind people that she isn't a lawyer, although if she had a time machine she probably would be.
She authors articles for various security publications, and is a regular speaker and volunteer at industry events, including BSides, IPExpo, CyberSecurityX, The Diana Initiative, and Blue Team Village (DEFCON).
Kristin Judge currently serves as CEO of the Cybercrime Support Network (cybercrimesupport.org). To address the needs of cybercrime victims, she founded this nonprofit to work with federal, state and local law enforcement and consumer protection agencies to help consumers and small businesses affected by cybercrime. With their United Way partners, CSN has been awarded over $3M in DOJ federal grants to serve
victims and is building the US "Cyber 911" to serve millions of cybercrime and online fraud victims. In 2008. she was elected to serve as a Washtenaw County Commissioner and supported the U.S. Department of Homeland Security in growing cybersecurity outreach to state and local government officials. After elected office, she worked at the Center for Internet Security, focusing on connecting state and local governments to federal services and technology needed to improve cyber security. As Director of Government Affairs at the National Cyber Security Alliance (NCSA), Judge worked with Google, FTC, FBI, SBA, DHS, NIST, congressional leaders and other key stakeholders across the country to educate consumers and businesses how to protect sensitive data.
Attorney, Cybersecurity, Information Governance and Privacy Practice Group, Troutman Sanders
Sadia Mirza is part of the Cybersecurity, Information Governance and Privacy practice group at Troutman Sanders, and is also part of the Financial Services Litigation practice group. She provides strategic privacy compliance counseling, and defends, counsels and represents companies on matters relating to data privacy, data use, and incident response and investigation, with an eye towards helping clients avoid litigation. Additionally, she has experience with the California Consumer Privacy Act of 2018 (CCPA), the Fair Credit Reporting Act (FCRA), the Gramm-Leach-Bliley Act (GLBA), as well as various other laws concerning privacy and cybersecurity. Mirza's in-house background allows her to understand the issues and concerns clients have and guide them toward resolution in a clear and efficient way. She has worked with clients from a variety of industries, including financial institutions, consumer reporting agencies, insurance companies, healthcare providers, and data and analytics providers. Prior to becoming an attorney, Mirza worked for JPMorgan Chase and Washington Mutual Bank. Her ongoing interest in the financial services industry led her to pursue an LL.M. in banking and finance after graduating from law school.
Chief CyberSecurity & Privacy Officer, IT Security Consultants; former CISO, Kellogg Company
David Ogbolumani was CISO at the Kellogg Company from 2008 till 2013 and has been in consulting practice since then. David has delivered advisory services in Information Security, Infrastructure Engineering, Data Privacy, Network Operations, Project Management, Mergers & Acquisitions, Secure Software Development, Systems Auditing, and Regulatory Compliance to leading organizations including GE, Abbott Lab, BP-Amoco, The World Bank, Northern Trust Bank, JP Morgan, Aon Corp, Phillips Electronics, CNA Insurance, SAIC, SunGard Data Systems, Underwriters Lab, Saudi Aramco, Keane Corp and the US Government.
David is a current member of the Academic Advisory Board in the Center for Cyber Security and Forensics Education at the Illinois Institute of Technology which is designated as a National Center of Academic Excellence in Cyber Defense Education by both the U.S. Department of Homeland Security and the National Security Agency (NSA). He was a past Governing Body Member of the Chicago CISO Executive Summit and a member of the Security Advisory Board at the Executive Council.
Marika Dziuba is a PC security and manageability specialist in the EMEA region. She is part of a worldwide team responsible for Intel business client platforms, end-point security solutions and other enterprise products. Serving as a trusted technical advisor Marika is providing oversight and technical guidance to resolve considerably complex issues to enterprise customers and government institutions often working with leading technology companies. Marika holds an engineering degree in Computer Science and Electronics.
Jeff Kilford worked in Intel IT for 25 years in a variety of leadership roles spanning client, server and applications development. In 2018 he moved from Director of EMEA IT to lead Intel's Client Compute Group in the UK. Jeff is a senior subject matter expert on IT strategy, specialising in client fleet management and cloud strategy.
Andrew Rose is Resident CISO for the EMEA Region at Proofpoint. His focus is driving Proofpoint's people-centric security vision, strategy and initiatives amongst the company's customer base, bringing hands on experience, knowledge and perspective in managing risk and improving cyber security posture across complex enterprises. Andrew was previously Chief Security Officer of Mastercard subsidiary Vocalink, who are responsible for much of the UK's instant and bulk payments covering over 90% of UK salaries, over 70% of UK bill payments and nearly all UK benefit payments.
Andrew brings with him a wealth of additional industry expertise from a number of CISO roles including at the UK's Air Traffic Control provider, NATS, where he oversaw a security transformation and contributed to the design of the next generation air traffic control system. Andrew has also held CISO roles at top tier global law firms Allen & Overy LLP and Clifford Chance LLP and was a Principal Analyst at Forrester Research where he covered the role of the CISO and Security Culture and Awareness as two of his specialty areas.
Rosen, a Principal Solutions Engineer at Keeper Security, Inc., has over 30 years of information technology experience that spans startups to Fortune 500 companies, to federal government agencies. A veteran of the United States Navy, Mitch has worked in IT support, devOps, technical training, and solutions engineering. He has focused the last six years helping thousands of organisations better understand and reduce the risks associated with privileged accounts and password.