Skip to main content
ice 2024 LOGO NEW

Securing our digital world

24 - 25 September 2024 
Olympia London

Global Cyber Summit

Blue Image background 2

Global Cyber Summit

CONFERENCE PROGRAMME 

The Global Cyber Summit will feature panel discussions, fireside chats, and presentations looking at the real cyber issues impacting us today. This is your opportunity to see the latest product launches with companies on hand to talk about real life applications and case studies – don’t miss out on these game changing solutions from the NCSC, police and the intelligence professionals charged with understanding the real threats.

This Summit will give insights into the key areas needed to protect government, research, enterprise, SMEs, public sector and Government.

Day 1 will be Moderated by Ian Thornton-Trump, CISO Cyjax and Alan Jenkins, thecybrsecnav.
Day 2 will be Moderated by and Lisa Ventura, Cyber Security Unity and Ian Thornton-Trump, CISO Cyjax

SPONSORED BY:
iNFOBLOX Sponsor

Loading
10:00
  1. 30 mins
    • 2023 Global Cyber Summit
    Ciaran Martin, Chair of ICE's welcoming address to the event and his perspective of the state of Cyber today
10:30
  1. 30 mins
    • 2023 Global Cyber Summit
    • Why your Diversity & Inclusion efforts might be stalling
    • How to integrate the Social Model of Disability into culture & practice
    • Quick wins for recruitment, onboarding and communicating more effectively
11:30
  1. 30 mins
    • 2023 Global Cyber Summit
    The UK has kicked off the process for regulatory change affecting AI and cyber companies. The EU and the US pursue their own approaches, leading to companies needing to comply with divergent regimes. The AI race incentivizes governments to support the adoption of AI for cybersecurity and integrate it into their national security infrastructure. It is crucial to foster an enabling environment for effective collaboration between the public and private sectors.   
12:00
  1. 30 mins
    • 2023 Global Cyber Summit

    As cloud adoption continues to grow, so does the number of cloud-born security threats. However, cloud environments can present significant opportunities to improve security, with the right tools and processes in place. In this session, we’ll cover how security teams can best detect and respond to cloud-born threats and showcase how your Security Operations can integrate with your Cloud environment to enable unified threat detection, investigation, and response to make your cloud safer.

12:30
  1. 30 mins
    • 2023 Global Cyber Summit

    In this session, we’ll present the findings of Sonatype’s new 8th annual State of the Software Supply Chain Report. Over the past year, we empirically studied dependency update patterns for thousands of open source projects, analysed hundreds of survey responses, and took a critical look at commonly-held beliefs about effectively managing security risk.
     
    Our research has uncovered a vast chasm between perceived security and reality, a number of new trends in open source consumption, and surprising benefits to certain development team structures. Come see which practices are backed up by data and learn how to efficiently manage your open source software supply chain.

13:00
  1. 30 mins
    • 2023 Global Cyber Summit
    • Delegates will get to hear what the EU Network Information Systems Directive (NIS) is and why has it been updated
    • We will cover what the core requirements of the NIS 2 Directive are
    • Together with the audience we shall review how organisations can comply. Does NIS 2 apply to your businesses and what are the implications of non-compliance.    
13:30
  1. 30 mins
    • 2023 Global Cyber Summit

    ITN Panel Discussion  

    • Proactive Cybersecurity: Staying Ahead of Evolving Threats
    • Building a strong defence ecosystem through collaboration and information sharing
    • Raising cyber-awareness and empowering employees as the first line of defence 
    • Journey as a female from a diverse Background to a Senior Cyber Role, transitioning from engineering
    • Advocating for neurodiversity inclusion and fostering an inclusive cyber workforce
    • Recognising the importance of diverse skill sets in addressing the complexity of cyber threats  


     

14:00
  1. 30 mins
    • 2023 Global Cyber Summit
    • Challenges of managing sanctions risk in the current geopolitical setting
    • Current risks and new strategies for verification of counterparties and finding high-risk counterparties
    •  How to obtain reliable data on CIS businesses without spending time on applications to state registers
    •  How to check your business and contractors for links with sub-sanctioned PEP and companies
    •  How to find Russian and Belarusian assets beyond these countries 
    • Current risks and new strategies for verification of counterparties and finding high-risk counterparties
    • How does Sanctions affect everyday Russian people and business Typologies of Russian Sanctions Evasion   
14:30
  1. 30 mins
    • 2023 Global Cyber Summit
    • Decision makers are now understanding the need for cyber security and how it can contribute to overall business success
    • Hear how the need for technical information has not gone away
    • Needing the right vocabulary for both business and information security leaders is key
    • Learn about how the Security Outcomes Canvas is a tool to help give organisations complete visibility into exactly what they're defending, allowing them to focus on using cyber security to achieve business goals - a practical take away 
15:00
  1. 30 mins
    • 2023 Global Cyber Summit
    • What is the Telecommunications Security Act?
    • Who and what does it cover?
    • What is Ofcom's Role in the TSA?
    • What is TBEST and how can it aid in your security strategy and business case?  
15:30
  1. 30 mins
    • 2023 Global Cyber Summit
    • Why try and break into a company from the outside when you can simply get offered a job there and walk in?
    • Learn how Jake manipulated recruitment staff to land a job inside a company – and gain full access to the data within.
    • The Insider Threat is becoming more of a risk to businesses – can we really protect ourselves from creative ideas?   
16:00
  1. 30 mins
    • 2023 Global Cyber Summit

    What would it be like to be “there”, to offer a tap on the shoulder when people were about to do something risky?

    Tim will touch on:

    • “why nudge theory?”
    • what makes a good nudge
    • how to run a campaign to steer behaviours and the potential impact

    Tim will offer takeaways on how to apply the theory to your own awareness campaigns

16:30
  1. 30 mins
    • 2023 Global Cyber Summit
    • How DNS fits into the XDR framework and maps to NIS2
    • How contextual awareness and DNS-based threat intelligence can improve your SOC efficiency
    • How curated threat feeds enable you to stop fast-moving threats sooner and buy SecOps teams crucial time with ubiquitous visibility and automation
17:00
  1. 30 mins
    • 2023 Global Cyber Summit
    • Recognising the support needs of small businesses, including their current understanding and confidence around cyber security
    • The coverage, consistency and accessibility of existing support routes available to SMEs
    • The concept of Cyber Security Communities of Support, fostering localised collaboration between SMEs and advisory sources 
10:00
  1. 30 mins
    • 2023 Global Cyber Summit
    The CIA Triad is dated; its origins and value lay in technical operations. The Code of Ethics is about a framework of ethical behaviour. The CISSP is different. The CISSP doesn’t advertise itself as containing leadership principles. It is about the basics of high-level security assurance concepts. This is why courses like the CISSP need to be revamped. Holding CISSP or CISM does not make one a security leader. There are various definitions of principles. The Cambridge Dictionary defines it as a basic idea of rule that explains or controls how something happens or works. The Collins English Dictionary alternatively defines it as an accepted or professed rule of action or conduct. I prefer the definitions that principles are values guiding behaviours and actions. These nine principles are not confined to security practitioners engaged in governance activities. They can and should be leveraged by every security practitioner.  
    • Inter-disciplinary
    • Actionable principles
    • Trusted advisor  
10:30
  1. 30 mins
    • 2023 Global Cyber Summit
    • How not to do crime
    • How not to do cyber crime prevention
    • How to work better with one another  
11:00
  1. 30 mins
    • 2023 Global Cyber Summit
    • AI is a disruptive technology for CTI - why? 
    • But it won’t put CTI analyst out of a job any time soon – why?
    • How AI can be used within CTI – how?   
11:30
  1. 30 mins
    • 2023 Global Cyber Summit
    • How should professional standards and qualifications adapt? 
    • What do these emerging technologies mean for managing third-party risk? 
    • How will they change cyber security in specific fields like health, education, and local government? 
    • How can CIOs best make the case for strategic planning around AI and quantum in their organisations? 
12:00
  1. 30 mins
    • 2023 Global Cyber Summit
    • Future prosperity will be increasingly reliant on connected technologies in dynamic digital economies 
    • Products and services must include cyber security by design to cope with the complexity of the threat landscape 
    • The UK Cyber Strategy, to be a responsible cyber power, requires a whole-of society approach 
    • Trust, Capability and Growth in the cyber security industry is integral to its success
12:30
  1. 30 mins
    • 2023 Global Cyber Summit
    • WHO are these people. Tour into APTs and their habits & primary objectives
    • WHY they will attack your business. Ecosystems and Suppliers. Thrilling Lessons from Supply Chain.
    • WHAT are they primary searching for inside compromised environments
    • WHERE are the weakest links in organisation defense and what are the hidden risks
    • WHEN they are in they’d try to act typically. How to get prepared 
13:00
  1. 30 mins
    • 2023 Global Cyber Summit
    • How decentralized ID solution differ from the norm
    • How decentralized and hybrid identity solutions have potential benefits across multiple critical industries
    • Not every use case requires a decentralised solution
    • How the use of identity within the secure customer journey can be better managed 
13:30
  1. 30 mins
    • 2023 Global Cyber Summit

    Who is UKC3, and how can it help connect you to opportunities right across the country?
    With 15 different hubs, the length and breadth of the country, we’ll show you how to find and connect with 1,000’s of cyber businesses, organisations and people. Find out our vision of a safe and prosperous UK with a cyber security ecosystem spanning the country.

14:00
  1. 30 mins
    • 2023 Global Cyber Summit
    • A discussion of current intelligence and trends observed by the City of London Police Cyber Crime Unit
    • An explanation of policing structure and how you can engage with it to get the response you require
    • An introduction to the Cyber Griffin programme and how it can assist businesses protect themselves from cyber criminality  
14:30
  1. 30 mins
    • 2023 Global Cyber Summit
    • The cybersecurity sector in Spain
    • Public-Private Partnerships in Spain in cybersecurity
    • Opportunities for entrepreneurs, start-ups and investors in Spain  
15:00
  1. 30 mins
    • 2023 Global Cyber Summit
    •  How to perform a Security Assessment for a Mission Critical Network
    •  Deriving Security Controls and Safeguards based on Assessment’s findings
    •  Bringing a Mission Critical Network with controls and safeguards into Operations
    •  Running Operations to Detect and Respond and threats and incidents   
15:30
  1. 30 mins
    • 2023 Global Cyber Summit
    Ciaran Martin, Chair of ICE's closing address to the event and his summary of the issues discussed