Skip to main content
stacked logo

 

26 - 27 SEPTEMBER | OLYMPIA LONDON

TECH HUB STAGE

Blue Image background 2

TECH HUB STAGE

tech hub 101

Loading
10:30
  1. 20 mins
    • Tech Hub Stage 2022

    cybeats2

    The recent software supply chain attacks that have been rocking the internet shows how important it is to have the right solution that ensures immediate visibility of the blast radius of new vulnerabilities. Join us to learn one of the most effective ways to rapidly identify systems impacted through a proper SBOM Strategy, to help organisations secure their software supply chain and reduce risk of cyber attacks. We’ll dive into:
    • SBOM Analogy
    • SBOM History
    • Why it makes sense?
    • SBOMs, Languages and Formats
    • Difference between VEX and SBOM

     

10:55
  1. 20 mins
    • Tech Hub Stage 2022

    t

    • Interesting Facts on electronic signatures
    • The relevance of eSignatures
    • The history of electronic signatures
    • Challenges eSignatures address
    • Benefits for businesses
    • A legal perspective on electronic signatures
    • The future of digitalization and the role of eSignatures
11:20
  1. 20 mins
    • Tech Hub Stage 2022

    iso1

    This talk will introduce the Attack Tree methodology and explain how Attack Tree diagrams are constructed. It will discuss how attack paths are identified using based on the logic of the Attack Tree diagram. It will demonstrate how the likelihood of each attack path may be estimated based on the obstacles faced by the attacker.

11:45
  1. 20 mins
    • Tech Hub Stage 2022

    anx

    As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow more complex. But there’s good news: asset management has evolved. Today’s “asset intelligence” moves from a spreadsheet approach to an API-driven, always up-to-date view into all assets via integrations of existing tools, data correlation at scale, and querying capabilities to find and respond to gaps. Join this session to learn how asset intelligence and the emerging Cyber Asset Attack Surface Management (CAASM) category improves security hygiene, reduces manual work, and remediates gaps.

12:10
  1. 20 mins
    • Tech Hub Stage 2022

    snyk

    Cloud native development has changed the way developers both build and secure applications. It’s more important than ever for apps to remain secure through their entire development lifecycle – but without impacting dev teams’ ability to innovate with efficiency. One way to balance these needs is to approach security from a dev point of view.
    This live demo will demonstrate how Snyk’s cloud native application security platform is designed to work like a developer tool, all while enabling one continuous feedback loop between dev and security personnel. This makes it easy to not only find security issues in your code, open-source dependencies, containers, and infrastructure as code, but fix them quickly. See why 2.2 million developers choose to use Snyk to build securely.

12:35
  1. 15 mins
    • Tech Hub Stage 2022

    one

    Risk Quantification can be both an enticing and intimidating exercise for a business to pursue. How does an organization get from point A to point B (and back again) to score and value risk? In this session, we'll take a back-to-basics approach to break down the concept of risk, contrast this understanding with some of the modern applications of risk in business, and discuss how people across your organization may interpret the meaning of risk. We'll diagnose some of the common pitfalls companies fall into and identify perspectives to help account for variables that do not have defined parameters when understanding risk.
    KEY TAKEAWAYS:
    • Understand how you can use risk metrics as a planning tool beyond mitigation tactics.
    • Identify five simple steps to apply and guide your quantification strategy.
    • Account for the "new normal" businesses are navigating for today and tomorrow.
    • Take a mixed approach to quantification to help retain qualitative risk insights

12:55
  1. 20 mins
    • Tech Hub Stage 2022

    cyres

    • Nowadays, automated application security testing is a well-established field, but several IT trends are changing it.
    • We'll look at some of those and see how we can deal with them from an app sec perspective, for example:
    o API security
    o Cloud-Native application security
    o Supply chain risks
    • We'll look at the capabilities that Micro Focus Fortify delivers in these areas.
     

13:20
  1. 20 mins
    • Tech Hub Stage 2022

    al2

    4,000+ customers producing a 40PB threat data lake provides Alert Logic with unique insight into threats and adversaries
    Clustering observed activity allows us to connect disparate indicators together
    These activity clusters allow us to closely track prominent adversaries closely
    Organisations benefit both directly and indirectly from our understanding of adversaries
    Join us to understand the value behind understanding adversaries through threat hunting and threat intelligence

13:45
  1. 20 mins
    • Tech Hub Stage 2022

    fort

    • Understand the value of deception as a viable IT strategy
    • Drastically lower the time to detect all activity without overloading the IT teams
    • Respond much more quickly and drop your time to remediate down to as low as possible
    • Understand how deception can also help clarify overall infrastructure risks
    • Optimise your costs to cover both IT and OT networks with a single automated solution 
14:10
  1. 20 mins
    • Tech Hub Stage 2022

    tl

    Join ThreatLocker's Director Cybersecurity, Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. Understand how businesses are enhancing their cyber resilience and significantly limiting the damage vulnerabilities can inflict with a Zero Trust architecture

14:35
  1. 15 mins
    • Tech Hub Stage 2022

    lf

    In six steps, Rowan will consider the misgivings of conventional security risk management (i.e., the desire to lead conversations around security with a technology-first approach whilst ignoring the fundamentals) and introduce cyber-security in terms of this dilemma instead: exactly how should we secure an empty room?

    Thinking beyond the obvious and focusing on context rather than generalisations, the empty room concept allows security professionals to think much more granularly. Rowan will go on to explain how to influence organisational conditions so that your organisation has a secure production capability for creating the only thing it needs to create: value.If you’re sick and tired of listening to the same re-hashed, generic security advice, we recommend you don’t miss this talk.

14:55
  1. 20 mins
    • Tech Hub Stage 2022

    mal

    • OSINT investigations can be used in a variety of exercises, such as red teaming, blue teaming and threat intelligence investigations
    • Breach data is a mighty source of OSINT data, which can be leveraged in investigations
    • This session will give an overview of how to investigate breached data in OSINT investigations.

15:20
  1. 20 mins
    • Tech Hub Stage 2022

    mime

    Cybersecurity is always thought about in terms of technology, but is it that simple or does it involve more to secure an organization? Join this session with Mimecast to learn the cybersecurity intersection between communications, people, and data to protect your organization, reduce risk and manage complexity.

15:45
  1. 60 mins
    • Tech Hub Stage 2022

    cr plex 2

    Cyber Runway is the UK’s largest cyber accelerator programme. Fast-tracking the growth of over 100 innovators across three streams: Launch, Grow and Scale.

    Join us for this showcase and hear from some of the most exciting cyber start-ups and scaleups in the ecosystem today. 

10:05
  1. 20 mins
    • Tech Hub Stage 2022

    son2

    In this talk you’ll learn about the next generation of attacks, what are the latest methods threat actors are using to attack your Software Supply Chain.
    We will show that as the threat actors get smarter, Nexus Firewall users can rest easy knowing that such malicious packages would automatically be blocked from reaching their development builds.
    We explain how you can identify and block known and unknown vulnerabilities before they enter your organisation, by quarantining non-compliant components at the door and enforcing open source policies during proxy.

10:30
  1. 20 mins
    • Tech Hub Stage 2022

    onet

    • The most common and emerging cybersecurity threats against your third parties
    • The metrics to track in relation to third parties and their cybersecurity risks
    • How to protect your business from cybersecurity threats associated with your vendors
    • How to future-proof your TPRM program to defend against future cybersecurity threats

10:55
  1. 20 mins
    • Tech Hub Stage 2022

    e2e

    In this talk Shanay discusses two key areas of high performance SOCs:
    How to effectively automate alert analysis to reduce alert fatigue, human error and increase alerting fidelity.
    Followed by how to use a variety of built in Honeypots as part of effective security monitoring within the SOC

11:20
  1. 20 mins
    • Tech Hub Stage 2022

    bo

    This session/talk will highlight key areas of risk in existing cyber security management, drawing comparisons between current operating space and ‘accepted’ industry best practice against the growing threat from new and alternate cyber-attack methodologies. It will discuss the growth of enhanced Tactics, Techniques and Procedures and the need to develop appropriate solutions to challenge new and novel attack vectors employed by cyber threats.

11:45
  1. 20 mins
    • Tech Hub Stage 2022

    dt

    In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

12:10
  1. 60 mins
    • Tech Hub Stage 2022

    Plex CR

    Cyber Runway is the UK’s largest cyber accelerator programme. Fast-tracking the growth of over 100 innovators across three streams: Launch, Grow and Scale.

    Join us for this showcase and hear from some of the most exciting cyber start-ups and scaleups in the ecosystem today. 

13:20
  1. 20 mins
    • Tech Hub Stage 2022

    asigra1

    Cybercriminals know that a clean backup means no ransom payment. As a result, backups are now targeted as part of next-gen ransomware attacks. In this session, we’ll discuss how the new breed of ransomware evades traditional backup security to invade 3-2-1 air-gapped and immutable storage. We’ll also look at advanced security technologies designed to protect backups against these ransomware 3.0 attacks.

13:45
  1. 20 mins
    • Tech Hub Stage 2022

    ct

     

    You will likely have invested heavily in protecting at the perimeter, but according to Forrester “more than 80% of Data Centre and Cloud Traffic is East-West i.e., internal traffic. However, most organisations only monitor 10% of this traffic.”

    In this session we look at how to underpin your existing security stack, gaining full visibility across hybrid environments and the transition to a positive security model.

    We introduce micro-segmentation as part of your Zero Trust journey, removing the implicit trust systems are largely built upon, preventing lateral movement and significantly reducing the attack surface across the estate, with demonstrable compliance, and breach containment.

14:10
  1. 20 mins
    • Tech Hub Stage 2022

    salt

    APIs are fuelling business innovation and are at the heart of today’s modern apps. They’re also a priority target for bad actors, who have realised APIs are the way into a company’s most valuable data and can’t be protected by traditional tooling. We’ve seen numerous security incidents resulting from API vulnerabilities leading to massive data exfiltration, account takeover, privacy impacts, service interruption and other harmful consequences.

    Attend this session to hear about:

    • How today’s API attacks are different and why you need context to stop them
    • Why traditional API security approaches and tooling fall short
    • How to protect yourself against bad actors targeting APIs by leveraging big data and machine learning

14:35
  1. 20 mins
    • Tech Hub Stage 2022

    ru

    The impact of ransomware on organisations across the globe is a symptom of a bigger issue: the lack of resilience in cyber security.  A disproportionate portion of budgets are spent in likelihood reduction: the protection and detection functions of the NIST Cyber Security Framework.
    In this session, learn how Rubrik’s resilience engine for data security, a part of Rubrik’s Zero Trust Data Security platform, empowers customers to safeguard data with secure backups so it can’t be deleted, compromised, or encrypted; and is always available for recovery.

15:00
  1. 60 mins
    • Tech Hub Stage 2022

    ncsc 2

    In this panel discussion, you’ll hear from three NCSC For Startups alumni as they share their growth journeys during their time on the programme, alongside the lessons learned that every cyber startup needs to know.

    We’ll also explore the current state of the cyber accelerator ecosystem and where startups can find the best funding and strategic support, with Riz Noor sharing his experiences at Techstars, CyLon, Tessian and more.

Sign up to The Security Bulletin, our fortnightly e-newsletter bringing the latest trends, global news and updates straight into your inbox

Subscribe to your newsletter