Presentations from ISW UK

It was great to meet so many of you at ISW UK on Tuesday 25th September. We hope that you enjoyed the plenary sessions, keynotes, breakout workshops, and sponsor expo and demo theatre. Below you will find links to download some of the presentations from the event.

Plenary sessions

Welcome and introduction

Kai Grunwitz, Senior Vice President, EMEA, NTT Security 

Welcome to ISW UK 2018.

Download the presentation >

Opening keynote: Scenario planning for a digital world

Richard Watson, Futurist & Author

In this keynote presentation, futurist Richard explains how organisations can avoid being held hostage by change, by building scenarios to manage the risks of “critical uncertainties”.

Download the presentation >

Collaboration – the currency of cyber success

Paula Jane Ridge, Group Head of Information Security and Assurance, De La Rue 

In her session, Paula explains the business value of breaking down the silos between security and other internal functions – as well as building collaborative relationships with customers to manage the mutual risk of process or technology change.

Download the presentation >

Intelligence-driven security: pure myth or a reality?

Azeem Aleem, VP Consulting, NTT Security 

Explaining how to use a proven tactical approach and predictive analytics, the session will encourage discussion on how to develop innovative cyber defence, discovery, architectural design, testing, implementation, and operations to achieve intelligence-driven SOCs.

Download the presentation >


Platinum sponsor: The future of the security platform – collaboration not complexity 

Darren Thomson, CTO, Symantec  

This session explores the need for greater industry collaboration and how integrating technology will not only maximise the value of enterprise investment but shift the needle on cybersecurity maturity.

Download the presentation >


Platinum sponsor: Resolving the complexities of growing connectivity and inefficient security: Infinity Total Protection

Caroline Ikomi, European Customer Success Manager, Check Point

This session explores how to build a robust security architecture and ecosystem with Infinity whilst simplifying and reducing management and operational costs and increasing operational efficiency, providing total protection and securing your network, mobile, endpoint and IOT devices.

Download the presentation >

Afternoon breakout tracks

Track 1: Applying automation, machine learning and artificial intelligence to protect data and devices

Matt Schofield, Principal Solutions Architect, NTT Security 

As information assets become more distributed and dynamic, organisations need to define new methods of management and operation in order to successfully support the business. How can cybersecurity operations personnel leverage machines in support of their objectives?

Download the presentation >


Prevention is possible

Patrick Bayle CISSP CISM, Senior System Engineer, Cylance

Hear how AI is currently being used by enterprises to prevent future cyber-attacks, helping to gain a predictive advantage and enhanced user experience.

Download the presentation >

The Cloud Revolution: Digital Transformation, Automation and the Disruption of Data Protection

Gary Marsden, Senior Director, Data Protection Services, Gemalto

From reducing cost of ownership to empowering IT decision making across the value chain, cloud means life will never be the same for any of us. This session looks at the challenges facing today's IT and security teams and how this wave of disruption can and will be overcome using the ever advancing automation, processing and intelligence technologies that are used to deliver an increasingly diverse IT landscape.

Download the presentation >

Track 2: Applying automation, machine learning and artificial intelligence to protect data and devices

Claudio Camerino, Managing Consultant – Application Security and Cloud; Nathan Britton, Principal Solutions Consultant; and Tom Smith, Principal Security Consultant, NTT Security 

These sessions examine the latest tools and techniques organisations can adopt to embed security much earlier in their software development lifecycle (SDLC), by harnessing the public cloud and maintain compliance while optimising development and delivery for speed.

Download the presentation >

Continuous multi cloud security for business applications – the challenge and opportunity

Ray O’Hanlon, Solutions Architect, Business Development EMEA, Palo Alto Networks 

DevOps teams are eager to harness the public cloud to accelerate delivery of apps and services, but legacy security tools can’t keep pace. Join us and understand how Evident from Palo Alto Networks delivers a uniquely effective combination of continuous security monitoring, compliance validation and reporting, and comprehensive storage security.

Download the presentation >


Think app security first

Tristan Liverpool, Director of Systems Engineering UK&I, F5   

Discover how visibility can be maintained in the cloud and how virtual patching and remediation can be done in real time to keep apps secure and available at all times, as we all know apps are the keys to the kingdoms.

Download the presentation >

Track 3: How to win the battle against cyber cost and complexity in a digital world with ASOC

Darren Chapple, Consulting Services Director, NTT Security 

This session examines the solutions and services that underpin either an advanced internal or outsourced security operations service – a service which is intelligent, produces evidence-based analytics to focus resources and is supplemented with relevant real-time business context to deliver relevant information to the business.

Download the presentation >


Automating Identification of Vulnerability Risk & Exposure

Jon Lane, Sales Director, Skybox

Combining attack surface visibility, vulnerability and threat intelligence and attack vector analytics, Skybox pinpoints the vulnerabilities that put your organisation most at risk, building an efficient vulnerability management program targeting your biggest threats.

Download the presentation >

Applying a data driven approach to machine learning

Lee Duff, Senior Sales Engineer, LogRhythm 

This session explores how to leverage machine learning to help solve some of the challenges we have in the fight against cybercrime, and how machine learning can help us, as well as what is required to make machine learning successful.

Download the presentation >

How does FireEye orchestrate incident response to mitigate dependencies on security analysts’ serial tasks?

Steven Kulley, Systems Engineer, FireEye 

FireEye's approach to security orchestration saves organisations time and resources, accelerates actions and interactions that would normally need to be conducted manually, enabling security operations teams to keep their organisations a step ahead of attackers.

Download the presentation >