It was great to meet so many of you at ISW UK on Tuesday 25th September. We hope that you enjoyed the plenary sessions, keynotes, breakout workshops, and sponsor expo and demo theatre. Below you will find links to download some of the presentations from the event.
Kai Grunwitz, Senior Vice President, EMEA, NTT Security
Welcome to ISW UK 2018.
Richard Watson, Futurist & Author
In this keynote presentation, futurist Richard explains how organisations can avoid being held hostage by change, by building scenarios to manage the risks of “critical uncertainties”.
Paula Jane Ridge, Group Head of Information Security and Assurance, De La Rue
In her session, Paula explains the business value of breaking down the silos between security and other internal functions – as well as building collaborative relationships with customers to manage the mutual risk of process or technology change.
Azeem Aleem, VP Consulting, NTT Security
Explaining how to use a proven tactical approach and predictive analytics, the session will encourage discussion on how to develop innovative cyber defence, discovery, architectural design, testing, implementation, and operations to achieve intelligence-driven SOCs.
Darren Thomson, CTO, Symantec
This session explores the need for greater industry collaboration and how integrating technology will not only maximise the value of enterprise investment but shift the needle on cybersecurity maturity.
Caroline Ikomi, European Customer Success Manager, Check Point
This session explores how to build a robust security architecture and ecosystem with Infinity whilst simplifying and reducing management and operational costs and increasing operational efficiency, providing total protection and securing your network, mobile, endpoint and IOT devices.
Matt Schofield, Principal Solutions Architect, NTT Security
As information assets become more distributed and dynamic, organisations need to define new methods of management and operation in order to successfully support the business. How can cybersecurity operations personnel leverage machines in support of their objectives?
Patrick Bayle CISSP CISM, Senior System Engineer, Cylance
Hear how AI is currently being used by enterprises to prevent future cyber-attacks, helping to gain a predictive advantage and enhanced user experience.
Gary Marsden, Senior Director, Data Protection Services, Gemalto
From reducing cost of ownership to empowering IT decision making across the value chain, cloud means life will never be the same for any of us. This session looks at the challenges facing today's IT and security teams and how this wave of disruption can and will be overcome using the ever advancing automation, processing and intelligence technologies that are used to deliver an increasingly diverse IT landscape.
Claudio Camerino, Managing Consultant – Application Security and Cloud; Nathan Britton, Principal Solutions Consultant; and Tom Smith, Principal Security Consultant, NTT Security
These sessions examine the latest tools and techniques organisations can adopt to embed security much earlier in their software development lifecycle (SDLC), by harnessing the public cloud and maintain compliance while optimising development and delivery for speed.
Ray O’Hanlon, Solutions Architect, Business Development EMEA, Palo Alto Networks
DevOps teams are eager to harness the public cloud to accelerate delivery of apps and services, but legacy security tools can’t keep pace. Join us and understand how Evident from Palo Alto Networks delivers a uniquely effective combination of continuous security monitoring, compliance validation and reporting, and comprehensive storage security.
Tristan Liverpool, Director of Systems Engineering UK&I, F5
Discover how visibility can be maintained in the cloud and how virtual patching and remediation can be done in real time to keep apps secure and available at all times, as we all know apps are the keys to the kingdoms.
Darren Chapple, Consulting Services Director, NTT Security
This session examines the solutions and services that underpin either an advanced internal or outsourced security operations service – a service which is intelligent, produces evidence-based analytics to focus resources and is supplemented with relevant real-time business context to deliver relevant information to the business.
Jon Lane, Sales Director, Skybox
Combining attack surface visibility, vulnerability and threat intelligence and attack vector analytics, Skybox pinpoints the vulnerabilities that put your organisation most at risk, building an efficient vulnerability management program targeting your biggest threats.
Lee Duff, Senior Sales Engineer, LogRhythm
This session explores how to leverage machine learning to help solve some of the challenges we have in the fight against cybercrime, and how machine learning can help us, as well as what is required to make machine learning successful.
Steven Kulley, Systems Engineer, FireEye
FireEye's approach to security orchestration saves organisations time and resources, accelerates actions and interactions that would normally need to be conducted manually, enabling security operations teams to keep their organisations a step ahead of attackers.