Browse the teissLondon2020 agenda and speakers below.

08:00 Registration and welcome refreshments

Chair’s Opening Remarks

09:00

The Information Commissioner’s Office GDPR investigations and decisions, and expectations in 2020 and beyond

Plenary keynote

by Stephen Eckersley, Director of Investigations, Information Commissioner's Office Show Profile

09:10

Password administration for system owners: The NCSC strategies that can help your organisation remain secure

Plenary keynote

09:30

Technology ethics: How can we create and use technologies so that they deliver maximum benefit and pose minimum harm?

Plenary keynote

by Dr Stephanie Hare, Author "Technology Ethics" Show Profile

09:50

Security and Privacy by design: How can information security leaders ensure their organisations avoid a “bolt-on” approach and minimise risk

Plenary panel discussion

by Dr Stephanie Hare, Author "Technology Ethics" Show Profile

by Deborah Haworth, CISO, Penguin Random House UK Show Profile

by Joseph Carson, Chief Security Scientist and Advisory CISO, Thycotic Show Profile

10:10

11:00 Morning refreshments & networking

What metrics do you use to measure the effectiveness of your internal SOC team?

Roundtable discussion

11:30

How do you make your security messages clear at board level?

Roundtable discussion

11:30

How do you plan your cyber incident response exercises?

Roundtable discussion

11:30

Which metrics do you use to measure progress in cultural change?

Roundtable discussion

11:30

How do you identify your information security priorities, and resource a team to match?

Roundtable discussion

11:30

Workshop 1

Interactive workshop

11:30

teissPodcast LIVE

Live podcast recording

by Anna Delaney, Editor in Chief, teiss Show Profile

12:10

What are your barriers to improving cyber resilience in your organisation, and how do you overcome them?

Roundtable discussion

11:30

Breach notification since GDPR: How have you been dealing with your internal incidents and breaches of data?

Roundtable discussion

11:30

Can you recognise burn-out in your information security team, and what strategies do you have to manage this?

Roundtable discussion

11:30

How do you involve your supply chain partners in assessing their cyber risk?

Roundtable discussion

11:30

How do you detect and manage your internal threats?

Roundtable discussion

11:30

How do you develop your information security staff soft skills to improve retention?

Roundtable discussion

11:30

12:50 Lunch & networking

Chair’s opening remarks

by Paul Taylor, Partner - Cyber Security, KPMG Show Profile

13:50

Quantifiable approaches for measuring the effectiveness of your internal SOC or MSSP

Case study presentation

14:00

Strategies to quantify your organisation’s cyber risk, and making your messages effective at board level

Case study presentation

by Allan Alford, Delivery CISO, NTT Data Services Show Profile

14:20

The CISO’s Legal Briefing: GDPR, Brexit and Data protection changes in global, regional and national jurisdictions

Panel discussion

14:40

Chair’s opening remarks

13:50

Aligning home-life security and company security: Making your people the CISO of their own homes

Case study presentation

by Sarb Sembhi, CTO & CISO, Virtually Informed Show Profile

14:00

Recognising and overcoming the cognitive biases that undermine your information security training

Case study presentation

14:20

The ways that your user awareness programme is failing, and what you should do about it

Panel discussion

by Lucy Payne, Security Awareness and Engagement Lead, Aviva Show Profile

14:40

Chair’s opening remarks

13:50

Using Artificial Intelligence to identify malicious activity within your network

Case study presentation

14:00

Artificial Intelligence, Machine Learning and human ingenuity – enhancing your people to combat cyber threats

Case study presentation

14:20

Threats in the supply chain: Balancing your internal and the external requirements and competing risk agendas

Panel discussion

14:40

15:30 Afternoon refreshments & networking

How to create and sustain a high-performance security culture

Case study presentation

16:00

Empower your people, strengthen your culture and reduce your cyber risk

Keynote presentation

by Dr Jessica Barker, Chair, ClubCISO Show Profile

16:20

Tailoring your security awareness programmes to overcome colleagues’ inbuilt biases

Panel discussion

by Dr Jessica Barker, Chair, ClubCISO Show Profile

16:40

High-end, regulatory-driven, red-teaming: What are the techniques and how quickly are they evolving?

Case study presentation

by Ken Munro, Partner, Pen Test Partners Show Profile

16:00

Tackling the insider threat – investing in your investigators and using understandable and enforceable policies

Case study presentation

16:20

Threat trends in 2020 and beyond; Deep fakes, misinformation and reputational attacks

Panel discussion

by Joseph Carson, Chief Security Scientist and Advisory CISO, Thycotic Show Profile

16:40

17:15 Drinks reception & networking

08:00 Welcome refreshments & networking

Chair’s opening remarks

by Paul Taylor, Partner - Cyber Security, KPMG Show Profile

09:00

‘How secure are we?’: Bringing together cyber, physical and personnel security to address risk, deliver compliance and benefit from common processes

Case study presentation

by Peter Gibbons, Chief Security Officer, Network Rail Show Profile

09:10

Password-less authentication: Where is biometric or behavioural authentication deployed, and best-practice in implementation

Case study presentation

09:30

Evaluating and minimising information security risks across multi-Cloud estate

Panel discussion

09:50

Developing and deploying a skills competency framework for the development of your Cyber Security professionals

Case study presentation

09:10

Behavioural economics and calculating the impact of your Information Security policies

Case study presentation

09:30

Recruitment, retention and diversity in information security – energising the talent market

Panel discussion

by Joseph Carson, Chief Security Scientist and Advisory CISO, Thycotic Show Profile

by Ian Thornton-Trump, Head of Cyber Security, AMTrust International Show Profile

09:50

Chair’s Opening Remarks

09:00

Quantum Computing and the timeline of the threat to your encryption

Case study presentation

09:10

Social engineering and Spear-phishing – using real cases to protect and advise your senior colleagues

Case study presentation

09:30

Using blockchain for information security in identity management and compliance

Panel discussion

by Tim Holmes-Mitra MBE, Co-founder and CTO, Broadhaven Show Profile

09:50

10:40 Morning refreshments & networking

Product Demonstration 1

Product demonstration

by Code42 Show Profile

11:10

Product Demonstration 2

Product demonstration

by Yubico Show Profile

11:30

Product Demonstration 3

11:50

Workshop 2

Interactive workshop

11:10

Workshop 3

Interactive workshop

11:10

12:10 Lunch & networking

Chair’s Opening Remarks

13:30

Protecting your human resources: Strategies to identify and avoid Information Security professional burn-out during the day-to-day and during a crisis

Plenary panel discussion

by Deborah Haworth, CISO, Penguin Random House UK Show Profile

by Ian Thornton-Trump, Head of Cyber Security, AMTrust International Show Profile

13:40

Chair’s closing remarks

14:40

14:45 Conference close

back to top

Copyright © Lyonsdown Ltd. 2018. All rights reserved. TEISS® is a registered trademark of Lyonsdown Limited.