NCSS 2022

5-7 APRIL 2022
NEC BIRMINGHAM

Cyber Security Conference

Image

Cyber Security Conference

Loading
12:15
  1. 30 mins
    • Cyber Security Conference

    Organisations are increasingly coming under threat from cyber attacks via the trusted connections they have with their suppliers. This makes the security of your organisation highly dependent on the level of cyber security within your suppliers.  Few organisations have the resources to audit all their suppliers and the SMEs amongst them are unlikely to have the international cyber security certification often asked for by procurement professionals.  This situation will be discussed, along with a number of solutions.

13:00
  1. 45 mins
    • Cyber Security Conference
    Erika Lewis Director, Cyber Security and Digital Identity, DCMS & Senior representative from the NCSC 
14:00
  1. 45 mins
    • Cyber Security Conference

    Learn why traditional methods for managing supply chain cyber risks aren't working. See how a communication platform (disguised as a supplier assurance tool) could help us collectively prevent, detect and respond to attacks in the supply chain. Take a look at the new solution used by organisations like NHS Test and Trace.

15:00
  1. 20 mins
    • Cyber Security Conference
    How collectively UK's businesses can work together to make UK PLC more secure from Cyber Threats. 
     
15:45
  1. 30 mins
    • Cyber Security Conference
    • Why cyber insurance is important
    • What Cyber insurance covers
    • Cyber Insurance and Cyber Assurance
11:15
  1. 60 mins
    • Cyber Security Conference

    Small and medium-sized enterprises make tempting targets for cyber criminals and often do not possess the knowledge or resources to defend against damaging cyber-attacks. This session will discuss the risks to SMEs and the schemes, guidance and technology available to help them stay protected.

13:00
  1. 45 mins
    • Cyber Security Conference
    Key Learings: Stopping data loss with a human-centric cyber solution Promoting cyber resilience through user education and training Redirecting an incident into an opportunity for cyber training, crea ...
14:00
  1. 45 mins
    • Cyber Security Conference

    What could happen if all this precious information about us is stolen or abused – by large corporations or organised cybercrime of the 21st century? What kind of implication could it bring to our personal and professional life?