Qwoted is a free expert network: we help reporters connect with experts & we help those same experts build relationships with top reporters.
Event Date |
Thu Oct 17 BST (about 2 months ago)
In your timezone (EST): Wed Oct 16 7:00pm - Wed Oct 16 7:00pm |
Location |
Park Plaza Victoria London
239 Vauxhall Bridge Rd, Pimlico, London SW1V 1EQ, UK |
Region | EMEA |
We often ask why it is that so many of today’s security problems were yesterday’s and the day before’s. One answer is that while security technology and processes have greatly improved, the problem has become vastly more difficult.
This is not simply because attackers have multiplied and become more sophisticated; it’s not just because of AI or geopolitics or the expansion of the IoT and OT – although all of these have hugely increased attack surfaces and the scale of threats to them.
No, the underlying problem is more simply described as complexity. As one researcher says, “The simple combinatorial mathematics of the sheer increase in endpoints not only means a greater number of systems to manage but also much more complex network architectures and webs of connections underlying IT and technology infrastructure and systems.”
For example, the rise of cloud computing, microservices, containers, IPv6, has created a vastly more complex endpoint infrastructure than existed before, even though that was comprised of billions of connected, physical devices. The default premise of cloud is to make services, APIs, storage, computing, and networking accessible – the default for a service is exposed to the world. Cloud storage is no longer segregated and sitting behind a server.
And at the same time as this increase in complexity and vulnerability, Cloud services (e.g. the IP blocks used by Amazon’s S3 storage service) are increasingly easy to identify and attack.
The response of security teams to these paradigm shifts in technology, scale and complexity has often been to meet each challenge piecemeal as it occurs. So global firewalls have been supplemented with various technologies to cater for the fact that these firewalls must be porous due to the growing number of APIs and services that must connect to the outside world.
Critical processes, services, and instances have been placed inside security groups, with access controls applied on a per-group basis, associated with identity providers and authentication systems.
At the same time, security teams put in place more defence technologies, often layering them to address specific threats or assets: data is protected one way, applications another, APIs are guarded by API gateways, Kubernetes clusters are guarded by specialized Web Application Firewalls and Ingress Controllers, SecDevOps teams mandate smaller, more lightweight firewalls in front of every public service or API and application security teams require that SAST and SCA scans be run on any code.
2024 Speakers
Mario Beccia
Deputy CIO for Cybersecurity, NATO
Sarah Lawson
CISO and Deputy CIO, UCL
Simon Ashworth
Managing Director, Chief Analytical Officer – Insurance Ratings and Cyber Lead, S&P Global Ratings
Parul Khedwal
Security Operations Lead, Trainline
Mark Logsdon
CISO, NHS England
Evie Wild
Information Security Officer, EMEA Region, LBBW Bank
Ian Dalby
Global Head of GRC, A&O Shearman
Clair Phelps
CISO, Wagestream
Manit Sahib
Ethical Hacker, The Global Fund
Andy Giles
Executive Director, Head of Intelligence Integration, JPMorgan Chase
Brett Raybould
Director, Solutions Engineering, Menlo Security
Richard Meeus
EMEA Director of Security Technology and Strategy, Akamai
Brett Ayres
VP of Product, Teneo
James Eason
CRA Practice Lead, Integrity360
Paul Clark
Head of Sales, EMEA, Ironscales
Lee Elliott
Director, Solutions Engineering, BeyondTrust
Peter Batchelor
UK&I Regional Director, Silverfort
Al Scott
Senior Sales Engineer EMEA, Silverfort
Anthony Moillic
Field CISO, Netwrix Corporation
Tim Ayling
VP EMEA Cyber Security Specialists, Thales
2024 Sponsors
STRATEGIC SPONSORS:
• Hoxhunt
• Integrity360
• Mimecast
• Searchlight Cyber
• SentinelOne
• Tanium
• ThreatLocker
EDUCATION SEMINAR SPONSORS:
• Abnormal
• BeyondTrust
• Cato Networks
• Hadrian
• Ironscales
• Menlo Security
• Netwrix
• Red Sift
• Silverfort
• Teneo Akamai
• Thales
• Varonis
NETWORKING SPONSORS:
• CybelAngel
• IzooLogic
BRANDING SPONSOR:
• Metomic