Tuesday 28th March
Wednesday 29th March
Colin Tankard - Digital Pathways
We will show how data is lost, systems compromised and the effect it has on individuals and their company. Then we will give practical tips and advice on protecting your digital assets, how educating and managing users will reduce 80% of all data leakage and how to detect risky user actions before they happen.
Hayley Turner - Darktrace
Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.
Nigel Wilson & Mark Edwards - Financial Eye
Cybercrime has been in every inbox during 2016 and most firms have put in place some level of protection. However, the landscape of cybercrime is constantly changing as the perpetrators develop new methodologies. It is imperative that you stay up to date with these emerging threats. We will present our thoughts in our presentation ‘Cyber Crime – The Outlook for 2017’. This will include the potential impact on your insurance coverage following recent modifications to the Insurance Act, as well as reviewing a range of measures that firms can implement to cover these threats.
Gary Jones - Key Computer Solutions
As 25% of law firms report being targeted by cyber criminals it’s vital for firms to understand the risks. We discuss how real is the risk of cybercrime? Cutting through the jargon we explain Malware, Phishing, DDoS, Modified email, Ransomware and more. Providing an informative guide to your IT security, what you can do to protect yourself and the tools to keep your business and your clients’ data safe.
Mark Sangster - eSentire Inc.
Are you at risk of a ransomware attack? Cybercriminals are continually evolving their attack methods in their attempts to gain access to your firm’s highly sensitive client information. Join this session to learn about today’s threat landscape and its impact on law firms, review recent real-life cybersecurity attack use cases; understand ransomware, how it works and how your firm can protect itself from ransomware-based attacks.
Richard Tucker - Peerless IT
Cloud services offer many advantages from scalability, cost effectiveness, and anywhere access, but are they secure, and how would you know? This talk will provide a checklist for evaluating the security of cloud services including Software as a Services (SaaS), Platform as a Service (PaaS), private clouds, public clouds, and of course data protection. By attending this talk you will understand the key considerations in selecting a secure cloud service.