Conference

The conference programme will include panels and presentations on , but are not limited to;

 The cyber security skills shortage. A panel consisting of those charged with producing cyber talent and those that think we use people to do tasks that should be done by machines.

 Where does cyber risk sit in the overall operational risk picture. How does the risk interact with other top 10 operationsl risks? What strategies are required for the risk to be managed effectively, enable growth and deliver a competitive advantage?

 A presenter to run a ‘real’ incident scenario with participants taking the roles of different parts of the organisation. The presenter can introduce new bits of information as things develop (as in a real incident) and discuss how the different participants would react and the decisions they would make and/or information they would seek.

 This panel will discuss ways to enable a better understanding for the board to both mitigate a very significant company risk while also recognising the financial benefits of delivering an increasing array of digital services.

 A panel looking at the latest ways in addressing ransomware , ATM attacks, DDoS etc.

 The benefits of threat sharing intelligence. A debate involving Threat Intel Vendors vs Open Source Threat Sharing. Why should orgs pay for the intel and the tools to manage if so much can be freely obtained?

 Innovative approaches to risks posed by insiders – cyber security and fraud.

 Optimising and efficiently employing big data analytics in combating cyber crime. To review how security, fraud and compliance risk benefit from big data strategies.

 What are the advantages in determining threat prioritisation.

 Best practices in SOC’s and centre management– Prevent, Detect and Respond within Security Operations, Vulnerability Management Operations and Threat Management Operations –attendees to work on the integration of the two aspects.

 Improving and optimizing your cyber security incident response plan.

 Connecting and automating cyber security capabilities across the digitalized payment infrastructure.

Previous Cyber Security EventsSupported by

MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors
MEFSEC Sponsors