EPN Live
  • Home
  • Future Events
    • 2025 Events
      • Bespoke Evenings
      • CyberSec Events
      • CyberSec Virtual
      • Infotech Events
      • InfoTech Virtual
      • Pharma Europe
      • Virtual Round Tables
  • Previous Events
    • 2022 Events
      • 2022 Bespoke Evening
      • 2022 CyberSec Events
      • 2022 InfoTech Events
    • 2023 Events
      • 2023 Bespoke Evening
      • 2023 CyberSec Events
      • 2023 InfoTech Events
    • 2024 Events
      • 2024 Bespoke Evenings
      • 2024 CyberSec Events
      • 2024 InfoTech Events
      • 2024 Virtual Events
    • 2025 Events
      • Bespoke Evenings
      • CyberSec Events
      • InfoTech Events
      • Virtual Events
  • Testimonials
    • Solutions
      • Bespoke Dinners
      • Business Intelligence
      • EPN Virtual
      • One-to-One, C-Level, Virtual Meetings
  • Register Interest
  • EPN TV

CyberSec 2022, London

  • Home
  • >> 2022 CyberSec Events>>
  • CyberSec 2022, London
alt
alt
alt
alt
alt
alt
alt
alt
alt

WELCOME! / Network & Learn with the CISO Community

Increasing complexity of platforms & applications, the remote working shift, a widening skills gap, & expanding threats, the challenges facing the information security professional today have never been more diverse & amplified. The security professional has never been more in-demand to help protect organisations against these pressures.

This September, 300 senior information security thought-leaders will gather for the unmissable opportunity to benchmark your progress & sense- check your strategies. Join us, to listen, learn & share your experiences & solve the most pertinent challenges for CISOs today.

300 +
C-Suite Attendees

30 +
Solutions on Show

57%

of IT leaders have been given extra budget to cope with post-Covid WFH scenarios

71%

of IT leaders prefer physical to virtual events

42%

of IT leaders identify data security as a top priority


CONSTRUCT A PERSONALISED AGENDA

You will be gaining from highly interactive formats at your leisure.
You have complete control over your schedule at this one- stop-shop. Choose between:

  • Roundtable Discussions. These interactive discussions enable you to get involved with the debate. Share your experiences, gain feedback, & learn from the leading experts of the industry.
  • Peer-to-Peer Meetings. Make the most of your day with personal meetings with those facing the same hurdles & working towards the same goals.
  • Open Networking Area. Join informal networking to get time with your peers.
  • Advanced Technology Expo. Discover the latest technologies transforming the infosec environment.
  • Product Demos. See tech in action so you can unlock product potentia

Who Should Attend?

FIELD

IT Security, 50%
IT, 20%
Technology, 15%
Data, 10%
Governance, 5%

SENIORITY

C-Level, 60%
Directors/VP, 25%
Project Leads, 15%

  • WFH & HYBRID
  • SECURITY AWARENESS
  • CLOUD
  • CYBER CRIME
  • IT, OT & IOT
  • AUTOMATION
  • LEADERSHIP

“Great discussions with other like-minded experts” – EAO
“A super opportunity to take a step back, reflect, see &“A super opportunity to take a step back, reflect, see & learn things from other industries.”learn things from other industries.” – IQVIA
“The room was truly world class. You could not imagine a“The room was truly world class. You could not imagine a better group to discuss what we discussed”better group to discuss what we discussed” – RightCrowd


EPN IT Security Vision at a Glance / Top 3 reasons you should attend

1: Save time & money by meeting your peers & discovering new technologies all in one place

2: Heightened interactivity. The dynamic discussion formats are tailored for you to make the most of long-missed face-to-ace exchange.

3: 10+ hours of networking opportunities. Coordinate meetings, share your experiences, listen to talks. You have full control of your agenda.

Expert Insights

20 + technology leaders will be delivering data, debate & discussions. Gain from the mistakes & successes of experts from some of the UK’s largest organisations.

Exclusive Features

A new awards show, match-made meetings, a full day of interactive roundtables, complimentary access to co-located events, and much more to take advantage of.

Like-minded Senior Peers

Meet with CISOs from a variety of industries to share experiences & get tangible take-home lessons, in both formal & informal networking opportunities.

New Technologies

Join the expo to see the latest technologies that can transform your business. Product demos available to discover what can work for you.

YOUR INTERACTIVE ROUNDTABLE DISCUSSIONS

10:05 – 10:55 ROUNDTABLE 1 - RANSOMWARE

Ransomware, how has it impacted Cyber Incident Response strategies?
It’s hard to believe, Ransomware is decades old. However, in the last 5+ years’ its notoriety has really grown. It has gone through nearly as many evolutions both in capabilities & the degree of organizational structures behind it. The scale of businesses targeted grew from 55% to 75% in just the last 12 months alone.
• With so much evolution and change, are existing prevention, detection & response strategies and capabilities still fit for purpose?
• How do strategies need to evolve to adapt, what can we learn from our past mistakes, and what new capabilities and processes should we be leveraging?

11:10 – 12:00 ROUNDTABLE 2 - NETWORK SECURITY IN THE ERA OF CLOUD

Harnessing the power of network security in the era of the cloud
• How to eliminate visibility blindspots in cloud-based workloads
• How you can maintain security after you’ve migrated some or all of your workloads to the cloud
• What unexpected insights can be gleaned from scouring your network?
• Integrating cloud network telemetry with on-premise network telemetry
• Your top privacy considerations when evaluating SaaS versus non-SaaS solutions

Lunch

12:00 – 13:10

13:10 – 14:00 ROUNDTABLE 3 - THREAT INTELLIGENCE

Automated Intelligence-Driven Detection and Defense
• Do you know the biggest cybersecurity threats to your organisation right now, and what tools do you use to provide that insight?
• How are you currently automating threat intelligence and threat detection?
• How do you measure the value of threat intelligence to the board?

14:05 – 14:50 ROUNDTABLE 4 - CERTIFICATE LIFECYCLE MANAGEMENT

Reducing Software Supply Chain Risk with Certificate Lifecycle Management
Join this session for best-practice guidelines for managing machine identities with automated certificate lifecycle management, which provides you with:
• Visibility: Shift to a proactive security mode with a holistic view of certificates deployed across your complex environment
• Control: Improve governance by enforcing business-specific policies and enabling centralized secure provisioning certificates
• Automation: Achieve crypto-agility at scale while maintaining security standards and compliance mandates

Coffee Break

14:50 – 15:00 Networking Coffee Break

15:05 – 15:55 ROUNDTABLE 6 - RANSOM RISKS

Quantifying the magnitude & impact of a ransomware attack
• How do you assess the blast radius of an attack
• How business cases have evolved to include sensitive data protection & recovery
• Board-level awareness of cybersecurity

16:55 – 17:00 Chairperson’s Summary Remarks
17:00 – 19:00 Drinks Reception & Networking
17:30 – 17:40 EPN Award Winners Announced

09:15 – 10:00 ROUNDTABLE 1 - THE MODERN CISO

The changing role of the CISO: Delivering on strategic, procedural & technical responsibilities to strengthen the business backbone
• What are the qualities & qualifications an information security leader needs, & how could this change moving forward?
• How to gain experience to keep up with the ever-evolving demands on the CISO
• How to be a visionary & lead top-down
• How can the CISO break the language barrier across the IT function & boardroom?

10:05 – 10:55 ROUNDTABLE 2 - THE CRIMINAL LANDSCAPE

Cyber crime workshop: Tactics & techniques of the criminal & how to protect yourself against them
• The threat landscape & how this is changing, & how does cyber crime fit in?
• Understanding the incentives & inner-workings of the criminal mindset
• Sharing insights on criminal tactics of social engineering & phishing
• What does the growth in cyber crime mean for your security protocols?

11:10 - 12:00 ROUNDTABLE 3 - SECURITY AWARENESS

Human error as the most significant threat to business security - Security awareness as the first line of defence
• Why, when & how doesn’t human awareness training stick? Successful training & education tools to secure long-term security-minded behaviours
• The role of culture & champions in the wider business in generating security awareness
• How do you approach when human error occurs? How should accountability be directed?

Lunch

12:05 – 13:10

13:10 – 14:00 ROUNDTABLE 4 - OT & IoT

Aligning IT, OT & IoT Security: Reducing risk through full visibility
• Trends in the changing remits of the CISO & how the CISO can take a broader view of security risks
• How can culture & structure adapt to gain wider risk visibility?
• Assessing technologies for monitoring, reporting & response in OT & IoT settings

14:05 – 14:50 ROUNDTABLE 5 - ROI

Overcoming the barriers to demonstrate ROI of risk reduction technology
• Developing a strong & agile security framework & utilising the skills & technology you possess
• How to effectively qualify & quantify risk, & demonstrate the value of investment?
• Gaining board buy-in to preventative not reactive protection - Going beyond minimal regulatory requirements

Coffee Break

14:50 – 15:00 Networking Coffee Break

15:00 – 15:50 ROUNDTABLE 6 - WFH & HYBRID ENVIRONMENTS

Excellence in Identity & Access Management: Trends in technologies, regulation & risk
• How are companies reframing their IAM strategies against the changing risk environment?
• Balancing IAM needs against ease-of-use
• How to approach IAM for newly leveraged APIs & applications
• How to categorise & integrate your existing tools for easier secure management

16:00 – 16:50 ROUNDTABLE 7 - NEW WAY OF WORK

What does The Great Reset mean for information security?
• How do you approach WFH & hybrid ways of working moving forward & what does this mean for security risk?
• How do you maintain company values, provide a collaborative & engaged culture, & deliver security awareness training in the “new” world?
• How do you approach staffing & new talent as workforce expectations are shifting?
• What does the WFH model mean for IAM?

16:55 – 17:00 Chairperson’s Summary Remarks
17:00 – 19:00 Drinks Reception & Networking
17:30 – 17:40 EPN Award Winners Announced


PLENARY HALL DISCUSSION

16:20 – 17:00 PANEL DISCUSSION

The Largest Risk to Company Stability: Overcoming the advancing cyber threat landscape
• How to evaluate risk & most effectively incorporate security into your technology roadmaps
• Is your board security minded? How can you bring the language of IT & the CISO to the table?
• How, where & when are threats changing, & best practice keep up with the continued evolution?

17:00 – 17:05 Chairperson’s Closing Remark


EPN IT SECURITY LEADERS AWARDS

Nominations are now open!
This September, EPN will be launching the inaugural EPN IT Security Leaders Awards.

Your Award Categories include:
1. CISO Lifetime Achievement Award
2. CISO of the Year Award
3. Women in IT Security Award
4. Security Awareness Leader Award

The IT Security Vision Advisory Board will independently select the award recipients. If you know someone who deserves to be celebrated for the impact they made in the technology space, then submit your nominations now.

With winners to be announced on the 28th September, at 17:30 London Hilton, you can look forward to meeting some of the most influential security professionals of today.


YOUR TECHNOLOGY SHOWCASE

Are you looking to showcase what you have on offer? Connect with the leading decision-makers in IT security through thought-leadership, brand awareness, & personal 1-on-1 time. Build your trust & demonstrate your value at EPN IT Security Vision 2022.
Sponsorship packages can be tailored-made to meet your requirements. Contact the sponsorship team to find out how you can utilise your opportunity to meet the CISO community.

ITSM
IDENTITY & ACCESS MANAGAGEMENT
REMOTE DEVICES
API
IOT
REMOTE IT
ANALYTICS
SURVEILLANCE
NETWORK SECURITY
3rd PARTY RISK
RISK MANAGEMENT
CLOUD SECURITY
ENDPOINT SECURITY
TESTING
DATA LOSS PREVENTION
MOBILE & APPLICATIONS

PLATINUM

Exhibition Space in Tier 1 Area, Private Delegate Lunch, Product Demo/ Keynote Speech, 5 x 121 meetings in the build-up, Co-branding on All Literature, Priority networking, Host a Roundtable, Drinks Reception Sponsorship

GOLD

Exhibition Space in Tier 1 Area, Product Demo, 5 x 121 Meetings in the Build-Up, Co-Branding on All Literature, Priority Networking, Drinks Reception Sponsorship

SILVER

Exhibition space in Tier 2 Area, 3 x 121 Meetings in the Build-Up, Co- Branding on Some Literature, Networking Sponsorship

BRONZE

Exhibition space in Tier 3 Area, Co-Branding on Some Literature, Networking Sponsorship

ENTRY-LEVEL SPONSORS

Branded Table in the Coffee Area, Networking Sponsorship


Take Part in the Expo / Top 3 ways you can gain exposure

1: Meet the decision-makers of corporate technology. Get to know the people who create digital success.

2: Save time & money by touching- base with your existing clients, making new contacts, & showcasing your expertise all in one place.

3: Don’t miss out on a community gathering without you. You should be part of the conversation.

Thought-Leadership

Position yourself among the leading experts of IT development & application.
Let the infosec community know that you are integral, & an expert, to the conversation.

Brand Visibility

Get your foot in the door as IT leaders seek for new applications
& technologies by showing the solution is out there… they just need to know that it is.

Demonstrating Value

Take part in the Product Demonstrations, & showcase your capabilities, so that your potential clients can learn that you are right for them.

Maintain Relationships

With f2f being too long missed, reconnect with your existing clients & show that you are ready & wanting more.



Register
Find the Location

ARE YOU READY TO REGISTER?

Date: 28th September 2022 You can secure your place now in just one of the 3 simple ways:
  • Call us on +44 7502 905308, & we can process your registration over the phone
  • Contact Amy Loveridge on aloveridge@epnleads.com
Are you busy on the dates? You can refer a colleague by filling out the recommendation form using the button below & we will get in touch soon.

LOGISTICS
Venue:
Hilton, Bankside
2 - 8 Great Suffolk Street
London
SE1 0UG
Dates:
28th September, 2022

CONTACT US


For speaking enquiries:
Sarah Rayment
srayment@epnleads.com


For media enquiries:
Amy Loveridge
aloveridge@epnleads.com


For delegate enquiries:
Naomi Fowler
nfowler@epnleads.com


For operational enquiries:
Alice Foster
afoster@epnleads.com

About Us

EPN is a network of C-Level professionals across all functions - IT, IT Security, HR, Finance, Marketing and Operations.

info@epnlive.com

Upcoming Events

  • CyberSec Berlin 2025
  • CyberSec Zurich 2025
  • Infotech Zurich 2025

Info Links

  • Home
  • Events
  • About Us
  • Solutions
  • Contact us

Follow Us

  • Youtube
  • Linkedin
  • Copyright © 2022 EPN Ltd – All Rights Reserved.
  • Privacy Policy and Terms and Conditions
  • EPN Live is a member of The CPD Certification Service
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT