clearswift
egress
forcepoint
forescout
logpoint
netconsent
sophos
quorum
thycotica>
james lyne

James Lyne

Cybersecurity specialist, Global Head of Security Research at Sophos, Certified Instructor at SANS and TED speaker

James Lyne is global head of security research at the security firm Sophos. He is a self-professed 'massive geek' and has technical expertise spanning a variety of the security domains from forensics to offensive security.

James has worked with many organisations on security strategy, handled a number of severe incidents and is a frequent industry advisor.

He is a certified instructor at the SANS institute and often a headline presenter at industry conferences – including our very own SecureTour!

James has given multiple TED talks, including at the main TED event. He has also appeared on a long list of national TV programs to educate the public including CNN, NBC, BBC News and Bill Maher.

Graham Cluley

Independent computer security analyst and award-winning blogger

Graham Cluley has been at the forefront of cybersecurity for over 20 years, since before most organisations had even heard of the term. He has worked for some of the biggest companies in the field and is now a respected blogger, thought-leader and consultant.

Graham’s award-winning blog is widely praised as being at the forefront of news and information on the rapidly changing world of cybersecurity.

From malicious attacks to data theft, corporate espionage to mischief-making and campaigning exposés, he gives opinion on the hype and the reality of the threats to nations, organisations and individuals whilst educating all to take cybersecurity more seriously.

Mustafa Al-Bassam

Lulzsec co-founder turned Information Security Advisor to Secure Trading

At the age of 16 he was the co-founder of LulzSec where Mustafa operated under the alias of Tflow, a hacking group which made headlines for its hacks on Sony, Fox and the FBI.

He has previously worked to physically analyse the destruction of computer equipment ordered by GCHQ that held top-secret material leaked from the NSA and GCHQ.

Mustafa has advised human rights defenders around the world on protecting their data and communicating securely online and created a tool for Tunisian dissidents to defend themselves against state-planted malware during the Arab Spring.

Mustafa is currently a security advisor and PhD researcher focusing on cryptocurrency and decentralised technology.

Quentyn Taylor

Director of Information Security for Canon Europe

Quentyn Taylor is Director of Information Security for Canon Europe. He has a wealth of experience in both the IT and information security arenas and, in recent years, has focused his attention on building business relationships across the world.

Quentyn has driven Canon’s strategy to highlight the importance of document security and help business customers to minimise their security risk. Quentyn strongly believes in educating users about the importance of a comprehensive, overall security policy that will allow Canon’s business customers to improve security in a cost-effective way.

During his career, Quentyn has worked in a variety of industries for a number of organisations including outsourced service providers, Internet service providers as well as Dotcom businesses.

Jennifer Arcuri

Producer, Founder of the Inno-Tech Summit, and Cyber Security Ethical Hacker

Jennifer Arcuri is a serial entrepreneur who most recently founded Hacker House an expert community network dealing in cyber security and ethical hacking.

Arcuri describes herself as a “cyber security ethical hacker guru” and has had previous digital experience in social media, ecommerce, social commerce, website development and mobile development & marketing.

In January 2013 Arcuri launched the InnoTech Network, a firm running events, networking and startup funding to grow technology clusters worldwide.

Paul Ducklin

Senior Security Advisor for Sophos

Paul Ducklin is a passionate security proselytiser. (That's like an evangelist, but more so!) He lives and breathes computer security, writing daily for Sophos on their Naked Security blog.

As one of the world's leading virus experts, Paul has given papers and presentations at various industry events including Virus Bulletin, ICSA and AVAR conferences.

He has also written several articles on cyber threats and is a respected industry thought-leader.

James Lyne

Cybersecurity specialist, Global Head of Security Research at Sophos, Certified Instructor at SANS and TED speaker

Graham Cluley

Independent computer security analyst and award-winning blogger

Mustafa Al-Bassam

Lulzsec co-founder turned Information Security Advisor to Secure Trading

Quentyn Taylor

Director of Information Security
for Canon Europe

Jennifer Arcuri

Producer, Founder of the Inno-Tech Summit, and Cyber Security Ethical Hacker

Paul Ducklin

Senior Security Advisor for Sophos
09:00

Arrival and Registration

Morning tea, coffee, breakfast and networking with early arrivals and staff
09:30

Opening Remarks: Jez Turner

Conference chair and Chess Cybersecurity co-owner
accordion closedInfo
The cybersecurity industry advancements that matter most to you

Jez Turner, SecureTour conference chair and Chess Cybersecurity co-owner will look into the high level changes that have occurred in our industry over the last ten years.

Jez will explain the pace of escalation Chess Cybersecurity customers have faced with the explosion of threat vectors, malware volume, and improved sophistication of hackers as well as the breath of technology solutions that are emerging.

Learn how these industry advancements have affected Chess Cybersecurity customers first hand. How to prioritise defences and what tomorrow’s threat landscape looks like.

The challenge of change. Look at how things have changed in the past 10 years, the challenges we face today and will face tomorrow. Is technology coping and how will it cope in the future. The plethora of threat vectors, a bewildering array of technology and an increasing number of business issues. How do you make sure you're doing the right thing. Do others have the same problems. What should you be thinking about.

10:00

Keynote: Graham Cluley

Independent computer security analyst and award-winning blogger
accordion closedInfo
Three threats that should be keeping you awake at night

If you're losing sleep over state-sponsored attackers you're approaching things the wrong way. Yes, intelligence agencies are hacking some firms, but chances are that they're not interested in yours.

Financially-motivated hacks and frauds are on the rise because it has become so easy for attackers to steal large amounts of money. And there's no need for criminals to know how to write malware to potentially steal millions from your business.

Graham Cluley describes the ways high street businesses are losing data and allowing fraudsters to steal sometimes vast amounts of money, and what you can do to reduce the chances of your organisation being the next victim.

10:30

Keynote: Quentyn Taylor

Director of Information Security at Canon for EMEA
accordion closedInfo
IoT and Printing. The unloved elephant in the room
  • Why do IT not care about printers and why the company should?
  • It’s more than a pile of paper in your office.
  • Is it a neglected server sitting in the corner?
  • Unleashing the positive power of the physical digital interface.

- Substitute speaker at Belfast, Manchester and Edinburgh

Hacking Demonstration: Carl Williams

Enterprise Security Architect & SANS trained ethical hacker, Chess Cybersecurity
How to bypass device control with a £1 USB device

Carl Williams, who is our enterprise security architect, knows a thing or two when it comes to hacking. 

He's been SANs trained on the subject by James Lyne who is speaking at this year’s Secure Tour. Carl also wrote our new Advanced Ethical Hacking Course which launched this year.

In this fascinating presentation, Carl reveals, live, how to hack a targeted PC by using a £1 USB device. He'll attempt to bypass device control by tricking it into thinking it's a keyboard. Giving him command execution and command and control of the victims machine.

Carl will then explain lessons learnt from this demonstration. Giving practical measures for ensuring your network stays safe from such attacks.

11:00

Refreshment Break

A quick coffee break to check emails or chat further with our speakers and vendors
11:15

Technology Showcase Breakouts AM

Choose three of the five 30 minute technology showcases that are on offer
accordion closedInfo

am

11:15am - 12:45am

Choose three of the five 30 minute technology showcases that are on offer

Room 1

Identifying Security Breach through Contextual Analysis in SIEM.
The earlier you identify a security breach, the easier and cheaper it is to contain. LogPoint SIEM pinpoints anomalies in your network by correlating multiple data sources and generating alerts to anything out of the ordinary. It's this contextual awareness that enables you to prioritise the most critical incidents and act to contain them. Join security specialists from LogPoint as they demonstrate how this straightforward-to-use SIEM could save you time, money and reputation.

Room 2

Quorum is the global leader in 1-click recovery, providing everything needed for immediate recovery of your critical systems after any storage, system or site failure.

Quorum’s onQ Disaster Recovery as a Service" (DRaaS) solution provides organizations with both local and remote instant recovery capabilities for their servers, applications and data.

Room 3

The next thing in next-gen:
Sophos XG Firewall brings a fresh new approach to the way you manage your firewall, respond to threats and monitor what’s happening on your network. Get ready for a whole new level of simplicity, security and insight. Jon Hope from Sophos will showcase the innovative features of XG that make your job easier as well as ensuring your network is secure;

Don’t get held to ransom:
Ransomware is a $1 billion business that often evades traditional anti-malware. Learn what you’re up against and how to stop it. Sophos has utilised proven CryptoGuard capabilities to block ransomware as soon as it starts trying to encrypt your files, returning data to its original state. Sophos’s Paul Biant will demo the key features of Intercept X.

Room 4

Whilst many organisations readily spend significant money and resources on technical solutions to secure their assets, very few invest anything in the weakest link – their employees. With over 56% of data breaches in Q1 2016 being attributable to “Disclosure in Error”, automated policy compliance and education delivers immediate benefits towards achieving cyber resilience.

Room 5

A fast start to GDPR Compliance
Discover how you can support your team to become more vigilant when processing and sharing data with an unprecedented level of security and sanitisation features for email, web and cloud applications. Learn how to enforce policies and automate best practice data protection processes with Clearswift’s Adaptive DLP (A-DLP) technology to prevent threats and data breach risks every day.

12:45

Lunch

Grab some food whilst networking with peers or have 1-2-1s with any vendors that catch your eye
13:30

Keynote: Jennifer Arcuri

Producer, Founder of the Inno-Tech Summit, and Cyber Security Ethical Hacker
accordion closedInfo
Internet of Vulnerabilities: How You Will Be Pwned

Nowadays, everyone is talking about getting hacked. Everyone seems to be a target. Whether you are a Fortune 500 corporate or a small start up, no one is free from the wrath of an online attack. 

Whether its the information on your facebook account, the inbox connected to your microwave, the brakes of your car, or the email link sent to your company lap top, there are more and more attack vectors then ever before. And it doesn’t just stop with an automated bot. Sometimes you are targeted online and won’t even know that someone is inside your machine for the better part of a year. How can you keep up with the continuing occurrence of attacks? What can you do to personally protect yourself and your organisation against such attackers?

Spear-phishing attacks remain a tried/true tactic for everyone from cybercriminals to nation-state groups. They’re cheap, they’re cheerful, and thanks to human beings’ ongoing proclivity to be socially engineered, phishing continues to be a top threat. 

To see why, attend this live demonstration of how an attacker goes about constructing and executing a phishing attack. 

In this talk we will discuss and demo an example of a:

  • Spear phishing attack
  • Whaling Attack 
  • Watering Hole Attack
  • Give a list of things you and your organisation can do to better protect yourselves
14:00

Keynote: Mustafa Al-Bassam

Lulzsec co-founder turned Information Security Advisor to Secure Trading
accordion closedInfo
The incentive for cybersecurity

As a teenager, Mustafa Al-Bassam, operating under his alias Tflow, was involved in the high profile hacking group LulzSec who publicly exploited a large number of corporations and governmental organisations.

Mustafa is now on the ‘other side’, working on information security research. Putting him in a unique position to understand the differences between theory and reality, and the shortfalls in the cybersecurity industry.

As such, not only will Mustafa expose untold stories from his LulzSec, Tflow, days but will reveal what he has learnt when it comes to the incentives organisations have to invest or not invest in cyber defences, and how he sees the future of cybersecurity evolving.

- Substitute speaker at Belfast

Keynote: Jake Davis

LulzSec co-founder turned white hat security advisor
The first-hand truth behind Lulzsec

As a teenager, Jake Davis, operating under his alias Topiary, was involved in the high profile hacking group LulzSec who publicly exploited a large number of corporations and governmental organisations.

Jake now works legitimately - writing, speaking, and consulting around the Information Security sector. As well as occasionally advising on TV, film, radio, and theatre. Blending art and hacking is a passion of Jake’s.

Jake will relive some untold stories from his LulzSec days, and will reveal the psychologies behind hackers and hacking: what it means, what it feels like, the incentives, and importantly the motives - the whats, whys, and wheres of it all.

14:30

Technology Showcase Breakouts PM

Choose two of the four 30 minute technology showcases that are on offer
accordion closedInfo

pm

14:30pm - 15:30pm

Choose two of the four 30 minute technology showcases that are on offer

Room 1

The evolution of passwords: Why 300 Billion Passwords Will Be at Risk by 2020.
Tim Carolan discusses the incredible proliferation of passwords and why they will continue to be necessary. He then explores the difference between human and non-human privilege accounts and why this distinction will ultimately lead to enhanced organisational security.

Room 2

ForeScout’s CounterACT agentless technology dynamically identifies and assesses all network users, endpoints and applications to provide complete visibility, intelligence and policy-based mitigation of security issues. It transforms your network security by providing you with visibility of all types of devices connected to your network – as soon as they connect.

Room 3

With reputation and regulation to consider, data breaches concern everyone from the IT department to the board room. The stakes have never been higher for organisations that share sensitive data. Join Egress to understand how a combination of user engagement, threat intelligence and data security measures will shape the future of breach prevention.

Room 4

Forcepoint brings together the user protection, data security and cloud expertise of Websense with the insider threat and analytics technology of Raytheon, and the next-generation network protection capabilities of Stonesoft.

From Government departments and agencies to small businesses, over 20,000 organisations of all sizes and across all sectors around the world use Forcepoint to enable better decision-making and more efficient security.

15:30

Refreshment Break

A quick coffee break to check emails or chat further with our speakers and vendors
15:45

Keynote: James Lyne

Cybersecurity specialist, Global Head of Security Research at Sophos, Certified Instructor as SANS and TED speaker
accordion closedInfo
TBC

Jame’s keynote synopsis is on the way. One thing we do know though – it’s going to be a great talk in which he’ll no doubt attempt to hack everything!

- Substitute speaker at Belfast, London, Edinburgh and Manchester

Keynote: Paul Ducklin

Senior Security Advisor for Sophos
At the end of the day – what next?

Learning about computer security is vital, but it can be a bit dispiriting. When you get home, what next? Turn off all your computers, bin your mobile phones, disconnect the smart TV and break out the wind-up gramophone?

With this in mind, we thought we'd finish on an upbeat note, with three things you can go out and do to hit the cybercrooks right where it hurts - in their Bitcoin wallets!

16:15

Ask the Speaker Panel Session

All keynote speakers
accordion closedInfo
No holds barred questions for our industry experts

In what will sure to be a fascinating and engaging end to the day, the audience will get a chance to quiz our speakers.

This Q&A session will be fast paced as we cram in as many questions as possible before the conference closes.

16:30

Conference close

uk map

Belfast

Belfast Castle

Cambridge

Duxford Imperial War Museum

Edinburgh

National Museum of Scotland

London

Marriott St. Pancras Renaissance Hotel

Manchester

Old Trafford Football Stadium

Rescheduled due to recent events

Belfast

Belfast Castle

Cambridge

Duxford Imperial War Museum

Edinburgh

National Museum of Scotland

London

Marriott St. Pancras Renaissance Hotel

Manchester

Old Trafford Football Stadium

Rescheduled due to recent events

  • Last year's SecureTour in numbers
  • 5 events
  • 7 sponsors
  • 300+ attendees
  • 604 cups of coffee
  • 1,200 keynote minutes

Clearswift is trusted by thousands of organisations globally to protect their critical information. The company’s adaptive cyber solutions enable their customers to secure their business-critical data from internal and external threats, thus allowing them to collaborate securely.

Egress Software Technologies provides data security services designed to protect shared information throughout its lifecycle to both public sector and enterprise customers.

Data breaches caused by human error inside organisations are not always discovered immediately. Very often, the breach may not be discovered until it’s too late.

So the Egress secure data transfer solution protects shared data through its whole lifecycle, and proves the appropriate measures have been taken.

NETconsent is widely recognised as a leading vendor of compliance and communications software that automates the policy management life-cycle, delivers e-learning content and promotes user awareness.

Founded in 2000 and strongly committed to a growing global customer base and reseller channel, the company operates from offices in the UK, United States and Middle East. 

Forcepoint brings together the user protection, data security and cloud expertise of Websense with the insider threat and analytics technology of Raytheon, and the next-generation network protection capabilities of Stonesoft.

From Government departments and agencies to small businesses, over 20,000 organisations of all sizes and across all sectors around the world use Forcepoint to enable better decision-making and more efficient security.

ForeScout’s CounterACT agentless technology dynamically identifies and assesses all network users, endpoints and applications to provide complete visibility, intelligence and policy-based mitigation of security issues. It transforms your network security by providing you with visibility of all types of devices connected to your network – as soon as they connect.

LogPoint is a European Security Information and Event Management (SIEM) pioneer, having introduced its SIEM product to the market in 2008. It is the only SIEM solution in Europe to be EAL3+ certified, which means that as well as being a full enterprise SIEM solution, it is also accredited for use at the highest levels of the intelligence and security community.

Sophos products allow you to secure every end point of your network, from laptops to virtual desktops and servers, to web and email traffic and mobile devices. With Sophos, your network is secured through the one thing no one else can deliver: Simplicity.

Quorum is the global leader in 1-click recovery, providing everything needed for immediate recovery of your critical systems after any storage, system or site failure.

Quorum’s onQ "Disaster Recovery as a Service" (DRaaS) solution provides organizations with both local and remote instant recovery capabilities for their servers, applications and data.

Thycotic provides solutions that prevent cyberattacks by securing passwords, protecting endpoints, and controlling access.

Privileged account passwords rank among the highest priority and most lucrative of security targets in any organisation. Once in the wrong hands, they can provide direct access to privileged accounts and resources – with the potential to inflict maximum damage.