Register Now

SC Congress London 2015 Programme

3 March 2015
8:30 AM - 6:30 PM

Exhibition Hall Open

8:30 AM - 9:00 AM

Registration and breakfast served

9:00 AM - 9:40 AM

Session 1

  • Dissecting APT's

Everyone is a target now – identifying advanced intruders and their methods – and reacting fast. What works?


  • Becky Pinkard
  • David Prince
  • John Colley , John Colley, CISSP, is Professional Head, EMEA and Chair of the EMEA Advisory Council for (ISC)2, a non-profit professional consortium which has certified nearly 100,000 members worldwide, including over 16,000 ...
9:45 AM - 10:25 AM

Session 2

  • Keynote: Can I trust cloud security?

How to benefit from the cloud securely. What to outsource, when to do it, and how, including due-diligence: Questions to ask when choosing your provider.


  • Matthew Tyler , Matthew Tyler has 25 years experience working with some of the largest brands in strategic risk, security and compliance. In the mid 80s Matthew worked for the fledgling Financial Services ...
  • Nick Ioannou , Nick Ioannou is a senior IT professional with over 20 years of experience, blogger and author. As Head of IT at the architectural practice Ratcliffe Groves he has been using ...
  • Thom Langford , Thom is the Director of Sapient’s Global Security Office, responsible for all aspects of delivery and internal security, risk and compliance, and business continuity across Sapient’s global operations. Having successfully ...
10:30 AM - 11:00 AM

Sponsored Sessions

Theatre 1

  • Network Defences will be Breached – Defence in Depth

Malicious insiders are in your network, and malicious outsiders will breach your network defences. Can you stop them at the resource level? Learn how.


  • Steven Ringelberg , Steven Ringelberg is the Chief Operating Officer and General Counsel of Vanguard Integrity Professionals, the Cybersecurity Experts for large enterprises and government agencies. Ringelberg joined Vanguard in 2007 as General ...

Sponsored by : Vanguard

Theatre 2

  • Can Cloud Providers Guarantee Data Privacy?

While global cloud adoption continues to accelerate, organisations in many regions have been hesitant to use the cloud because of concerns over the privacy and sovereignty of sensitive data. The basic nature of the cloud makes data residency a slippery concept - data will inevitably cross national boundaries. Although cloud providers offer robust infrastructure, you have to take responsibility for the protection of your own data. This presentation will describe strategies for applying encryption and tokenisation to assure your compliance with data protection laws, while still taking full advantage of the cloud.


  • Andrew Bartlam , Andrew Bartlam is VP EMEA Alliances & Business Development for CipherCloud. He is a 20-year industry veteran having occupied Senior Management, Sales and Strategic Alliances roles at organizations including Jive ...

Sponsored by : CipherCloud

Theatre 3

  • Data Classification: A Practical Approach

Danny Maher of Boldon James’ Elite Partner, HANDD Business Solutions, takes a practical look at implementing Data Classification as part of a Data Centric Security and Governance approach. The session will consider the project steps needed to implement a successful enterprise data classification solution across your organisation and how it can realise the following key benefits: • Safeguard confidential Information • Increase employee awareness of the need to protect sensitive data • Enforce data security and governance policy • Enhance Data Loss Prevention • Harness the value of your ‘big’ data • Enhance the performance of IT security and data management solutions • Improve access control and auditability


  • Danny Maher , With 15 years’ IT experience Danny heads up the Global Pre-Sales Team at Boldon James’ Elite Partner, HANDD Business Solutions and specialises in Managed File Transfer, DLP and Data Classification. ...

Sponsored by : Boldon James

11:00 AM - 12:00 PM

Beverage/coffee break in the Exhibition Hall

12:00 PM - 1:00 PM

Keynote lunch

  • Internet of Things demo

Why attack - or defend - a fridge?


  • Ken Munro , Ken is a highly acclaimed and respected security professional who is well known on the speaking circuit for his engaging and insightful presentations. He has been working in IT security ...
1:05 PM - 1:50 PM

Session 3

  • Big Data is a threat to privacy

Discussion: How to secure data while meeting compliance, privacy regulations and expectations. Are new EU data protection regulations too onerous, or has privacy already been lost?


  • Andrew Rose
  • Bob Tarzey , Bob writes regular analytical columns for Computing, Computer Weekly, TechRepublic and Computer Reseller News (CRN), and has written for The Times, Financial Times and The Daily Telegraph. Bob blogs for ...
  • Carolyn Williams
  • Emma Carr
  • Jeremy King , Jeremy King leads the Council's efforts in increasing adoption and awareness of the PCI security standards internationally. In this role, Mr. King works closely with the Council's General Manager and ...
1:55 PM - 2:25 PM

Sponsored Sessions

Theatre 1

  • 6 Things to Consider with and Identity-as-a-Service (IDaaS) Solution

The number and variety of apps that are being adopted by organisations – from on premise to cloud-based and software as a service (SaaS) to mobile apps – is rapidly expanding and increasing. While IT continues to deliver new and varying apps, lines of business and even individuals are now also adopting apps independently of IT at an astonishing rate. As a result, employees typically need to authenticate with a dizzying array of systems, from a variety of PC and mobile devices, with each app representing another silo of identity for IT to manage. Identity-as-a-Service (IDaaS) is an emerging solution category for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS solution. Today, we would like to discuss six of the top considerations.


  • Ian Berry , Centrify's Ian Berry has over 10 year’s experience of Security, Identity Management and Access Management, working for many organisations in a sales and management capacity, across various verticals. Most recently, Ian ...

Sponsored by : Centrify

Theatre 2

  • Innovate and Integrate – Modernising API Security

Today, organisations are challenged with the increasingly difficult task of improving interoperability and expanding accessibility without compromising security. In this session, Jason Macy, Forum Systems’ CTO, will discuss how enterprises can fulfill the demand of increased business integration without sacrificing security and protection. Topics covered will include: Architecture design, the key to enabling business agility. How to combine identity access control with data security. Simplifying your architecture to reduce costs.


  • Jason Macy , Jason Macy is the Chief Technical Officer responsible for innovation and product strategy for global operations. Jason has been a leading visionary for enterprise architecture design and successful deployment API ...

Sponsored by : Forum Systems

Theatre 3

  • Data protection – own your asset before your adversary

With cyber threat now a top concern for most CEOs, this session will focus on the value of adopting a risk-based, data-centric security strategy that aligns with corporate objectives. A summary of the latest threat-based telemetry will be shared alongside a review of the proposed requirements from the EU on Data Protection. The combination will form a compelling case for all organisations to reassess the basic infrastructure and compliance-only security programmes that exist today. This session will help bring you up to speed on the latest threat intel and cover the tactics and techniques today’s sophisticated adversary uses. We will also discuss the role of the security team to proactively identify and protect business assets followed by best practice guidelines on how to detect, respond and recover from a security incident.


  • Neil Thacker , CISSP, CEH & OPST is Information Security & Strategy Officer, EMEA for Websense. Neil holds 15 years’ experience in the Information Security industry with 10 years financial services experience ...

Sponsored by : Websense

2:25 PM - 3:10 PM

Beverage/coffee break in the Exhibition Hall

3:10 PM - 4:00 PM

Session 4

  • Is your BYOD policy working?

Staff have their own devices. Do they connect to your network? Are you in control of how they are used for company business? What are your recovery or delete policies for lost and stolen devices?


  • Bryan Littlefair
  • John Walker , Visiting Professor at the School of Science and Technology at Nottingham Trent University (NTU), Visiting Professor/Lecturer at the University of Slavonia [to 2015], Author, Writer, International Speaker, architect of the ...
  • Mark Brown , Mark is an Executive Director within the Risk Advisory practice and leads EY's focus on Cyber Security and Resilience within UK & Ireland. He provides cyber security consultancy and ...
  • Sarb Sembhi , Sarb is the Director of Consulting Services at STORM Guidance, and responsible for consulting services provided to clients and through partners. Before this role, Sarb was Director of Consulting Services for ...
4:05 PM - 4:35 PM

Sponsored Sessions

Theatre 1

  • How to Think About Security: Cyber Attack or Inside Job?

The biggest threat to an organisation's cyber security isn't malware, phishing scams or even hackers - it is its employees. IT departments have lost visibility and are no longer in control of the corporate network and outdated technology is commonly addressing the problem - focusing on, "looking inwards and at what's coming in," instead of "what's going on within the company and what's going out".


  • Charles Milton , Charles Milton has been EMEA Service Provider Director for Zscaler Inc. since 2010 and has been instrumental in Zscaler’s rapid growth from market entrant to leading Cloud Security service. Charles ...

Sponsored by : Zscaler

Theatre 2

  • From "fences" to "bodyguards"- How data-centric security works

Today’s info protection environment is evolving rapidly, with paradigm shifts including BYOD devices, cloud environments, and increased regulatory oversight. This session addresses the new strategies evolving for this new world.


  • Rui Melo Biscaia , Mr. Biscaia serves as the Director of Product Management for Watchful Software, and is responsible for the company's product direction and go-to-market efforts. Prior to Watchful, Mr. Biscaia was ...

Sponsored by : Watchful Software

Theatre 3

  • Endpoint Security for the Modern Enterprise

Endpoint protection. Secure file sync and share. Both are massive opportunities for today’s enterprise thanks to their business benefits and widespread user appeal. But one size does not fit all, especially user-adopted consumer technologies. In this presentation, Andy will discuss why organisations must apply the right enterprise-ready tool for the job in order to properly manage, secure and protect data living on endpoints while continuing to enable a mobile and productive workforce.


  • Andy Hardy , Andy Hardy is Managing Director, EMEA Sales at Code42. In his previous experience, he ran international sales for Dell and Compellent. Prior to working for those storage and cloud vendors, ...

Sponsored by : Code42

4:40 PM - 5:30 PM

Closing Keynote

  • The future CISO

Technologist, Adminstrator, Manager; or Director; MSc or MBA; integrated security or CIO, or DPO? What's the future for the head of information security?


  • Andrew Rose
  • Bob Tarzey , Bob writes regular analytical columns for Computing, Computer Weekly, TechRepublic and Computer Reseller News (CRN), and has written for The Times, Financial Times and The Daily Telegraph. Bob blogs for ...
  • Mike Loginov
  • Prof. Fred Piper
5:30 PM - 6:30 PM

Exhibition Hall: Closing cocktails and Passport to Prizes

  • Passport to Prizes

Get your "passport" stamped at all sponsor stands for a chance to win prizes such as Lenovo Yoga 8" tablet, an Ai Ball, a Go Pro camera, an iPad mini, bluetooth speakers and more! Winners will be drawn during the cocktail hour in the Exhibition Hall and must be present to win.

Sign up for our Newsletters

Platinum Sponsors

Organised By