Programme

The format and programme is designed to create thought-provoking discussions and equip attendees with the practical resources and constructive tools to sell and deploy cutting edge IT security solutions. With 19 sessions presented by international cybersecurity leaders, experienced CISOs (US Secret Service, Metro Bank, International Cyber Warfare Officers, World First and Aldermore Bank) and experts from our award-winning vendor portfolio, the conference is not to be missed!

You will learn:
What your customers are looking for in a SECaaS offering
How to align specific services and solutions with the most common customer requirements
How to transition from traditional, cloud or hybrid partner to a SECaaS leader, without disrupting you’re existing business
How to position and market your new SECaaS solutions to your customers
Which services you can provide to complement your SECaaS solutions

To learn more, click on the sessions!
  • Room A
    MobileIron Presentation
    11:50 - 12:30
    Breakout Session: Mobile-centric Zero Trust Security
    David Weeden, Channel and Alliances UK&I, Mobileiron
    Traditional security models designed on the premise of organisations having a well-defined IT perimeter no longer apply in the perimeter-less world. Passwords based security, which assumed that users operated and accessed business information only from within the enterprise IT perimeter were adequate in the past. But in today's IT environment, where users are accessing information from a variety of untrusted devices, apps, networks, locations, and services - passwords alone are no longer sufficient. It should be no surprise that passwords are still the number 1 cause of data breaches. According to the Verizon Data Breaches Investigations report - 81% of breaches involved weak or stolen passwords. This is because passwords are easily compromised.

    In the reality of today's security world how does an organisation protect itself? With a Zero Trust approach and framework to security. Zero trust assumes that bad actors are already in the network and secure access is determined by an 'always verify, never trust' approach. Zero trust approach requires that you verify the device, user, apps, networks, and presence of threats before granting access. In addition, you should have on-going enforcement. But with many theories about Zero trust how do you ensure you've taken the right approach. .
    panel 4
    12:30 - 13:30
    Panel Discussion:
    The Cloud is Ready - What is Everyone Waiting for?
    Entrust Datacard, GFI Software, Mobileiron & Progress | Ipswitch
    With a reported 22% of businesses operating their core systems from the cloud, what are the barriers for the other 78%; and how can the IT security channel help?

    What are the major concerns for those who still hang onto their data centres?
    What can SECaaS partners do to ease the concerns of some IT teams when it comes to greater cloud adoption?
    What are the biggest signs of growth potential for the next 2 years?
    How has one of the clear adoption online tools Office 365 impacted your business?
    Has availability run over security in this drive for productivity?
  • Room B
    Shelton-Newsham
    11:50 - 12:30
    Keynote:
    Cyber Threats, Gaps and Creating Opportunities
    Shelton Newsham, Regional Lead for Cyber Protect, Yorkshire & Humber Regional Cyber Crime Unit
    Shelton works alongside UK Government agencies, international law enforcement and investigation teams dealing with new attack vectors. Hear Shelton discuss insights into the state of cybercrime and current trends in the UK, organisational IT security challenges and the cybersecurity skills gap.

    Finally, Shelton will explain the importance of a multi-skilled sales force that is equipped to connect with people at all levels of an organisation, to maximise opportunities and sales revenue for partners.
    Paul Schomo Guidance Software
    12:30 - 13:00
    Breakout Session: Empower Your MSSP Business to Succeed
    Bill Orme, Central Government Sales Director, SonicWall
    The MSSP market is predicted to grow at a rate of approximately 25 percent to $24.1 billion by 2021 and today’s high growth solution provider’s view managed services as the No.1 source of business growth. In line with this, MSS business offerings are expanding and MSSP’s need to be armed with the tools, services and programs to meet their customers’ needs and business goals.

    Running a successful MSSP business can be challenging, the threat landscape changes quickly and operational efficiency can be hampered by evolving infrastructure, tools and resources – join this session to learn how to overcome these challenges and empower your business to succeed in this growing market.
    Sir-Kenneth-Olisa
    13:00 - 13:30
    Keynote: Disruptee or Disruptor? Surviving in the Age of Ubiquity
    Sir Kenneth Olisa, HM Lord-Lieutenant of Greater London
    The Age of Ubiquity threatens every organisation with a conundrum – to be a survivor or a victim. To be a Disruptor or a Disruptee. Many mistakenly believe that the answer is in the hands of the gods but it is in fact a choice. And having made the top level choice, every individual has to decide what role they will play – take action? Or bury their head in the sand?

    For those intending to avoid destruction and to join the vanguard of change they need to understand that:

    i. Success will come from a combination of two personality types – MAD and CALM. Typically, entrepreneurs are MAD (mission addicted disruptors) and corporate executives are CALM (change-averse line managers).
    ii. While both assume that their culture is superior - both are wrong.

    Ken has seen four decades of tech evolution and shares his views on disruption.
  • Room C (Tech)
    live-demos1
    11:50 - 12:30
    Multi-Layered Security for the Cloud: Live Tech Demos
    iboss & Tripwire
    The cloud has opened new avenues for the way’s businesses function. The ease of deployment, adaptive scalability, and economical costs of the cloud platform have many organisations adopting it. However, it is widely recognised that Microsoft’s and AWS’ built-in security tools alone cannot protect businesses from the latest advanced security threats and help them meet compliance needs.

    Our vendors will discuss how they can help you to secure your public cloud environment with a multi-layered and safe approach to security.
    live-demos2
    12:30 - 13:30
    Multi-Layered Security for the Cloud: Live Tech Demos
    Idaptive, Mobileiron & Netwrix
    The cloud has opened new avenues for the ways businesses function. The ease of deployment, adaptive scalability, and economical costs of the cloud platform have many organisations adopting it. However, it is widely recognised that Microsoft’s and AWS’ built-in security tools alone cannot protect businesses from the latest advanced security threats and help them meet compliance needs.

    Our vendors will discuss how they can help you to secure your public cloud environment with a multi-layered and safe approach to security.
VSEC Conference 2019