Senior Account Executive, UK&I
Oliver leads the sales organisation for Agari in UK and Ireland offering advanced email security solutions. Oliver works with customers to help them build advanced email threat protection layers that fill the security gap created by legacy gateway solutions and cloud adoption. In his 15 years of experience in Information Security, Identity & Access Management and Privileged Access Management, Oliver has held senior sales management roles with leading providers including, Bomgar, Now BeyondTrust, Micro Focus and Compuware. Oliver holds a Bachelor of Science degree from Queen Mary University of London.
Current email landscape and evolving identity threat.
Agari was founded by the thought leaders behind Cisco’s IronPort solution and co-founders of the DMARC standard for email authentication. Using predictive AI informed by global intelligence from around 2 trillion emails annually, we protect organizations against phishing, business email compromise (BEC) scams and other advanced email threats.
Northern Region Sales Manager
Blueliv is an award-winning threat intelligence provider from Barcelona, Spain. We look beyond your perimeter, scouring the open, deep and dark web to deliver actionable intel to manage digital risk. Covering the broadest range of threats on the market, a pay-as-you-need modular architecture means customers receive cost-effective intel delivered in real-time, backed by a world-class analyst team.
Understanding the threats outside your network in 2020
- What are the top cyber trends Blueliv are seeing in 2020 across industries?
- How does Cyber Threat Intelligence complement what is already in place within your organisation?
- It doesn’t have to complicated, the Buyers Guide to Threat Intelligence and demystifying outdated preconceptions.
Blueliv provides reassurance to our customers that they have excellent coverage of what is relevant and targeted towards them from the open, deep and dark web. Threat Compass is an easy to use SaaS portal that provides appropriate actionable insight so the that the board can be better informed on what is actually happening.
EMEA Channel Director
A New Networking & Security Architecture for the Global Enterprise
Understand a new architectural approach focused on 4 main characteristics:
- Cloud Native
- Globally Distributed
- Supports all Edges (WAN, Cloud, Mobile)
Cato Networks is the world’s first cloud-native carrier. Cato connects all datacenters, branches, mobile users, and cloud resources into a managed SD-WAN service -- natively built with the global reach, self-service, and agility of the cloud. Cato combines cloud-scale infrastructure, pure software-defined architecture, and deep technical expertise to deliver a future-proof network that evolves at the pace of your business.
Sales Engineer Team Leader
Software security for DevOps and beyond
- Trends in Software Development – Shorting Delivery Cycle and Machine Learning in Testing
- Maslow Hierarchy of needs – Software Security Version
- Emerging Technologies and What it means to us
Checkmarx makes software security essential infrastructure, setting a new standard that’s powerful enough to address today’s and tomorrow’s cyber risks. Checkmarx delivers the industry’s only comprehensive, unified software security platform that tightly integrates SAST, SCA, IAST and AppSec Awareness to embed security into every stage of the CI/CD pipeline and minimize software exposure. Over 1,400 organizations around the globe trust Checkmarx to accelerate secure software delivery, including more than 40 percent of the Fortune 100 and large government agencies.
Vice President of Sales (EMEA)
Predicting the unpredictable: How you can prevent email data breaches
People leak data every day. They are prone to making mistakes and behaving unpredictably, and as almost every employee has access to email, it’s one of the most at-risk applications for modern enterprise organisations. As the rise in email data breaches shows, static email security solutions can’t keep pace with this growing threat and are failing to protect sensitive information.
So, how is it possible for CISOs and security professionals to predict the unpredictable, and mitigate this risk?
Join this presentation to understand the psychology behind insider data breaches; how traditional technologies have failed to mitigate this threat; and the role of emerging technology, such as contextual machine learning, to empower employees to work more securely and prevent email data breaches.
Egress provides human layer security – helping users receive, manage and share sensitive data to meet compliance requirements and drive business productivity. Egress’ award-winning platform makes sure emails and files are delivered to the correct recipient, encrypts and protects sensitive data, and provides compliance auditing and reporting.
Senior Sales Engineer
Gareth Kitson has a wealth of experience to draw on, a Certified Ethical Hacker with previous experience on the “good guys” side working within Public Sector, Start-up and global Virtualization and Cloud technologies then joining Mimecast. Whenever not using any microphone, video conferencing, telephone or meeting to deliver the Mimecast Cyber Resilience message -which transcends security technology alone, Gareth can be found spending time with his wife and three kids, honing his Ethical Hacking skills in dark corners or throwing fast cars around corners.
Protecting your business does not stop at these four walls
- Traditional protection perimeters are expanding and sometimes dissolving completely.
- How do you provide protection beyond the perimeter for your business brand.
- How do you provide protection beyond the perimeter for your customers.
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience. Mimecast’s expanded cloud suite enables organizations to implement a comprehensive cyber resilience strategy. From email and web security, archive and data protection, to awareness training, uptime assurance and more, Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure. www.mimecast.com
Senior Sales Engineer
With 18 years of experience in Cyber Security, Jon has a passion for firewall technologies and has more recently become heavily involved in the public cloud security team at Sophos. When not engaged in public speaking, Jon will be found scoping and designing security solutions and training the Sophos reseller community.
‘Is Your Head in the Clouds?’
Public Cloud presents enormous opportunities to businesses of all sizes, from becoming more agile, improving customer experience and shifting spend from CapEx to OpEx. It’s true, however, that the brave new world of public cloud is fraught with danger and security teams must acknowledge this risk and adapt to faces the challenges. In this session we’ll look at what you can do to secure and monitor your public cloud infrastructure.
Three Key Steps to Improve Your Privileged Access Management Maturity Level
With up to 80 percent of breaches due to compromised credentials according to leading analysts, more organizations than ever before are prioritizing privileged account protection. Gartner noted that Privileged Access Management be your top cyber security project for 2019 the 2nd year in a row.
But a recent survey by Thycotic found 85% of organizations fail to meet even basic PAM security maturity levels. And among those who fall short, 55% have no idea how many privileged accounts they have or where they’re located.
The easiest to manage and most readily adopted privilege management solutions are powered by Thycotic. Thycotic’s security tools empower over 10,000 organizations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control. Headquartered in Washington, D.C., Thycotic operates worldwide with offices in the UK and Australia. For more information, please visit https://thycotic.com
ZeroFOX Regional Sales Director, UK
Defending Yourself Against Digital Risks Beyond Your Control
- Understand your Digital "Perimeter" and associated Risks
- Leverage the ZeroFOX Platform to create real-time Digital Visibility, Intelligence & Protection
- Defend and Remediate your Digital Risks with ZeroFOX "Takedown as a Service"
ZeroFOX, the market leader in digital visibility and protection, safeguards modern organizations from dynamic security, brand and physical risks across social, mobile, web and collaboration platforms. Using diverse data sources and artificial intelligence-based analysis, the ZeroFOX Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFOX SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains and more.