Healthcare Cybersecurity Conference: Protecting the NHS against cyberattacks
A co-ordinated cyberattack against numerous NHS trusts in May 2017 exposed the major vulnerabilities within the UK healthcare sector’s digital infrastructure
The increasing digitalisation of NHS services in recent years has driven back office efficiencies and improved the way medical professionals store and share patient data. But these developments have also increased the risk from disruptive cyberattacks, with the potential to compromise both NHS services and patient safety.
Join us for the Healthcare Cybersecurity Conference where expert speakers from across the NHS and technology sectors will explain how to protect vital services and sensitive data. Understand the impact of previous cyberattacks and how they could have been prevented, be the first to see the latest security technology and ensure your organisation is protected from the threat posed by cybercriminals.
Please register interest below and we will keep you updated
Registration, Refreshments and Exhibition
Opening Remarks from Chair
Dr Andrew Young, University of Salford
Dr Young is a leading researcher in the field of cyber security. He has worked on a wide range of projects both in industry and the public sector including Rolls Royce, Logica, the Ministry of Defence, UK trading standards and the European Space Agency
KEYNOTE: Mike Hulett, Head of Operations, National Cyber Crime Unit
The Future of Cyber Crime prevention in a digital world
Mike will discuss:
Steven Parker, Associate Director of IT, Informatics Merseyside NHS
Managing a cyber crises: Lessons learned - Experience from the front line
Steven will discuss:
Your opportunity to attend a range of industry seminars. Choose up to three focused seminar sessions and here from leading experts and discuss the key issues most pertinent to you!
Seminar Session A
This session will focus on looking at patch management ‘best practice’ in real-world, operational NHS scenarios, looking at some of the common challenges and pitfalls, and how to overcome them, including:
WannaCry and Ransomware, Avoid Falling Victim to this and other Cyber Threats
Adam Sadler, Account Director UK North Barracuda Networks
This presentation will give an overview of the WannaCry attack and the aftermath of it. We will also cover the steps you need to take in order to strengthen your current security posture and to be able to protect yourself from future ransomware attacks.
Refreshments and Networking Break
Seminar Session B
GDPR will take effect in May 2018, requiring organizations to better protect the personal data of EU citizens., You may not realize that your current DNS security system leaves the door wide open.
Data Access, Data control and Data security are inevitable challenges we must all undertake. The Varonis Data Security Platform provides a methodology to tackle these.
In this session you will learn (free) SABSA techniques, to enable you to:
Seminars Session C
Forfusion : De-risking Healthcare: Defence in Depth
Sean Ball and Anthony McMenzie
Wi-fi insecurity, ransomware and mitigation techniques
A live demonstration of how Wi-Fi can be used to compromise even the most secure systems, the lifecycle of Ransomware from infection to encryption and how these threats can be mitigated.
Extra Hop: Improve Healthcare with Better Control of your IT Infrastructure
The evolving IT landscape creates new challenges but how can you manage the scale, complexity and dynamism of modern IT?
Join this presentation to discover how you can gain the ability to see, in real time and down to the transaction level, exactly what's happening across your healthcare IT and clinical systems. This visibility isn't just nice to have; it is a must-have to keep your IT healthy!
Solving the Data protection challenge in the NHS
Lunch, Networking Exhibition viewing
Interview: Mustafa Al-Bassam a former hacker, now Cyber-security student at University College London
Andrew Young interviews Mustafa Al-Bassam a former black hat hacker who was one of the six core members of LulzSec during its 50-day spree of attacks in the spring of 2011. At the time of the so-called "50 Days of Lulz", Al-Bassam was 16 years old and living as a student in London. He is one of the affiliates of the online association of "hacktivists" known as Anonymous that targeted HBGary and HBGaryFederal in February 2011, having done much of the actual hacking work.
He is currently a technology volunteer with Privacy International in London and a doctoral researcher at the Department of Computer Science at University College London.
Javvad Malik, Security Advocate, AlienVault
Your Life is Only Ones and Zeros
Everything is online and everything is a target. As far as attackers are concerned, it’s just 1’s and 0’s – if there’s a vulnerability they will exploit it.
* Do the basics, good security hygiene and simplify
Simon Wilson, Senior Account Manager, Darktrace
Using AI to stop Ransomware: A Real-Life Case Study on how the Enterprise Immune System Detected and Responded to Wannacry
Refreshments Networking Break
Andy Norton and Niall Sheffield, SentinelOne
Live Hack: Ransomware - how do we protect ourselves?
Beyond backups, how can we avoid getting our data locked down? And, if it does happen, what should we do?
Experience a live hack in action. Learn how cyber security breaches occur and the means by which attackers gain access to protected networks.
This session will demonstrate the methods and tools used by hackers. More importantly, you will be left with a clear understanding of what you and your organisation can do to minimise the risk through a number of simple methods.
Learn how being specific when granting rights can lead to a solution that’s easier to manage and more able to help users be productive
Closing Remarks from Chair
Dr Andrew Young, University of Salford
*Please note: Agenda may be subject to change, due to speaker availability.
|Date||Venue||Price from:||Status||Spaces||Book Now||Enquire|
Who should attend?
CIO’s, Directors of Information Services, IT Directors, Directors of Informatics, Heads of IT security, Principal Cyber Security Managers, Heads of Risk