09:30 – 09:35

Welcome and introductions

Presenter: Microsoft

Opening remarks and a preview of the day’s events.

09:35 – 10:30

Cyber Security keynote

Presenter: Stuart Ashton (Microsoft)

Strategic insights into cyber security and what it means for your business.

By posing thought-provoking questions and discussing key challenges, we will examine the current cyber landscape and envisage the future.

We’ll be revealing our special guest speaker with further details shortly.

10:30 – 10:50

Networking break

Help yourself to complimentary refreshments and network with your peers.

10:50 – 11:50

Holistic Security: Joining the cyber dots

Presenter: Geraint Jones

Effective application of ‘security’ requires the combination of many distinct and often (operationally and organisationally) unrelated components: appropriate physical access controls to premises; effective and safe communications methods to allow mobile and remote working; robust authentication of users; effective HR management; policies and procedures; separation and segregation of roles – the list goes on. And they are all dependent on users understanding and buying into the ‘why’ and ‘how’ of it all.

Recognising the increasing shift in focus on data security and privacy, and the organic way that discrete projects tend to work, how do we ensure a coherent and consistent approach to the security of our organisation and its data?

11:50 – 12:50

Customer case study

Presenter: TBC

We’ll be revealing the details of our case study session shortly.

Offering crucial insights into real-world use cases and scenarios, it will demonstrate how cyber preparedness is crucial in the dynamic business landscape.

12:50 – 13:00

Questions

An open-forum session with OCG’s technical team.

13:00 – 13:30

Networking lunch

Help yourself to complimentary refreshments and network with your peers.

13:30 – 15:00

Pick your session

In the first of the afternoon sessions, delegates have the option of which presentation or roundtable they would like to attend. Spaces are limited so preferences will be offered on a first-come, first-served basis.

Security Insight: Microsoft 365 (Public Sector only)

Presenter: Mat Richards

Format: Presentation

Deep dive into Microsoft 365, understanding what it provides and its latest updates.

Focusing particularly on public sector organisations, you will learn how Microsoft 365 can you help you to overcome key security challenges.

Please note: this session will also be repeated at 15:30 – 17:00 for all audiences.

Holistic Security: Join the dots with confidence

Geraint Jones, Damon Rand (Wolfberry) and Melanie Oldham (Bob’s Business)

Format: Presentation

Following on from the morning’s ‘Holistic Security’ session, we’ll share practical examples about how to join the cyber dots with confidence.

Please note: this session will also be repeated at 15:30 – 17:00 for a Public Sector audience.

Protect your information anytime, anywhere

Presenter: Dave Guest and Yossi Basha (Microsoft)

Format: Roundtable

In this interactive session, you will get in-depth insights into the world of Azure Information Protection, discovering how to control and secure your information anytime, anywhere.

Enterprise Mobility + Security: Secure user access

Presenter: Tom Waller

Format: Roundtable

Understand how Intune and the Azure Conditional Access policy engine can help to secure your mobile devices.

We’ll share ideas about how to protect your company data on company-owned or user-owned devices, as well as discussing your specific mobility and security challenges and how to overcome them.

Please note: this session will also be repeated at 15:30 – 17:00.

GDPR: What you need to know

Presenter: Mark Dennis (Evolve North)

Format: Roundtable

Dive into GDPR to understand where you are, where you want to be, and how you get there.

Explore the people, technology and governance aspects of the regulation and build a supporting roadmap towards compliance.

Please note: this session will also be repeated at 15:30 – 17:00.

Protecting against malicious activities

Presenter: Keith Rigby, Laura Hunter (Microsoft) and Steve Newby (Microsoft)

Format: Roundtable

Having awareness of potential malicious activities within your on-premises and cloud environments is an important capability.

Learn how Advanced Threat Analytics can help you gain visibility into these activities and understand what you need to know to deploy the solution. We’ll also discuss the end point technologies within Windows 10 that can help you understand the attack chain.

Please note: this session will also be repeated at 15:30 – 17:00.

15:00 – 15:30

Networking break

Help yourself to complimentary refreshments and network with your peers.

15:30 – 17:00

Pick your session

In the second half of the afternoon sessions, delegates will once again have the option of which presentation or roundtable they would like to attend. Remember, spaces are limited so preferences will be offered on a first-come, first-served basis.

Holistic Security: Join the dots with confidence (Public Sector only)

Presenter: Geraint Jones, Damon Rand (Wolfberry) and Melanie Oldham (Bob’s Business)

Format: Presentation

Following on from the morning’s ‘Holistic Security’ session, we’ll share practical examples about how to join the cyber dots with confidence in the Public Sector.

Please note: this session is also run at 13:30 – 15:00 for all audiences.

Security Insight: Microsoft 365 

Presenter: Mat Richards

Format: Presentation

A lot has happened with Microsoft’s 365 suite.

In this session, you will get an overview of what the suite contains, focusing on the latest developments in the areas of security, manageability and governance.

Please note: this session is also run at 13:30 – 15:00 for a Public Sector audience.

Protect your information anytime, anywhere

Presenter: Dave Guest and Yossi Basha (Microsoft)

Format: Roundtable

In this interactive session, you will get in-depth insights into the world of Azure Information Protection, discovering how to control and secure your information anytime, anywhere.

Enterprise Mobility + Security: Secure user access

Presenter: Tom Waller

Format: Roundtable

Understand how Intune and the Azure Conditional Access policy engine can help to secure your mobile devices.

We’ll share ideas about how to protect your company data on company-owned or user-owned devices, as well as discussing your specific mobility and security challenges and how to overcome them.

Please note: this is a repeat of the 13:30 – 15:00 session.

GDPR: What you need to know

Presenter: Mark Dennis (Evolve North)

Format: Roundtable

Dive into GDPR to understand where you are, where you want to be, and how you get there.

Explore the people, technology and governance aspects of the regulation and build a supporting roadmap towards compliance.

Please note: this is a repeat of the 13:30 – 15:00 session.

Protecting against malicious activities

Presenter: Keith Rigby, Laura Hunter (Microsoft) and Steve Newby (Microsoft)

Format: Roundtable

Having awareness of potential malicious activities within your on-premises and cloud environments is an important capability.

Learn how Advanced Threat Analytics can help you gain visibility into these activities and understand what you need to know to deploy the solution. We’ll also discuss the end point technologies within Windows 10 that can help you understand the attack chain.

Please note: this is a repeat of the 13:30 – 15:00 session.

Book your place

Spaces for this year’s complimentary Identity-driven Security Summit are limited.

Please book early to avoid disappointment.

Book my place     View Day 1 agenda