SC Congress London 2016

Welcome to the 2016 SC Congress London

Welcome to the 2016 SC Congress London

Over 350 delegates attended the one day event at the ILEC Centre in London. Photos: Julian Dodd, staff photographer
Welcome to the 2016 SC Congress London

Welcome to the 2016 SC Congress London

Welcome to the 2016 SC Congress London

Welcome to the 2016 SC Congress London

The panel sessions

The panel sessions

The panel sessions were a major draw for delegates
Session 1: the EU data protection regulations

Session 1: the EU data protection regulations

The first session covered "What you really need to do about the EU General Data Protection Regulation - and what you don’t need to worry about"
Session 1: the EU data protection regulations

Session 1: the EU data protection regulations

Renate Samson, chief executive of Big Brother Watch
Session 1: the EU data protection regulations

Session 1: the EU data protection regulations

Emily Taylor, associate fellow at Chatham House
Session 1: the EU data protection regulations

Session 1: the EU data protection regulations

Emma Philpott, CEO of the IASME Consortium Ltd
Session 1: the EU data protection regulations

Session 1: the EU data protection regulations

Jeremy King, director of PCI DSS
Session 1: the EU data protection regulations

Session 1: the EU data protection regulations

Session 2: Cyber-crime - the new normal

Session 2: Cyber-crime - the new normal

In this session, we asked if organisations could adapt to a cyber-crime environment.
Session 2: Cyber-crime - the new normal

Session 2: Cyber-crime - the new normal

Troels Oerting, CISO at Barclays Bank and founding director of Europol’s European Cyber Crime Unit (EC3)
Session 2: Cyber-crime - the new normal

Session 2: Cyber-crime - the new normal

Tim Lansdale, head of payment security at WorldPay
Session 2: Cyber-crime - the new normal

Session 2: Cyber-crime - the new normal

Bob Tarzey, analyst and director at quocirca
Session 2: Cyber-crime - the new normal

Session 2: Cyber-crime - the new normal

Tim Lansdale, head of payment security at WorldPay, addresses the Congress
Session 2: Cyber-crime - the new normal

Session 2: Cyber-crime - the new normal

A member of the audience asking a question during the Q&A
Hacking the world of IoT: Ken Munro

Hacking the world of IoT: Ken Munro

Penetration testing expert Ken Munro entertained delegates at lunchtime with a demonstration of how to hack household devices...
Hacking the world of IoT: Ken Munro

Hacking the world of IoT: Ken Munro

... a doll ...
Hacking the world of IoT: Ken Munro

Hacking the world of IoT: Ken Munro

... and a teddy bear.
Session 3: Armageddon on the Horizon?

Session 3: Armageddon on the Horizon?

In the third experts panel discussion, moderated by Tom Reeve, we asked if we were facing a doomsday scenario
Session 3: Armageddon on the Horizon?

Session 3: Armageddon on the Horizon?

Tony Collings, chairman of the ECA Group
Session 3: Armageddon on the Horizon?

Session 3: Armageddon on the Horizon?

Professor Chris Hankin, director of the Institute for Security Science and Technology
Session 3: Armageddon on the Horizon?

Session 3: Armageddon on the Horizon?

Tony Dyhouse, knowledge transfer director at the Trustworthy Software Initiative
Session 3: Armageddon on the Horizon?

Session 3: Armageddon on the Horizon?

Dai Davis, partner at law firm Percy Crow Davis & Co
Session 3: Armageddon on the Horizon?

Session 3: Armageddon on the Horizon?

Each of the panel painted their own vision of a cyber-security doomsday scenario
Session 4: Reacting to a breach

Session 4: Reacting to a breach

In the fourth session, chaired by Tony Morbin, the panel discussed pre-planning and playbooks for remediation, simulation and real-world practice exercises and the role of cyber-insurance.
Session 4: Reacting to a breach

Session 4: Reacting to a breach

Thomas Whipp, CISO at Charles Taylor PLC
Session 4: Reacting to a breach

Session 4: Reacting to a breach

Sarb Sembhi, CTO at the Noord Group
Session 4: Reacting to a breach

Session 4: Reacting to a breach

Matt Holland, global head of information security at EF
Session 4: Reacting to a breach

Session 4: Reacting to a breach

Thomas Naylor, director at Enablement.tech
Session 4: Reacting to a breach

Session 4: Reacting to a breach

Closing Keynote: Tackling the unexpected

Closing Keynote: Tackling the unexpected

In the closing keynote, the panelists were asked to imagine the unexpected
Closing Keynote: Tackling the unexpected

Closing Keynote: Tackling the unexpected

Fred Piper is the co-founder and former director of the Information Security Group at Royal Holloway London which has been recognised by GCHQ and the Engineering and Physical Sciences Research Council as an academic centre of excellence in cyber security research.
Closing Keynote: Tackling the unexpected

Closing Keynote: Tackling the unexpected

Ian Glover is president of Crest, the Council of Registered Ethical Security Testers which promotes research and development in standards for professional technical Information Assurance practices.
Closing Keynote: Tackling the unexpected

Closing Keynote: Tackling the unexpected

Ian Bryant has been technical director at the Trustworthy Software Initiative for the past five years. He also teaches at the University of Warwick and De Montfort University and is a principal expert at the British Standards Institute.
Closing Keynote: Tackling the unexpected

Closing Keynote: Tackling the unexpected

Mike Loginov is the founder of the Ascot Barclay Cyber Security Group and is the COO at the Information Systems Security Association UK and Vice Chair of the Coventry University MBA in Cyber Security.
Sponsored sessions

Sponsored sessions

There were nine sponsored sessions which were popular with delegates
Sponsored sessions

Sponsored sessions

Monitor and Audit Your 3rd-party / vendor access – with SSH Communications Security
Sponsored sessions

Sponsored sessions

Securing Enterprise Identities Against Cyber-threats – with Centrify
Sponsored sessions

Sponsored sessions

How do you spot the insider threat? – with Varonis
Sponsored sessions

Sponsored sessions

Keeping Up with the Revolution in IT Security – with Distil Networks
Sponsored sessions

Sponsored sessions

API Security Management: Cyber Protection for Modern Enterprise Architecture – with Forum Systems
Sponsored sessions

Sponsored sessions

Mobility, Security and Trusted Identities: It’s Right In The Palm of Your Hands – with Entrust Datacard
Sponsored sessions

Sponsored sessions

Gaining visibility to Indicators of Exposure to shrink the attack surface and more effectively contain incidents – with Skybox Security
Sponsored sessions

Sponsored sessions

From "fences" to "bodyguards"- How data-centric security works – with Watchful Software
Sponsored sessions

Sponsored sessions

Breach Containment: Fixing The Data Breach Blindspot – with Certes Networks
Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

After the final session at 5.30, it was time for the cocktail hour and drawing the winners in the Passport to Prizes. Thank you to our sponsors for the wonderful prizes on offer!
Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Cocktail hour and the Passport to Prizes draw

Our sponsors

Our sponsors

A big thank you to all of our sponsors who made the day possible.
Our sponsors

Our sponsors

DarkTrace
Our sponsors

Our sponsors

Hitachi ID
Our sponsors

Our sponsors

Distil Networks
Our sponsors

Our sponsors

Skybox Security
Our sponsors

Our sponsors

Entrust Datacard
Our sponsors

Our sponsors

Certes Networks
Our sponsors

Our sponsors

Centrify
Our sponsors

Our sponsors

Varonis
Our sponsors

Our sponsors

Forum Systems
Our sponsors

Our sponsors

Acuity Risk Management
Our sponsors

Our sponsors

Protegrity
Our sponsors

Our sponsors

Bridewell Consulting
Our sponsors

Our sponsors

Accelops
Our sponsors

Our sponsors

Skyhigh
Our sponsors

Our sponsors

Resilient Systems
Our sponsors

Our sponsors

SSH Communications
Our sponsors

Our sponsors

Absolute

This year's SC Congress London, held in the ILEC Conference Centre yesterday (10 February) was oversubscribed. But while that meant few spare seats in the packed conference hall, a constant throng in the exhibition area, and standing room only for some breakout sessions, it also meant the networking opportunities among 325 fellow CISOs and other information security professional practitioners was excellent. 

The standard of questions coming from the floor matched the high calibre of speakers on the stage, and we covered a range of topics including cyber-crime, the IoT, connected control systems and recovering from a breach. 

SC Congress in numbers

  • 325 delegates
  • 20 independent expert speaker panelists
  • 9 breakout sessions with industry expert speakers
  • 5 editorial panel discussions
  • 1 practical 'how to' demo

Delegate feedback: 

"Great session on the unexpected - not what I'd anticipated"

"I met some really useful people here today"

"I hadn't realised all the different levels of fines under the GDPR"

"Now I have a better idea of what to include in my breach recovery plan - and why I need one!"

"It was good to hear the privacy advocates - it gave a different perspective - very interesting"

Join us in Amsterdam on 19 April 2016 for another fantastic SC Congress event.  

More Slideshows