Skip to the content
Menu

SecureTour is back by popular demand! This year's virtual conference brought together globally recognised security partners to discuss the latest Cyber Security and technology trends. With keynote speakers from Microsoft, Sophos, Cisco, and Forcepoint, as well as a panel discussion on 'Security 101: What you actually need to get security right,' a guest speaker session by John Noble on 'The Director's Handbook to Cyber Security,' and several workshops, including the CxO Forum on building a cyber resilient business, the CFO Forum on the cost of security, and the Tech Forum on creating a security strategy, delegates had the opportunity to learn from a wide range of experts and topics.


In this blog post, we'll highlight the key takeaways from each keynote, the panel discussion, the guest speaker session, and the live hack that demonstrated the importance of cybersecurity in real-world scenarios. We'll also share our top tips and best practices for identifying gaps, remediating weaknesses, optimising technology, building a resilient organisation, preparing for attacks, and recovering from breaches quickly. Whether you attended the conference or not, this blog post is a must-read for anyone who wants to stay up-to-date with the latest developments in cyber security.


Securetour 2023: On Demand

Catch up with the latest from Microsoft, Sophos, Cisco, Forcepoint, Logpoint and Rapid7. See the panel discussion, browse the resource section and don't miss the chance to hear from John Noble and his advice on how to protect your organisation.

Watch all sessions on demand

 

Watch Now


 

Keynote Speakers

SecureTour brought together industry experts to discuss the latest Cyber Security trends and technologies. During the conference, attendees gained valuable insights into topics such as situational awareness of cyber security, security testing, security resilience, risk management, and more. Here are some key takeaways from the keynote sessions:


LogPoint demonstrated how their solution connects to a thousand data sources and normalises data, offering organisations the benefits of situational awareness of cyber security in their environments. They also highlighted the challenges that come with it and how their solution solves them.

Microsoft presented new security features integrated into their E5 licenses to help organisations protect against data breaches and decrease insider risk. They focused on building security into systems from the start, establishing a trust fabric with secure access, managing securely across platforms and clouds, and protecting at machine speed.

Sophos discussed the advantages of partnering with cybersecurity experts to stop ransomware and advanced human-led attacks with their cyber security as a service offering. They highlighted their 24/7 team of threat response experts, ability to maximise ROI of existing cybersecurity technologies, and 24/7 monitoring and endpoint detection and response capabilities to improve cyber insurance coverage eligibility.

Armadillo Sec discussed the difference between vulnerability assessments and penetration testing and emphasised the importance of both types of testing. They explained the stages of pen testing and the common vulnerabilities found during such tests. Read our report on the most common vulnerabilities found during penetration tests 


Cisco highlighted the importance of pervasive defence with an open platform across user devices, networks, and applications. They showed how hackers could use billions of signals across the infrastructure to anticipate changes, prioritise actions, and close gaps for better security resilience.


Forcepoint addressed the issue of complex security configurations by simplifying security for hybrid workers with their solution. They discussed how organisations could gain visibility and control of interactions with data in web, cloud, and private apps, prevent misuse of sensitive data accessed from managed or unmanaged devices, control access to high-risk web content, and provide remote, fast, secure access to business resources and private apps without the complexity of VPNs.


Rapid7 discussed the resource gap in the security talent market and how organisations can manage risk with continuous cloud security and compliance. They emphasised the need to automate cloud compliance, detect threats in real time, prioritise risk everywhere, and perform dynamic application security testing.


The SecureTour virtual conference provided attendees valuable insights and best practices for protecting their organisations and data from cyber threats. By streamlining services, conducting thorough security testing, building resilient defences, simplifying security configurations, and managing risk with automation, organisations can better protect themselves in today's complex cyber landscape.


 

Business Cyber Security Posture Assessment
31% of business reported a cyber incident last year. Don't be next. Take this FREE assessment to uncover your cyber security weaknesses.

Request Your Assessment


John Noble: The Director's Handbook to Cyber Security

John Noble is a highly respected figure in the world of cyber security, having retired as the Director of Incident Management at the National Cyber Security Centre (NCSC) in 2018 after 40 years of government service. With a wealth of experience in operational delivery and strategic business change, Noble has been recognised for his work in creating effective partnerships in the lead-up to the London Olympics, for which he was made a Commander of the British Empire (CBE) in 2012. As a non-executive Director at NHS Digital and Director at the NCSC from 2016 to 2018, Noble has played a vital role in shaping the UK's cyber security policy and strategy.


John Noble's keynote speech addressed the evolving threat landscape of cybercrime, emphasising the industrialisation of ransomware and how it has grown due to the increase in the number of countries and sectors that are now being targeted. He discussed the new ecosystem in which cybercriminal groups work together to develop and carry out ransomware attacks. He also highlighted the challenges organisations face in managing cyber risks, such as getting the basics right, including patching, software updates, and credential management. Noble highlighted the challenges of managing cyber threats in the healthcare sector and the need to balance usability, security, and cost in defending the NHS.


Noble also discussed the mistakes that boards make regarding cybersecurity, including needing to understand that it is a board-level responsibility and setting clear risk tolerances. He outlined what a board needs to know and do, such as understanding who is responsible for cybersecurity and promoting a positive workforce security culture. He also discussed some tools that can help with board engagement, such as regular updates, third-party assessments, and the NCSC board toolkit.


In conclusion, Noble stressed the pressing need for strong cybersecurity leadership, clarity around who is responsible for what, and clear standards of cybersecurity governance. His speech provided valuable insights into organisations' challenges in managing cyber risks and the importance of effective board engagement in addressing these challenges.

 


You're Invited:
Cyber Security Video Series

We're excited to announce our brand-new series on Cyber Security. The first two episodes are already live, subscribe to join us as we explore what businesses need to consider when creating and implementing a risk management plan.

Episode 3: Asset Management

Adam Gleeson, Cyber Security Vendor Alliance Manager at Chess, is joined by Andrew Noonan, from Forescout, as they discuss the importance of asset management.​

 

Watch Now



Live Hack with Armadillo


The live hack presented during the conference showcased the vulnerabilities that exist in everyday environments. The hackers set up a virtual environment to represent a victim of a cyber attack to demonstrate the various ways in which attackers can exploit vulnerabilities.

The first attack attempted by the hackers involved exploiting a vulnerability based on a series of misconfigurations on a certificate. The first misconfiguration enabled auto-enrolment or allowed enrolment, the second disabled management approval, the third required misconfiguration of the template was an EKU that enabled authentication, and the fourth required the template to allow requesters to specify the subject alternative name in the CSR. Basic reconnaissance was sufficient enough to identify these misconfigurations. Exploiting these misconfigurations enabled the hackers to gain access to the domain. Once inside, they developed a way to retrieve a "golden ticket" that provided them with permanent access to the domain.

The second attack vector attempted by the hackers also resulted in the same outcome but used a different approach. The hackers leveraged misconfigurations within the ADS auto enrolment endpoint to coerce authentication attempts from the server. This allowed them to convert the information retrieved into a PFX file, which in turn, enabled them to authenticate themselves.

Both live hack demonstrations were successful and highlighted the vulnerabilities in common environments. The speaker identified how to patch the vulnerability and urged organisations to take the necessary steps to secure their systems.

 


Securetour 2023: On Demand

Catch up with the latest from Microsoft, Sophos, Cisco, Forcepoint, Logpoint and Rapid7. See the panel discussion, browse the resource section and don't miss the chance to hear from John Noble and his advice on how to protect your organisation.

Watch all sessions on demand

 

Watch Now

Conclusion 

Securetour 2023 was an informative and engaging event that brought together experts from various sectors to share their insights and experiences in managing cyber risks. The keynote speakers addressed some of the pressing issues facing organisations today, including the evolving threat landscape of cybercrime and the need for effective board engagement in addressing cybersecurity challenges. The live hack demonstrations were also eye-opening, as they highlighted the specific vulnerabilities that exist in common environments and the importance of patching and securing systems to prevent attacks.

Overall, the conference provided valuable insights and actionable recommendations for organisations to improve their cybersecurity posture and better protect themselves against cyber threats. It is clear that cybersecurity is a critical issue that requires ongoing attention and investment to mitigate the risks and protect against the potentially devastating consequences of cyber attacks.

If you have any more questions or worries, please do not hesitate to get in touch and see what Chess can do to help you and your security posture.

Book Your Free Consultation Now

Recommended Content

Protect Against Phishing

Protect Against Phishing

Adam Gleeson, Cyber Security Vendor Alliance Manager, discusses the threat businesses face from phishing.

 

Cyber Month In Review

Cyber Month In Review April 2023

Jack Smallpage, Information Security Officer at Chess, reviews the latest cyber security news and advises how to protect your data.

Gavin Wood

Gavin Wood

Gavin Wood is the Chief Technology Officer at Chess. With over 20 years in the IT industry, Gavin has a track record of driving successful business transformation through technology. An avid yachtsman, he's a massive advocate for remote working and anywhere operations. 


Speak to a Product Specialist

You can fill out the form and one of our product specialists will contact you shortly with more information.
Sales
To contact our Sales team directly, please call 0344 770 6000 and choose option 4.
Customer Service
For general queries or to report a non-urgent fault, please log a ticket on our customer portal using the email address associated with your account. Logging a ticket is quick and easy to do. Once you have logged your ticket, we will respond within 24 hours or your Service Level Agreement, whichever is quicker.
I agree for my information to be used for marketing communications.
Chess Privacy Notice

By submitting your personal information through this form, you consent to your information being processed in accordance with the Chess group privacy notice.