Cracking the Complexity Conundrum: How to Secure, Patch & Protect Complex, Dynamic Organisations

  • Date 05 Jun 2019

Cracking the Complexity Conundrum: How to Secure, Patch & Protect Complex, Dynamic Organisations

05 Jun 2019, 12:25 - 13:25

Keynote Stage

Panel Discussion

Enterprises are more dynamic and complex than ever before.  From working practices, agile development and the latest technologies, to multiple third parties, mergers and acquisitions, regulation and digital transformation, organisations are constantly evolving. Whilst these developments undoubtedly create business value, they pose new challenges for information security including supporting digitization whilst protecting the business, keeping track of data assets and managing the risk of shadow IT on the network. Alongside this evolution, traditional organisations that are, or already have digitized, are likely to still have some legacy technologies in place that need to be secured.  

As complexity and sprawl increase, implementing appropriate security across the whole environment becomes more difficult. Everyone knows the importance of good patching, build management and end of life management, however to implement these processes well, is not easy. This panel will feature three lightening talks, followed by a discussion of the challenges of securing the complex enterprise and keeping security simple, whilst enabling the business. 

Lightning Talk 1: Supporting Digital Transformation 

Security is traditionally seen as the function that says ‘no’. However as businesses and organisations face increasing competitive challenges they cannot afford to be held back by security considerations and as they adopt digital technologies to increase operational efficiency and deliver value, the information security needs to stay one step ahead to enable this to happen. During this presentation, find out how security can support digital transform and enable the business.

Lightning Talk 2: Securing Legacy Systems

Outdated technology that wasn’t designed with cybersecurity in mind leaves organisations exposed. This talk will provide a practical roadmap to legacy system security including how to conduct a risk assessment to identify vulnerabilities, how to protect and patch legacy tech and integrate new tech and how to get investment from the board to secure legacy when investing in transformation.

Lightning Talk 3: Securing Your Blind Spot: Managing Shadow IT & Data Risk

As tech savvy employees strive to deliver more efficiently and rapidly, information security is often bypassed in order to leverage new technologies and solutions to support this. While shadow IT can provide value for the business, its causes a security headache. This talk will discuss how security professionals can manage the risk within their enterprise of shadow IT.



  • Ewa Pilat


    Global CISO

    Jaguar Land Rover

      Ewa has over 20 years of experience in Technology and Security. Currently, at Jaguar Land Rover (JLR) as Global Chief Information Security Officer...

  • Bobby Ford


    VP & Global CISO


    Bobby Ford is the Chief Information Security Officer(CISO) for Unilever, a global business with a simple but clear purpose, to make sustainable...

  • Jonathan Kidd



    Hargreaves Lansdown

    Jonathan has over 20 years of experience in finance, telecommunications, professional services and the public sector.  Although the majority of this...

  • David Pybus


    Director of Cybersecurity


    David Pybus is a Director in the EY Cybersecurity team and routinely helps clients with improving their cybersecurity programmes. David has twenty...

Business Issues covered

  1. What will this session help you to do?
    • Balance, manage and prioritise risk‎
    • Deliver security to drive and enable business growth‎
    • Demonstrate thought-leadership to ensure security is high for corporate agenda & capex justified‎
    • Mitigate the effects of new vulnerabilities and exploits‎
    • Understand internal and external threats and keep a business secure‎


We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.