About
WHEN:
Wednesday 9 October 2024 ·
Starts: 2pm London | 3pm Paris | 9am New York

OVERVIEW:
Predatar presents Control24 - the world's leading online summit for cyber resiliency.

With the explosion of Artificial Intelligence for business, this year's event will focus on the risks and opportunities of AI for cyber security.

Join Control24 to learn how forward-thinking organisations are using emerging technologies to take their incident response to the next level, and making total recovery confidence a reality.

Jam-packed with short, energetic sessions from leading storage and security experts. Control24 will be informative, engaging and fun. This is not your average tech conference.

- - -

THE AGENDA:

Kick-off | Rick Norgate & Ben Hodge | Predatar
Rick and Ben will kick off Control24 with a bang! With surprise announcements, challenges and giveaways – your hosts will make this year's event one to remember.

Real-time CleanRoom build challenge | Ian Richardson | Predatar
An AI-powered CleanRoom that can be deployed in a few hours! ...Ian Richardson, CTO at Predatar will put his own claim to the test as he works against the clock to configure and demo a Predatar CleanRoom before the end of the event. We'll be checking in with Ian regularly for real-time progress updates.

10 Myths of Cyber Resilience | Elizabeth Campbell, Dell Technologies | Christian Farrell, Accenture
Organisations throughout the world are striving to withstand, adapt to and recover from cyber disruptions – but all to-often their best-efforts can be misguided. Misunderstandings about how to build cyber resilience are all too common.

Christian Farrell from Accenture and Liz Campbell from Dell Technologies will share their learnings and insights as they uncover the 10 most common 'Myths of Cyber Resilience' and help you to avoid the common pitfalls.

The Evolution of Attacks | Harpinder Powar & Richard Cassidy | Rubrik
CTOs and CISOs don't always see eye-to-eye. They certainly see the world through different lenses. In this fireside chat Harpinder and Richard will bring their individual perspectives as Partner CTO and Field CISO at Rubrik to Control24.

Discover how criminals are evolving their tactics, learn how generative AI poses new threats, and preparing yourself with the knowledge to stay ahead.

Customer Story | Anonymous
We will hear from an anonymous Predatar customer about a recent incident which occurred in their business, and the steps they took to ensure their cyber resiliency after an almost-catastrophic incident.

Advancing Cyber Security in an AI World | Steve Kenniston | Dell
Is the storage and security industry jumping on the AI bandwagon? Or does artificial intelligence have an important role to play?

Join Steve Kenniston as he digs into this question in his engaging session, 'Advancing Cybersecurity in an AI World’. His session will uncover how AI is setting a new standard in data protection and how you can harness its potential to achieve unmatched success. Stay ahead of the game in the ever-evolving landscape of data security.

From Crisis to Continuity: Unlocking Rapid Air-Gapped Recovery | Shariq Aqil & Sasha Acosta | Zerto HPE
Starting with eye-opening customer insights, Shariq Aqil and Sasha Acosta discuss the hidden complexities of incident response and cyber recovery – including threat evolution, the 'ransom dilemma', and regulatory pitfalls.

In a world where, traditional storage technology is no longer enough – discover how HPE have developed a truly innovative platform for secure rapid recovery at scale.

AI for Security and Security for AI: Opportunity or Threat? | Martin Borrett | IBM Security
There’s no doubt AI is earning its place in integral business operations. As a result, securing AI models and the underlying training data they rely on is paramount.

Join Martin Borrett from IBM Security in his exploration of the dual aspects of AI in the security landscape: Security for AI and AI for Security. How can we protect the AI systems we rely on to protect us?
Presenters
1721388519-ea4afdd0b727274d
Shariq Aqil
Global Field CTO | Zerto HPE
Shariq Aqil is the creator of groundbreaking Zerto Cyber Resilience Vault. A highly accomplished and seasoned specialist in Cyber Resilience and Data Protection, Shariq boasts an extensive career spanning over two decades.

Throughout his professional career, Shariq has consistently excelled in crafting, implementing, and overseeing comprehensive data protection and cybersecurity strategies.
1725284735-57f8d9338933b5f8
Sasha Acosta
Global Sales Leader | Zerto HPE
Sasha Acosta is the Global Sales Leader for the Zerto Cyber Resilience Vault. With over 25 years of sales experience, Sasha has the pleasure of working across the globe whilst consistently exceeding customer expectations, driving successful teams, and providing valued outcome-based solutions.

An avid Toronto sports fan, Sasha always has one eye on his work and the other on a Raptors, Blue Jays, TFC or Leafs game.
1721387236-ab1adc3a9efa4837
Harpinder Singh Powar
EMEA Channel CTO | Rubrik
Working closely with partners and sales teams, Harpinder works hard to drive Rubrik’s initiatives in the channel.

A strategist on the pitch as well as in the office, he spends his free time playing football with his boys... or acting as referee for their lively debates!
1723213628-1445c7e8f2d02521
Richard Cassidy
Field CISO | Rubrik
For over 25 years, Richard has consulted businesses on cyber security strategies and programs, working across a variety of industries. From risk management to breach response, Richard covers it all!

When he’s not tackling challenges in the cyber landscape, Richard can be found on the open road, passionate about his love for motorcycles.
1721386861-27fb47dd86439bec
Steve Kenniston
The Storage Alchemist | Dell Technologies
With an extensive history in the storage software industry, Steve is a versatile, strategic and trusted executive currently working as a Sr. Cybersecurity and Cyber Resilience Consultant at Dell Technologies.

Outside of work, Steve spends much of his time on the ocean. Reeling in avid readers as well as fish, Steve also enjoy sharing his professional insights on his blog ‘The Storage Alchemist’.
1721388272-ac207babdf9c6cff
Elizabeth Campbell
EMEA Cyber Leader | Dell Technologies
Liz is a cybersecurity leader with a background in data protection, endpoint and network security as well as cyber and incident recovery. She spends her time helping organizations develop strategies to respond and recover from catastrophic cyber-attacks.

Liz also hosts a podcast where industry leaders are invited to share insights and guidance for how best organisations can build greater cyber resilience. Passionate about empowering women to lead through mentorship, Liz is a strong advocate for diversity and inclusion.
1725284581-1270f837481e15ec
Christian Farrell
Co-Lead UK&I Cyber Security Strategy | Accenture
Across the UK and Ireland, Christian assists clients across a range of sectors. He defines strategies and implements programs to ensure the continuation of critical operations in the face of cyber attacks.
1723110683-e2bafea96566b4d9
Martin Borrett
Technical Director | IBM Security
You will struggle to find a more knowledgeable security expert than Martin. With almost 30 years' of experience with IBM, Martin has advised some of the world's largest organisations on cyber security matters.

Outside of the office, you can find him on the ocean, having represented GB in international sailing competitions!
Register To Watch Recording
Full name*
Email Address*
Company*
Marketing Permission
Predatar will use the information you provide on this form to contact you with updates and about this event and information about future Predatar events that might interest you. You can unsubscribe anytime by clicking the unsubscribe link in the footer of our emails. For more information, please read our privacy policy.
Yes, I consent to receiving emails*
We use BigMarker as our webinar platform. By clicking Register, you acknowledge that the information you provide will be transferred to BigMarker processing in accordance with their Terms of Service and Privacy Policy.