Programme:

08:00
Registration - Breakfast - networking
09:00
Chair's opening address
  • Security in Europe 2017: legislation, data protection and cyber threats
  • The growing risks and costs of cybercrime to businesses
  • The importance of cyber skills and strategies
09:05
“Blurred Lines: Politics and Cybercrime”

Raj Samani

Recent attacks have blurred the lines between cybercrime and the potential of supporting the political agenda of the threat actor.  This presentation evaluates the blurred lines between such distinct categories and asks whether the delineation really truly exists anymore?

09:25
As the threat landscape evolves faster than we can keep up , we ask where machine learning fits into the picture and what the technology offers to the forward-thinking enterprise.

Dr Jamie Graves

Machine learning technology promises a lot to those that are willing to dip their proverbial toes in the water. But where can it really deliver value, what does it offer the time and resource-strapped security team and how can the savvy organisation make the most of this new kid on the block. Join us for another great session and discover:

  • What machine learning promises for 2018 and whether it can deliver
  • Do you really need machine learning to protect sensitive data?
  • How the technology helps you to quickly and consistently identify risky activities and defend against threats
  • What a good machine learning solution needs to be able to do to support your security posture and combat the insider threat
09:40
The Lever and the Fulcrum – Social Engineering from the Inside Out

Jenny Radcliffe

In this talk Jenny Radcliffe discusses how organisations enable malicious social engineers to breach their defences through their attitude, behaviour and culture.

Using case study examples, she demonstrates how this “ABC” of organisational failure can help facilitate malicious social engineering attacks.   The talk illustrates how human mistakes, mischief and malice can still impact organisations of all sizes often in spite of extensive investment in training and technology.

The session concludes with practical advice on what mitigation, prevention and education methods might actually help in reducing this type of human-based risk.

10:00
The future impact of AI in cybercrime:

James Martin

  • How AI has a profound impact on our future internet, and the potential for it to enable digital criminals 
  • The complexity of business and protection, and how current defenders are being outpaced
  • Machine learning and advanced mathematics as tools for handling complexity 
  • Real life examples and applications of attacks 
  • Inevitable rise of data theft and how best to protect yourself

                                                                        

10:30
Coffee and networking
11:00
One of 3 streams

Click HERE to view stream options

11:30
Seminar Change Over
11:40
One of 3 streams

Click HERE to view stream options

12:10
Lunch and networking
13:30
One of 3 streams

Click HERE to view stream options

 

14:00
Chairs Opening Address
14:05
Current threat landscape; attacks are we seeing. What we are doing about them... Including building the right team.

Kevin Fielder

  • Threats may not be evolving, but they are certainly increasing.  We are seeing more of everything from DDoS to credential stuffing and account take over attempts to SQL injection attempts; all are increasing.  What is your experience?
  • Being creative to reduce risk, by leveraging existing tooling and capabilities, how do we get more without necessarily spending more.  How are you leveraging your tools and capabilities?
  • Having the right people - we have a great team and a queue of talented internal colleagues who want to work in security.  Make use of this pipeline, develop your internal people.  What skills shortage??  How are you building your team?  How are you best using the wider talent in your organisation?
14:20
GDPR compliance and your cyber security programme

Alan Calder

  • The impact of obligations imposed by the General Data Protection Regulation (GDPR) on cyber security
  • Cyber security and privacy – common challenges and solutions
  • The practical steps to initiating a GDPR compliance programme
14:35
Criminal Perspectives: Former US Most Wanted Cybercriminal Brett "GOllumfun" Johnson Discusses his History of Cybercrime, Its Current State, and Where It is Headed.

Brett Johnson

Mr Johnson promises an enlightening, engaging, and entertaining presentation for The Future of Cybersecurity Conference.  Brett will discuss his life as a United States Most Wanted Cybercriminal:  How he got involved in cybercrime, how he rose to the top, and how he ultimately fell and landed in prison for 7 1/2 years.  Brett will also detail the current state of organized cybercrime, and look ahead into what cybercrime might look like in all-too-near future.

15:00
'Machine learning and the Insider Threat’

Join us for the latest ZoneFox thinking for insights around

  • Why machine learning has taken centre stage in 2017 (what it promises and whether it can deliver)
  • Do you really need machine learning to protect sensitive data? (how machine learning works - it’s capabilities and limitations)
  • SIEM, DLP and the 'old ways' - are they enough?
  • What a good machine learning solution needs to be able to do to support your security posture and defend against threats

The future of machine learning as the threat landscape evolves faster than we can keep up  

15:15
Symantec

TBC

15:30
Coffee and networking
16:00
Talk and Q&A with Julian Assange

Julian Assange

Julian Assange will be talking about new discoveries in CIA state sponsored malware and as yet unrevealed topic, along with Q&A

17:00
Event close