Moderator

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Industry Expert, British Computer Society

John Doody is cyber lead for BCS Security. John served at CESG/GCHQ for 10 years in the appointment of Head of Information Assurance Customer Services.

He has a wealth of knowledge across the whole spectrum of Information Assurance. In this latter appointment he was a major contributor to CESG’s move to a commercial business footing. He also has a major role as a Non Executive Director to a security company as well as providing Strategic Advice to a number of major UK and US IT Security companies. John is a retired officer of the UK Royal Corps of Signals, a Corps in which he served for 33 years to the rank of Colonel. John has chaired many international committees dealing with Information Assurance, communications and interoperability. John is well known on the national and international

Cyber/ Information Assurance Conference circuit where he has chaired many events and has given many talks on Information Assurance.

He was recently re-appointed as an International Class Director for Armed Forces Communications and Electronics Association (AFCEA) International (Fairfax Virginia USA).

He was elevated to the Infosecurity Europe Hall of Fame in 2012. 



Keynote speaker

Julian Assange

Founder, WikiLeaks

Julian Assange is the face of WikiLeaks, the headline-making publishing organisation famous around the world for releasing secret information from corrupt governments, unaccountable corporations, occupying militaries and secretive international trade deals. Founder, philosopher, editor-in-chief and original financier, his name and the WikiLeaks brand are inseparable, and both have proven indomitable over the organisation's 10 year publishing history.

Assange shot to global prominence in 2010 when WikiLeaks released "Collateral Murder", a suppressed video of the 2007 mass killing of civilians and two Reuters journalists in Baghdad by a US Army helicopter. Founded in 2006, WikiLeaks has published several million documents in its ten eventful years. Best known among these are:

the US Army "War Logs": half a million battleground dispatches from the US occupations of Iraq and Afghanistan over almost a decade, showing the true history of these costly, heavily propagandized conflicts.

the US diplomatic cables leak: beginning in 2010 with "Cablegate", WikiLeaks has been continuously releasing collections of US diplomatic correspondence, forming a database now containing nearly three million documents. These documents have laid bare the reality of US relations with the rest of the world, and the true role of the world's "sole remaining superpower."

the "Three Big T"s: WikiLeaks has published over 30 secret chapters from three major global trade treaties which have been negotiated clandestinely between governments and corporate stakeholders, encompassing two thirds of global GDP and affecting nearly every area of life for nearly every person. These are the Trans-Pacific Partnership Agreement (TPP), the Transatlantic Trade and Investment Partnership (TTIP) and the Trade In Services Agreement (TISA).

Among many others, these publications have enriched the historical record, exposed injustices and atrocities and provoked reforms and revolutions all around the world. WikiLeaks has emboldened the public to challenge official narratives on the most crucial issues of our age, and has inaugurated a new standard for transparency in modern journalism, which has been eagerly adopted elsewhere. But WikiLeaks has also provoked the ire of powerful interests, including the US Government, which has since 2010 been seeking without success to shut WikiLeaks down and silence its founder, Julian Assange.

As an author, Assange has demonstrated remarkable insight and prescience.

A long time campaigner against surveillance, and an expert on the US National Security Agency, Assange authored Cypherpunks (OR Books, 2012), describing a new reality of global mass surveillance which was then virtually unknown to the world's public. In 2013, when the US intelligence contractor Edward Snowden came forward to tell his story, Assange's warnings were proven true to the last detail. Stranded in Hong Kong, Snowden's future looked bleak until Assange and WikiLeaks stepped in with legal and logistical support, successfully helping him to avoid US extradition and to gain political asylum.

Assange is also a co-author of The WikiLeaks Files: The World According to US Empire (Verso, 2015), an exciting new collaborative volume between Verso Books and WikiLeaks, which for the first time collects together in-depth scholarly analysis by regional experts writing on the US diplomatic cables, finally providing the public with the critical overview the industrial media failed to produce.

Assange is both a bold political thinker and a man of action, both an innovator-entrepreneur in the digital age and a world-class dissident whose work has challenged unjust power and brought retribution. He was a pioneer of the internet and helped bring it to Australia in the early 1990s. He believes that the internet is a great tool of human emancipation, but he is also one of the world's keenest critics of the repressive uses of technology. He holds that the first value to emerge from the new global civilisation of the digital age is the right to communicate: to receive and transmit information across boundaries. Truth, he holds, should be available to all, and few people have done as much to make this a reality.

Selected Awards

Economist New Media Award (2008, UK)
Amnesty International UK: New Media Award (2009 UK)
Sam Adams Associates: Award for Integrity in Intelligence (2009 USA)
Le Monde: Man of the Year (2010 France)
Sydney Peace Foundation: Gold Medal for “exceptional courage and initiative in the pursuit of human rights” (2011 Australia)
Martha Gellhorn Prize for Journalism (2011 UK)
Voltaire Award of the Victorian Council for Civil Liberties (2011 Australia)
Voice of the West Award (2011 Spain)
Walkley’s Award for Most Outstanding Contribution To Journalism (2011 Australia)
Co-recipient of the 2012 FPP Peace Prize
The Newsweek Daily Beast Digital Power Index: Revolutionary First Place (2012 USA)
Big Brother Awards Hero of Privacy (2012)
Yoko Ono Courage Award (2013 USA)
Global Exchange Annual Human Rights Award: “People’s Choice” (2013 USA) honoured alongside Noam Chomsky.

Books

The WikiLeaks Files: The World According to US Empire (Verso Books, 2015)

The WikiLeaks Files presents expert analysis on the US diplomatic cables and over two million additional WikiLeaks documents published as recently as 2014. In a series of chapters dedicated to the various regions of the world, the book explores the machinations of the United States as it imposes its agenda on the world: a new form of imperialism founded on varied tactics from torture to military action, to "free trade" deals and “soft power,” in the perpetual pursuit of expanding influence. It illustrates the close relationship between government and big business in promoting US strategic interests around the world.

An introduction by Julian Assange — writing on the subject for the first time — situates the importance of the cables in what they tell us about the operation of American empire, and examines the censorship of the cables within the field of international relations in the Anglo-American academy.

When Google Met WikiLeaks (OR Books, 2014)

In June 2011, Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt, arrived from America at Ellingham Hall, the country residence in Norfolk, England where Assange was living under house arrest.

For several hours the besieged leader of the world’s most famous insurgent publishing organisation and the billionaire head of the world’s largest information empire locked horns. The two men debated the political problems faced by society, and the technological solutions engendered by the global network — from the Arab Spring to Bitcoin. They outlined radically opposing perspectives: for Assange, the liberating power of the Internet is based on its freedom and statelessness. For Schmidt, emancipation is at one with US foreign policy objectives and is driven by connecting non-Western countries to American companies and markets. These differences embodied a tug-of-war over the Internet’s future that has only gathered force subsequently.

When Google Met WikiLeaks presents the story of Assange and Schmidt’s encounter. Both fascinating and alarming, it contains an edited transcript of their conversation and extensive, new material, written by Assange specifically for this book, providing the best available summary of his vision for the future of the Internet.

Cypherpunks: Freedom and the Future of the Internet (OR Books, 2012)

Visionary WikiLeaks founder Julian Assange brings together a small group of cutting-edge thinkers and activists to discuss whether electronic communications will emancipate or enslave. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking people's locations, contacts and lives? Far from being victims of that surveillance, are most people willing collaborators? Are there legitimate forms of surveillance? And does anyone have the ability to resist this tide?



Keynote speaker

Kevin Fielder

CISO, JUST EAT



Keynote speaker

Brett Johnson

The Original Internet Godfather,

Former United States Most Wanted, Brett “GOllumfun” Johnson, referred to by the United States Secret Service as “The Original Internet Godfather” has been a central figure in the cybercrime world for almost 20 years. Mr Johnson built and was leader of ShadowCrew, the precursor to today’s darknet markets. He was instrumental in developing many areas of online fraud while helping design, implement, and refine modern Identity Theft, Account Take Over Fraud, Card Not Present Fraud, IRS Tax Fraud, and countless other social engineering attacks, breaches, and hacking operations.
Upon his capture, the United States Secret Service hired Mr Johnson to work as a consultant and informant. Johnson worked with the Secret Service for several months before going on a cross country crime spree, being placed on the US Most Wanted List, being captured again, sent to prison, escaping prison, being captured yet again, and finally accepting responsibility for his actions.
Today, Brett works as a security consultant and public speaker. He has worked with groups such as the FBI, Microsoft, eMailage, NextCaller,IDology, AARP, BBWest, TIB, The ACFE, The Card Not Present Group, The Identity Theft Resource Council, PRO, Universities, and many others.
Brett has been featured on numerous media outlets, most recently NBC, CNN Money, ArsTechnica, The Independent, RT TV, and more.
Mr. Johnson can be contacted via www.anglerphish.com



Speaker

Jenny Radcliffe

“The People Hacker”,

Jenny Radcliffe  - aka “The People Hacker” - is a force to be reckoned with. She can diffuse a crisis situation, talk her way into a secure building and spot a psychopath at a hundred paces. She has been called a mind reader and a ‘human lie detector’, and likened to a Jedi Knight.

In reality, she is an expert in Social Engineering (the human element of security), negotiations, non-verbal communication and deception, using her skills to help clients from corporations and law enforcement, to poker players, politicians and the security industry.

Jenny speaks, consults and trains people in the skills of “people hacking” and explains how “Social Engineering” using psychological methods can be a huge threat to organisations of all sizes.  She reveals how that same knowledge is a valuable tool for security professionals of all types in the prevention of these attacks, scams and cons of all kinds.

Using a mixture of scams, psychological tactics, advanced profiling and non verbal communication skills, Jenny highlights how criminals, special interest groups  and others with mal-intent, can talk or trick their way into gaining access to  personnel, buildings and confidential information.

Using a blend of anecdotes, science and humour, Jenny is an exceptional and highly impactful speaker.  A regular keynote at major security events (Infosec, Rant, DISA, Nordic IT Security, ICS2, Trend Micro, Cisco, NTT, Bright talk, Cyber Security Week) and multiple TEDx contributor, Jenny has been a guest expert on security, scams and social engineering for various television and radio shows as well as online media.

Jenny is also the host of the podcast “The Human Factor” interviewing Industry Leaders, Bloggers, experts and fellow Social Engineers, about the human factor of security.



Seminar speaker

David Emm

Senior Security Researcher, Kaspersky

David joined Kaspersky Lab in 2004. He is a member of the company's Global Research and Analysis Team and has worked in the anti-malware industry since 1990 in a variety of roles, including that of Senior Technology Consultant at Dr Solomon's Software, and Systems Engineer and Product Manager at McAfee.

In his current role, David regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable advisor on all aspects of online security.

David is regularly mentioned in national print press as a cyber-security expert and has a wealth of experience in being filmed for such programmes as Good Morning Britain and BBC News.



Keynote speaker

Raj Samani

Chief Scientist, McAfee

Raj Samani is a McAfee Fellow and Chief Scientist at McAfee. His prior roles include VP and Chief Technology Officer, EMEA, at Intel Security/McAfee and Chief Information Security Officer for a large public-sector organisation in the United Kingdom. A leading international cybercrime expert, Samani has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3/EUROPOL).

Samani volunteers as the Cloud Security Alliance EMEA Strategy Advisor, and is on the advisory councils for Infosecurity Europe and Infosecurity Magazine. Samani has published numerous security papers and is the author of 'Applied Cyber Security and the Smart Grid'. SC Magazine named Samani as one of the Top 10 Influencers in cyber security in 2016.

Raj Samani is a sought-after speaker and regularly appears on television commenting on the top IT security issues driving headlines today.

He can be found on twitter @Raj_Samani

Raj's blog



Speaker

James Martin

Senior Cyber Security Manager , Darktrace

James’ career began working with IBM and EMC in big data infrastructure where he spoke at a number of events alongside customers such as Red Bull and Bosch, before moving into artificial intelligence and cyber defence. At Darktrace, James is a Senior Cyber Security Manager looking after accounts from multiple sectors including one of the UK’s leading retailers. He has spoken in front of a vast array of audiences internationally. James’ specialism lies in the application of AI and machine learning in order to futureproof and protect an organization’s core business assets against cyber threat.



Seminar speaker

Tom Wyatt

The live hack will be presented by Tom Wyatt, a cyber security researcher and expert penetration tester with over a decade of experience in the industry. Having worked with companies across a variety of sectors, Tom has a unique insight, in his research he’s uncovered and reported numerous security vulnerabilities, including leading UK telecoms providers and US Internet search organisations.



Seminar speaker

Paul Down

Director of Sales, EMEA, Wombat Security Technologies

Paul Down is the Director of Sales, EMEA at Wombat Security Technologies. Paul joined Wombat in November 2017, and is dedicated to ensuring Wombat continues to rapidly grow in the expanding European cyber security training and awareness market.

Paul has over 25 years of experience in Technology and Sales, and has a number of industry leadership roles under his belt. Notably he has previously held the position of UK Regional Sales Director at Accellion (a secure file sharing and collaborating company) and VP of Sales EMEA & APAC at Veriato (employee investigation software for cybersecurity reasons). He has also worked at Embarcadero, VMware and IBM. During his career he has developed and executed innovative channel, OEM and direct sales programs globally for numerous vendors. Paul also has a lot of experience as a public speaker, including Microsoft Tech Summit, Infosec Europe and CeBit.

In his spare time, Paul is a keen sportsman. He is the Founder and President of the Woking Cycling Club and the Chairman of Sport Woking – he’s also a qualified cycling and football coach.



Seminar speaker

Ian Evans

Managing Director for EMEA, OneTrust

Ian Evans serves as Managing Director for EMEA at OneTrust, a global leader in privacy management software which helps organizations operationalize data privacy compliance and Privacy by Design. Evans is a diversified senior executive with deep experience in data privacy and CRM technology applications and services.  He brings over 20 years of software industry experience to OneTrust as well as 10 years in direct and channel sales.  In his role, Evans supports thousands of global brands across the European, Middle Eastern, and African regions, leading the delivery of technology solutions to secure and privatize customer and employee personal information ahead of impending privacy regulations. Prior to OneTrust, Evans served as Vice President and Managing Director for EMEA at AirWatch (acq. by VMware in 2014 for $1.54B).  AirWatch now serves more than 20,000 global customers and is recognized as the undisputed market leader in enterprise mobility management.



Speaker

Dr Jamie Graves

CEO & Founder , ZoneFox

Jamie is a data security and enterprise software entrepreneur and is the CEO at ZoneFox. He attended the prestigious Ignite course at Cambridge University’s Judge Business School, and the Entrepreneur Development Programme at MIT. 

Jamie has a PhD in Computer Science, extensive security and digital forensics experience and was recently recognised as the 'Champion of Champions' at the inaugural Scottish Cyber Security awards for his contribution to the industry. 

ZoneFox protects business-critical assets; data and IP and has a proven track record protecting reputation, sales revenue, and competitive advantage for its growing client base.



Seminar speaker

Alex Bryson

Pre Sales Technical Engineer, Eset UK

Alex Bryson is a Technical Pre-sales Engineer at ESET UK. He specialises in listening to clients security needs and recommending the perfect software or hardware solutions, hosting seminars and webinars about big industry issues and ESET’s IT security solutions and providing support to ESET’s client base. He’s developed these skills over a lengthy career in IT, working at IBM, Zurich Insurance, Abbey Life and Cannon Technologies.



Seminar speaker


Seminar speaker

James Chappell

CTO & Co-Founder, Digital Shadows

James has over sixteen years’ experience of technical information security acting as an advisor to large private sector and government organisations. Much of his work has involved counteracting the growth of crime and fraud in computer networks and developing effective ways of measure and measuring the information security big picture.



Speaker

Alan Calder

Founder and CEO, IT Governance

Alan Calder is the founder and executive chairman of IT Governance. He is an acknowledged international cyber security guru and a leading author on information security and IT governance issues.