Registration - Breakfast - networking
Chair's opening address

Security in Europe 2018: Legislation, data protection and cyber threats


  • ·     The growing risks and costs of cybercrime to businesses
  • ·     The importance of cyber skills and strategies
  • ·     The threats to businesses and how to overcome them
  • ·     The latest tools and technologies to fight cyber-attacks
State actors and the merging of political and criminal based cyber-attacks

It has emerged that state actors including Russia have been spying on European businesses and governments, possibly stealing data including passwords to lay the groundwork for future attacks. This session will cover:


·       What is the threat from nation states, what do they want and how does this impact businesses?

·       Which businesses and industries are particularly at risk, for example so called critical sectors such as energy firms

·       What kind of attacks we are seeing and how businesses know they have been compromised

·       Tools and techniques to protect against and mitigate breaches

The future of AI in cyber security: predicting, detecting and mitigating attacks

Dr Jamie Graves

Artificial intelligence (AI) and its subset machine learning are being increasingly used in security as a means of detecting and flagging up suspicious behaviour so a security analyst can act. But now the technology is also able to take actions too, for example closing down a server or blocking traffic to prevent an attack from happening. 

This session will cover:

·     The latest developments in AI and machine learning and future expectations 

·     Can the technology be used against you? The risks of cyber-attacks using machine learning 

·     Is this the end of the security analyst? In short, no: how AI and machine learning and the security analyst can work together

·     The importance of data: Issues in implementing AI and machine learning including the ability to use old data to predict new attacks

GDPR and the UK’s Data Protection Bill: Best practice, real-world examples

The update to data protection regulation (GDPR) came into force in May this year, introducing more rights for data subjects. So, what now?

This session will feature examples of best practice from firms who have aligned their strategy to cope with this regulation. As part of this, it will look at where GDPR compliance fits within the business – and the role of the CISO and DPO within this. It will look at companies who have been caught out by the new regulation, also looking specifically at the UK Data Protection Bill and how the GDPR will be managed and implemented in the UK

Women in security

According to research by BCS, women make up only 13% of computer science entrants. There are 1.1 million IT specialists in the UK – only 16% of whom are women and female IT specialists are paid 16% less than their male peers. Research from (ISC)2 shows that only 11% of information security professionals are women. So what is the solution?


Dr Jessica Barker will explain:


·       Why technology companies with women on their boards have a 34% higher return on investment than those that don’t

·       How education and business can benefit by encouraging more women to apply for IT security courses and jobs

·       What is already being done

Malicious cryptominers: What are the risks?

As cryptocurrencies such as Bitcoin surge, a growing number of criminals are using malicious means of mining the lucrative currency. Recently, attacks of this kind have been growing: A new botnet malware targeting Android-based devices was used for the purpose of mining cryptocurrency Monero. Meanwhile, the first SCADA cryptominer has been seen in the wild. This session will examine:

·       Cryptomining attacks explained: What are they and who is using them?

·       The businesses who have already been hit

·       What to do to protect yourself from this new attack vector

·       What the future holds


Coffee and networking
One of 3 streams

Click HERE to view stream options

Seminar Change Over
One of 3 streams

Click HERE to view stream options

Lunch and networking
One of 3 streams

Click HERE to view stream options


Chairs Opening Address
Having the skills to deal with the current threat landscape

As cyber-attacks become more complex and sophisticated, having the right people in place to fight threats is key. This session will look at:

·       What types of attacks we are seeing

·       What the industry is doing about them

·       The importance of skills: having the right team in place is essential in fighting current and new attacks. Which skills do we lack and how can we fill the gap?

Six months into GDPR compliance, we are seeing examples of best practice emerge. This company will outline:

·       How it had to transform its business to comply with GDPR

·       The benefits of compliance: How GDPR can be a business differentiator

·       Preparing for the future: How compliance is ongoing

·       Top tips: How following best practice will future-proof your company

Criminal Perspectives: Former US Most Wanted Cybercriminal Brett "GOllumfun" Johnson Discusses his History of Cybercrime, Its Current State, and Where It is Headed.

Brett Johnson

Mr Johnson promises an enlightening, engaging, and entertaining presentation for The Future of Cybersecurity Conference.  Brett will discuss his life as a United States Most Wanted Cybercriminal:  How he got involved in cybercrime, how he rose to the top, and how he ultimately fell and landed in prison for 7 1/2 years.  Brett will also detail the current state of organized cybercrime, and look ahead into what cybercrime might look like in all-too-near future.

Using blockchain in security

Robin Smith

As well as being an enabler of the highly valuable bitcoin, Blockchain is being used beyond just the financial services industry. It is said the distributed ledger could also be useful in general, for areas such as authentication and protection from data theft.

It has also been suggested that blockchain could help to secure the internet of things (IoT). According to Deloitte, Blockchain technology could “enable the creation of IoT networks that are peer-to-peer (P2P) and trustless; a setting which removes the need for devices to trust each other and with no centralized, single point of failure”.

This session will uncover how blockchain works, looking into how it can be used in security and for which sectors, examining whether there are any risks in adopting the technology.

Facebook’s alleged data abuse: Lessons learned for Business

Earlier this year, it emerged that large amounts of data was being collected by Facebook and possibly abused for advertising purposes. It led to outrage among governments and the public. This session will look at.

·       What lessons have been learned, especially when it comes to safeguarding information under GDPR?

·       The business benefits: How trust is the key to success in a post GDPR era

·       How to use data, but not abuse it

Coffee and networking
Talk and Q&A with our key note

Edward Snowden

A one hour extensive interview with Edward Snowden will take place via live stream.

Event close