Registration - Breakfast - networking
Chair's opening address

Security in Europe 2018: Legislation, data protection and cyber threats


  • ·     The growing risks and costs of cybercrime to businesses
  • ·     The importance of cyber skills and strategies
  • ·     The threats to businesses and how to overcome them
  • ·     The latest tools and technologies to fight cyber-attacks
The Dynamics of Cybercrime: The Role of Sharing Information, Networking, Crossing Borders, and Patience in Organized Cybercrime Communities.

Brett Johnson

Reformed US Most Wanted Cybercriminal turned Cybersecurity Expert Brett Johnson discusses the mechanics of organized cybercrime groups:  Why they exist,  How they operate, and What makes a successful cybercrook.

Battle of the Authentication Methods: Which authentication methods work and which ones will leave you vulnerable to a hack?

Himanshu Verma

Learn about the strengths & weaknesses of each method and understand what authentication myths are true and which are not. Test your own understanding and see if you've fallen victim to the false MFA beliefs that are common today.

Cybercrime: A Prosecutor's Perspective: Case studies-Facebook, Anonymous, Spamhouse, etc

Sandip Patel QC

How Glen Mangham hacked Facebook’s source code.

How Anonymous waged global cyber campaigns.

How Seth Nolan-McDonagh almost crashed the Internet.

Day in the life of a DPO

Tarun Samtani

DPA is dead, long live the DPA. DPO role comes with a serious responsibility and accountability not only towards the business but more importantly towards your customers, employees, third parties and any other individuals who entrust you with their data. A day in the life of a DPO is never the same. Some days you may be operational, sometimes strategic and a lot of the times it may be focusing on the processes and whether the different parts are working correctly in the complex engine where Data is the oil...  

This session will focus on a day to day challenges faced by a DPO. 

Leveraging AI for Dynamic & Surgical Autonomous Response for Cyber Defense

Dave Palmer

Proposing a new approach to cyber defence, which uses dynamic AI systems that can counter the activity of malicious threats. This new advanced AI technology can autonomously contain and monitor relevant threats, increasing confidence that a problem is emerging before automatically stopping the threat without interrupting normal business and employee activities.


Defending against Modern Cyber Threats to Apps and Data

Drew Schuil

Network, web/mobile apps, cloud data, on-premise databases and file servers, etc…  The list of targets for bad actors is endless and the tactics are constantly changing, it’s a cat and mouse game.  The focus on end point, malware, network perimeter security, and encryption hasn’t been enough as enterprise data breaches are in the news every week.  In this session, we’ll discuss the priorities of global CISOs today and how they are buying down risk with technology like Imperva to focus in on what matters most – the data and applications that access it.

Coffee and networking
One of 3 streams

Click HERE to view stream options

Seminar Change Over
One of 3 streams

Click HERE to view stream options

Lunch and networking
One of 3 streams

Click HERE to view stream options


Chairs Opening Address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

The Abyss is Waving Back… The four paths that human evolution is charging down, and how we choose which one’s right…

Chris Roberts

As humans we have four evolutionary paths:
1.     We embrace nanotechnology and Bionanotechnology… we become more dependent upon machines and slowly move towards integration with the systems (we know we’re looking at 80% integration in the next 20 years at least)
2.     We embrace consciousness and some of us end up in New Zealand hanging out in an AS/400…bodies no longer needed
3.     AI wakes up, looks round wonders WHY humans are in the driving seat and takes over… OR we end up unplugging it and rebooting back to the 1900’s…
4.     The stumbling drunk…simply put we keep staring into the abyss and almost falling in, only to somehow manage to come back from the collapse, the challenge is HOW many times can we do this before we simply fall in?


Niall MacLeod

·The ATT&CK Framework isn’t new - it’s actually been around for about five years. However it’s come to the fore in 2018 and is now being widely spoken about and adopted. What is it and how have Anomali incorporated it into our threat intelligence platform.

Cyber Security Transformation for a Cloud Generation

Darren Thomson

Over the next decade, there will be a substantial shift in compute usage models. At the same time seismic security and privacy issues will oppose perceived gains from these changes. This session explores how to manage this looming crisis around automation, budget, cloud, Dark Internet and privacy concerns, and the substantial security transformation that is required.

Cybersecurity: The Modern Business Has No Perimeter

Jonny Tennysonn

Insider attacks are on the rise – a cyber strategy focused on protecting the perimeter is futile.
Employees are now the perimeter and they’re always on the move; remote working opens organisations up to increased risks surrounding their data.
What does the Insider Threat look like?

“Weaponising information: the future of fake news, cyber breaches and black market data trading”

Geoff White

  • What exactly is “fake news” and how will it evolve?
  • Why do some cybersecurity stories get reported while others are ignored?
  • How will legislation and regulation change the landscape for victims and perpetrators?
  • How are hacker tactics changing journalism, politics and finance?
  • What is the impact of the emerging “dark nexus” of cybercriminals, investigators, propagandists and traders?
Seconds out! When algorithms don’t play nice with our applications and lives

Etienne Greeff

There is a popular narrative that Artificial Intelligence is the next generation Cybersecurity defence able to deal with sophisticated attacks. This talk examines that statement by taking a high level of at AI & Machine Learning how these can be used in both offensive and defensive applications. We start of by looking at some of the terms in AI followed by looking at how effective AI is at defending networks. The talk will show some practical examples of AI based defences followed by recommendations for how this technology can be used within your networks and applications.

Coffee and networking
Talk and Q&A with our key note

Edward Snowden

A one hour extensive interview with Edward Snowden will take place via live stream.

Event close