Programme:

08:00
Registration - Breakfast - networking
08:55
Chair's opening address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Security in Europe 2019: Legislation, data protection and cyber threats

 

  • ·     The growing risks and costs of cybercrime to businesses
  • ·     The importance of cyber skills and strategies
  • ·     The threats to businesses and how to overcome them
  • ·     The latest tools and technologies to fight cyber-attacks
09:00
The Cyber Security Landscape

Richard Parlour

  • The cybersecurity landscape and the key threat actors
  • The international response
  • The linkage to GDPR
  • Impact of Brexit on cybersecurity
09:15
Defending against adversaries – what tactics can sport and warfare teach us to actively defend our networks from threat actors.

Mark Howell

  • Tactics lessons from sport and warfare – what works when defending
  • Honeypots – from science project to modern day cyber solution
  • Attackers use deception, defenders must
  • How can we apply these tactics in the cyber-realm
09:30
How to wear two hats - life as a DPO in a SME.

Daniel Selman

In this presentation Daniel will talk about the challenges and opportunities of being the Data Protection Officer in a small to medium enterprise, how you strike the right balance between independently assessing and assuring compliance whilst making sure you’re not just ‘marking your own homework’. 

09:45
A New Era of Cyber Threats: The Shift to Self Learning, Self Defending Networks

Dave Palmer

The Enterprise Immune System: The World’s Leading AI

Synopsis:
• Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats as seen Fish Tank installed into North American Casino, Darktrace identified anomalous data transfers to an external source and major case of data exfiltration avoided.
• How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time
• How to achieve 100% visibility of your entire business including cloud, network and IoT environments
• Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk as seen when Employee logged into personal email and inadvertently downloaded stealthy, malicious ransomware which was identified and dealt with in just 33 seconds. 

 

10:00
Cybercrime case studies:

Sandip Patel QC

  1. Face Book Hacker
  2. Anonymous
  3. The Boy Who Almost Broke the Internet

                                                      

10:15
Why understanding your attack surface matters

Charl Van Der Walt

What does it mean to obtain and use ‘cyber intelligence’ in a manner that effectively prioritises scarce resource across the full spectrum of ‘Assess, Protect, Detect & Respond’ cyber security disciplines? Threats in cyber-space arise for two main reasons; weakness in IT infrastructure and an interest taken by an attacker. Most businesses know they must mitigate cyberthreats for their own good but also because regulators require them to.

But the threat landscape is ever changing as technology evolves and attackers innovate. Ensuring an organisation has the skills, agility and underlying platforms and processes to understand, detect and manage cyberthreats is one of the most compelling challenges faced by any 21st century business. Regulatory changes have pushed to issue up to board level.

What should the priority be for an organisation that wants to improve its cyber security posture, finding and removing vulnerabilities in its infrastructure or assessing the external threats it faces?

10:30
Women in cybersecurity: What needs to be done?

Panel Session - speakers include:

Eliza May Austin - Ladies Of London Hacking Society

Stacy M Aruda - Rtd FBI Agent &  Executive Director for the Florida Information Sharing and Analysis Organization

Annabel Berry - CEO Sapphire

Despite the industry's best efforts, less than a third of the cybersecurity workforce is women, according to the 2019 ISC(2) figures. This panel will discuss the industry's progress so far, looking at initiatives such as mentoring and adjusting recruitment adverts to encourage more women to apply for cybersecurity jobs. Is the industry doing enough - what else needs to be done, and what part can men play? 

10:55
Coffee and networking
11:25
One of 3 streams

Click HERE to view stream options

11:55
Seminar Change Over
12:00
One of 3 streams

Click HERE to view stream options

12:30
Lunch and networking
13:30
One of 3 streams

Click HERE to view stream options

 

14:00
Chairs Opening Address

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

14:05
Cloud Security – Nice to have or completely essential? An examination of cloud security risks and how to mitigate them in a corporate environment.

Richard Flanders

Protecting data and assets in the public and private cloud can seem a complex problem for companies looking to benefit from the business agility and ease-of-use provided by those platforms. With the correct approach to implementing cloud security, risk of data loss and intrusion can be greatly reduced. This presentation shows how the correct choice and deployment of security tools can protect every business across multiple cloud infrastructures.

 

14:20
Lights Out: How Hackers Target Critical Infrastructure

Geoff White

Cyber crime has surged up the news agenda and now presents a very real risk to our critical services: hospitals, political processes and the energy networks have all become targets.

Investigative journalist Geoff White has spent years researching the shadowy nexus of criminal hackers, state-sponsored cyber attackers and hacktivists movements behind this evolving threat.

In this talk he will discuss real-world examples of attacks on critical national infrastructure, and what they tell us about the increasing convergence of tactics, tools and psychology among previously disparate cyber threat groups.

 

14:40
Attackers Prey on Uncertainty: How to Fail at Threat Detection

Scott Walker

It takes a great deal of visibility and context to detect and respond to sophisticated threats. Attackers usually target data, where enterprises have the least visibility and most uncertainty. In this session, we will explore new, sophisticated threats from inside and out, demonstrate how easy it is for adversaries to bypass traditional controls, and present a methodology to better protect data at scale, improve threat detection, and reduce uncertainty.  

 

15:00
Why we need to think beyond security and privacy

Emerald De Leeuw

We all want to have a bright future alongside technology. While we have acquired skills in keeping bad actors out and creating good data protection controls, the negative consequences of poor data management practices have never been more apparent. The advertising-based attention economy is making us less smart and it is eroding our relationships. In addition to that, we are finding ourselves in a world where we have to question our reality every single day. Data protection and cybersecurity form part of the solution but isn’t enough. This talk focuses on digital ethics and how humane technology has to become part of our conversation.
 

 

 

15:30
Coffee and networking
16:00
Q&A with Frank Abagnale "Catch me if you can"

Frank Abagnale

Frank William Abagnale Jr. is an American security consultant known for his background as a former con man, check forger, and impostor between the ages of 15 and 21. He became one of the most notorious impostors, claiming to have assumed no fewer than eight identities, including an airline pilot, a physician, a U.S. Bureau of Prisons agent, and a lawyer. He escaped from police custody twice (once from a taxiing airliner and once from a U.S. federal penitentiary) before he was 22 years old. He served less than five years in prison before starting to work for the federal government. He is currently a consultant and lecturer for the FBI academy and field offices. He also runs Abagnale & Associates, a financial fraud consultancy company.

Abagnale's story inspired the Academy Award-nominated feature film Catch Me If You Can (2002), starring Leonardo DiCaprio as Abagnale and Tom Hanks as the FBI agent pursuing him, as well as a Broadway musical of that name and a TV series White Collar, which are based on the book Catch Me If You Can.

Frank will describe his fascinating life, and his take on cyber security in conversation with Geoff White, an investigative journalist, who has worked for both the BBC & Channel 4 TV.  He will then be taking questions from Geoff and from the audience.

Geoff White’s exclusives have covered everything from developments in artificial intelligence to fraud in the internet dating industry. He is currently writing a book on cybercrime for due for publication in 2020.

The encounter should be memorable.

 

17:00
Event close