- Richard Parlour
- Edward Snowden
- Anonymous Scandinavia
- Stu Hirst
- Chris Roberts
- Geoff White
- Eliza May Austin
- Charl Van Der Walt
- Dave Palmer
- Femi Owolade-Coombes
- Jonny Tennyson
- Michel Bechard
- Pavel Mucha
- Tim Ager
- Nick Baglin
- Nigel Hawthorn
- Chris Heslop
- Andrea Little Limbago
- Daniel Shepherd
- Simon Sharp
- Phil Doherty
John Doody is Director of Interlocutor Services Limited, a company established in 2003 to promote Information Assurance and Cyber Security issues both nationally and internationally, the company offers a range of services including Marketing, Communications, Public Speaking, Strategy Reviews, Information Assurance, Cyber Security and Information Technology, these services are geared to the strategic level within government and industry. Prior to this John served at CESG/GCHQ for 10 years in the appointment of Head of Information Assurance Customer Services. He has a wealth of knowledge across the whole spectrum of Cyber Security and Information Assurance. In this latter appointment he was a major contributor to CESG’s move to a commercial business footing.
He also has had a role as a Non Executive Director to a security company as well as providing Strategic Advice to a number of major UK and US IT Security companies. John’s recent major role was as the Global Strategic Cyber Security Adviser to Ultra Electronics Limited where he reported directly to the CEO on Cyber Security matters. He also provided Strategic Advice to FireEye and Safenet, two large US Cyber companies. He is currently a Deloitte Associate.
John is a retired officer of the UK Royal Corps of Signals, a Corps in which he served for 33 years to the rank of Colonel. He is a qualified engineer and has held a number of strategic engineering appointments in the UK Ministry of Defence including system support to PTARMIGAN and WAVELL, the army’s tactical communication and CIS systems, Director in the Procurement Executive as Project Manager for Army Electronic Warfare, Battlefield Target Engagement System (BATES), Air Defence CIS system (ADCIS) and WAVELL managing £1B of programmes. John has also worked in the R&D environment working on Electronic Warfare Simulation. He has also served in various operational environments including Loan Service to the Trucial Oman Scouts in the Middle East.
John has chaired many international committees dealing with Cyber, Information Assurance, Communications and Interoperability. John is well known on the national and international Cyber/ Information Assurance Conference circuit where he has chaired many events and has given many talks on Cyber and Information Assurance. He is a renowned Evangelist for Cyber Security and Information Assurance.
He has held the position of an International Class Director for the Armed Forces Communications and Electronics Association (AFCEA) International (Fairfax Virginia USA). He is a past President and Vice-President of the AFCEA UK WEST Chapter and served as a Member at Large for AFCEA London in the early 90s. He was also also the Cyber Security Lead for the BCS Security Community of Expertise
John has supported a number of Charitable organisations including SSAFA, Help for Heroes and The Army Benevolent Fund (ABF)
John was awarded the CESG/GCHQ Directors Medal in 2003
He was elevated to the Infosecurity Europe Hall of Fame in 2012
chairman of the EU Task Force on Cybersecurity Policy for the Financial Sector, Centre for European Policy Studies
Richard Parlour is chairman of the EU Task Force on Cybersecurity Policy for the Financial Sector, and has been a member of the DCMS Cyber Experts Working Group and chairman of the FSB Home Affairs Committee. He is also on the Bank of England Financial Markets Law Committee Brexit Advisory Group. Richard is an experienced international financial markets lawyer. His firm, Financial Markets Law International (www.fmli.co.uk) has a particular specialism in deterrence of economic crime, cyber investigations and training.
Former Intelligence Officer & Whistleblower,
Edward Snowden is an American intelligence contractor who in 2013 revealed the existence of secret wide-ranging information-gathering programs conducted by the National Security Agency (NSA). Snowden was born in North Carolina but at a young age his family moved to central Maryland, a short distance from NSA headquarters at Fort Meade. He dropped out of high school and studied intermittently between 1999 and 2005 at a community college. Snowden completed a GED but did not receive a college degree. In 2004 he enlisted in the army reserve as a special forces candidate, but he was discharged four months later. In 2005 he worked as a security guard at the Center for Advanced Study of Language, a University of Maryland research facility affiliated with the NSA. Despite a relative lack of formal education and training, Snowden demonstrated an aptitude with computers, and he was hired by the Central Intelligence Agency in 2006. He was given a top secret clearance and in 2007 was posted to Geneva, where he worked as a network security technician under a diplomatic cover. Snowden left the CIA for the NSA in 2009, there he worked as a private contractor for the companies Dell and Booz Allen Hamilton. During this time, he began gathering information on a number of NSA activities—most notably, secret surveillance programs that he believed were overly broad in size and scope. In May 2013 Snowden requested a medical leave of absence and flew to Hong Kong, where during the following month he conducted a series of interviews with journalists from the newspaper The Guardian. Among the NSA secrets leaked by Snowden was a court order that compelled telecommunications company Verizon to turn over metadata (such as numbers dialed and duration of calls) for millions of its subscribers. Snowden also disclosed the existence of PRISM, a data-mining program that reportedly gave the NSA, the Federal Bureau of Investigation, and the Government Communications Headquarters—Britain’s NSA equivalent—“direct access” to the servers of such Internet giants as Google, Facebook, Microsoft, and Apple. On June 9, 2013, days after stories were initially published in The Guardian and The Washington Post without revealing the identity of their source, Snowden came forward, stating that he felt no need to hide because he had done nothing wrong. In a subsequent interview with the South China Morning Post, he claimed that the NSA had been hacking into Chinese computers since 2009 and that he had taken a job with Booz Allen Hamilton expressly to obtain information about secret NSA activities. The U.S. charged Snowden with espionage on June 14, and Justice Department officials, including Attorney General Eric Holder, began negotiating with authorities in Hong Kong in an attempt to initiate extradition procedures. The Hong Kong government declined to act, and Snowden, with the assistance of the media organization WikiLeaks, flew to Moscow, where his exact whereabouts became the source of intense speculation. Russian Pres. Vladimir Putin confirmed that Snowden, whose passport had been revoked by the U.S., remained within the confines of the international transit zone of Moscow’s Sheremetyevo airport. Putin resolutely stated that Russia would take no part in his extradition to the United States, and Snowden applied for asylum in some 20 countries, including Russia. Putin also made clear that he did not wish for Snowden’s presence to damage relations with the United States, and he said that if Snowden wished to remain in Russia, “he must stop his work aimed at bringing harm to our American partners.” After having spent more than a month in the Sheremetyevo transit zone, Snowden was granted temporary refugee status by Russia, and he left the airport in the company of a WikiLeaks staffer. Although U.S. Pres. Barack Obama was critical of Snowden’s methods, in August 2013 he announced the creation of an independent panel to examine the U.S. government’s surveillance practices. That panel’s findings, published in December 2013, recommended that the mass collection of telephone records be suspended and advised greater oversight of sensitive programs, such as those targeting friendly foreign leaders. Obama acted on a number of these suggestions and recommended congressional review of others, but the role of the NSA and its data-collection efforts remained a bone of contention between the intelligence community and privacy advocates. In April 2014 The Guardian U.S. and The Washington Post were awarded the Pulitzer Prize for public service for their roles in reporting on the NSA leaks. Snowden characterized the award as “a vindication” of his efforts to bring the secret surveillance programs to light. In August 2014, as Snowden’s grant of temporary asylum expired, the Russian government awarded him a three-year residence permit (effective August 1), which would allow him to leave the country for up to three months. He was also granted the opportunity to request an extension of that permit and, after five years of residence, to apply for Russian citizenship should he choose to do so.Snowden is the subject of two major films - Citizenfour, a documentary which won the Academy 2015 Award for Best Documentary Feature and the upcoming film, Snowden a biographical political thriller based on the book, The Snowden Files by Luke Harding and Time of the Octopus by Anatoly Kucherena. Snowden is being produced and directed by Academy Award-winner Oliver Stone and will be released in early 2016.
Topics: • Mass Surveillance, Secrecy & Democracy: When Data Collection Becomes a Threat to Free Societies • Restoring Trust: How To Solve The Next Generation of Privacy & Security Dilemmas • National Security Agency or National Surveillance Agency: Our Cyber Defenses Examined
AnonScan, Anonymous Scandinavia
Anonymous is a decentralized international hacktivist group/collective that is widely known for its various cyber attacks against several governments, government institutions, government agencies and corporations.
Dozens of people have been arrested for involvement in Anonymous cyberattacks in countries including the U.S., U.K., Australia, the Netherlands, Spain, India, and Turkey. Supporters have called the collective/group "freedom fighters" and digital Robin Hoods, while critics have described them as "a cyber lynch-mob" or "cyber terrorists".
In 2012, Time called Anonymous one of the "100 most influential people" in the world: http://content.time.com/time/specials/packages/article/0,28804,2111975_2111976_2112122,00.html
Head of Cloud Security, Photobox
Stu is currently the Head Of Cloud Security at Photobox Group (which includes Moonpig, PosterXXL, Greetz! and Hofmann).
He was instrumental in building Skyscanner’s Security team from 2015-2017, having led them to the final of SC Magazine’s Security Team Of The Year 2017.
He has previously worked in security at The Trainline and was part of the Cyber Leadership Team at Capital One UK.
He has twice been nominated as a finalist for Cyber Evangelist Of The Year at the Scottish Cyber Awards and runs one of Scotland’s leading Tech Meet Ups; Security Scotland.
Stu has appeared at numerous leading Security events such as InfoSec Europe, Cloud Expo Europe and Future Of Cyber Security.
Hacker and Researcher Geek in Residence, Hillbilly Hit Squad,
Chris is currently the CSS for Attivo Networks, and is working on a number of projects within the deception and services space. Over the years, he's founded or worked with a number of companies specializing in DarkNet research, intelligence gathering, cryptography, deception technologies, and providers of security services and threat intelligence.
Since the late 90’s Chris has been deeply involved with security R&D, consulting, and advisory services in his quest to protect and defend businesses and individuals against cyber attack. Prior to that he jumped out of planes for a living, visiting all sorts of interesting countries and cultures while doing his best to avoid getting shot at too often. (Before that he managed to get various computers confiscated by a number of European entities.)
Roberts is considered one of the world’s foremost experts on counter threat intelligence and vulnerability research within the Information Security industry.
Roberts has led or been involved in information security assessments and engagements for the better part of 20 years, and has a wealth of experience with regulations such as GLBA, HIPAA, HITECH, FISMA, and NERC/FERC. He has also worked with government, state and federal authorities on standards such as CMS, ISO, and NIST.
Roberts is credentialed in many of the top IT and information security disciplines and as a CyberSecurity advocate and passionate industry voice, Roberts is regularly featured in national newspapers, television news, industry publications and several documentaries. He can typically be found waving arms on a stage somewhere on this planet…or hacking into whatever’s taken his fancy…
As one of the well-known hackers and researchers, Chris is routinely invited to speak at industry conferences. CNN, The Washington Post, WIRED, Business Insider, USA Today, Forbes, Newsweek, BBC News, Wall Street Journal, and numerous others have covered him in the media.
And worst case, to jog the memory, Chris was the researcher who gained global attention in 2015 for demonstrating the linkage between various aviation systems, both on the ground and while in the air that allowed the exploitation of attacks against flight control system.
Investigative Journalist Covering Technology,
Ever wondered how the latest developments in technology are affecting our world? Geoff White has. He dives deep into these issues as an accomplished keynote speaker and prolific writer, having spoken on panels and chaired debates at venues ranging from London's Chatham House think-tank to the Latitude music festival. His reports for Channel 4 News and BBC Radio 4 aim to create real-world change, with a particular focus on e-crime and cybersecurity: his words have brought about arrests, regulatory investigations and legislative action. Geoff also created the Data Baby project, a unique experiment which used a fictional online identity to expose how our personal data is being used - and abused - online. He recently completed a 10-part series delving into the shadow dark web economy that feeds on stolen personal data, hacked computers and corporate incompetence. He is also the co-creator of The Secret Life of Your Mobile Phone, a live, interactive phone hacking stage performance which shows how the global technology industry is harvesting the data leaking from your handset.
Ladies of London Hacking Society,
Eliza specialises in incident response in the enterprise environment. She is particularly interested in the bespoke designing of threat intelligence, and advanced targeted attack response and remediation. She strongly advocates for neuro and class diversity in the security industry. Eliza's passion for information security spurred her on to create Ladies of London Hacking Society.
Strategic Director, SecureData
After many years in an “attack and penetration” testing role at SensePost, Charl van der Walt has a deep understanding of the “offensive” paradigm within information security with a particular interest and passion for teaching and training. Over the years he has given courses and lectures for companies and universities the world over and has been a regular on the infosec conference circuit, appearing as a speaker at the prestigious Black Hat Briefings multiple times, where SensePost has consistently also been the biggestselling training provider over the past 10 years. van der Walt has been a security training advisor to the US DoD for over 5 years, has acted as a network security consultant for the Commonwealth Games and co-authored numerous security books like The Penetration Tester’s Open Source Toolkit, Stealing the Network: How to Own a Continent and Aggressive Network Self-Defence.
Director of Technology, Darktrace
Dave Palmer is the Director of Technology at Darktrace, overseeing the mathematics and engineering teams and project strategies. With over ten years of experience at the forefront of government intelligence operations, Palmer has worked across UK intelligence agencies GCHQ & MI5, where he delivered mission-critical infrastructure services, including the replacement and security of entire global networks, the development of operational internet capabilities and the management of critical disaster recovery incidents. He holds a first-class degree in Computer Science and Software Engineering from the University of Birmingham.
Hacker & Young Coder,
Hackerfemo has been coding since he was eight years old. After learning to hack Minecraft using Python on the Raspberry Pi computer, he decided to set up South London Raspberry Jam – to share his passion for coding with other young people. Four years on, Femi has run hundreds of coding and robot workshops across the UK and internationally. The community events he runs, with other volunteers, have been praised for being pioneering as they are fully inclusive and welcome young people who have autism or, like him, Tourette’s Syndrome. In 2017, he won an Inaugural Legacy Diana Award for his kindness, compassion and duty to the community. Femi has successfully set up his own business, hackerfemo.com, delivering workshops and inspirational talks to corporate companies and public organisations, whilst continuing his community work. He has been recognised as a ‘Change- enabler’, an inspirational young coding ambassador and has presented keynote speeches at Industry events such as the Red Hat Summit in San Francisco last year. More recently he has been awarded a Point of Light award from the Prime Minister, Theresa May “in recognition of your exceptional service training young people in digit skills” and he has been commission to develop a coding curriculum for Red Hat’s Co.Lab programme for girls.
Femi’s present initiative is his most ambitious; with other young coders, he aims to develop an inclusive Young Coders community platform and has already started to run monthly youth-led coding MeetUps, partnering with Tech Industry professionals and overseeing an outreach programme to increase accessibility for under-represented groups. So far the group of young coders have achieved gender parity with 50/50 boys and girls attend the sessions.
Femi has also begun to hone in on Cybersecurity and the impact of technology on Generation Z, as his specialist interest, after being welcomed by the Cybersecurity community in London and a two day visit to PwC’s Cybersecurity division and being given the opportunity to shadow their Pen-testers. He regularly attend the OWASP London Chapter MeetUps. He’s also been commissioned to work on a Cybersecurity and awareness raising initiative - to be launched both here in the UK and the US. Femi is very excited about the year ahead and sharing his experience with others through his website, developing Cybersecurity workshops and podcasts to inform his peers but also to sharing with the industry – how young people are experiencing technology themselves. He’s presently planning a youth-led Cybersecurity conference in the Autumn.
Previously Head of Customer Success at ZoneFox and now leading renewals for this product at Fortinet, Jonny brings a customer-first attitude to an exciting growth area within one of the top Cybersecurity companies in the world.
Having spent his career entirely within the technology sector in customer-focused roles, Jonny brings a passion for technology and helping customers to succeed with this exciting platform.
During his career, Jonny has been at the forefront as an ambassador for many blue-chip brands, helping Intel’s Tier-1 customers see success with their solutions, helping SolarWinds MSP’s largest MSP partners drive additional revenue and drive down their cost of service through successful solution deployment and revenue strategies, as well as being the face of brands such as Samsung, Sony and HP to customers within the UK.
Services & Products Manager, SecureData
Michél Bechard has for many years had specific interest in IT security and the ever-evolving challenges businesses face in this area. He is an active participant on a number of industry specific forums and a member of the British Chartered Institute of IT Practitioners. In addition to various Microsoft accreditations, Michel is also C|EH accredited. Michél brings nearly 20 years of both strategic and tactical hands on technical experience in the information technology and information security industries. He’s worked at senior management level for Comodo Security Solutions Inc, a prominent Managed Services Provider in London, United Kingdom, as an independent consultant, and founded and grew his own information technology services business in his home town of Cape Town, South Africa.
Systems Engineer, Cybereason
Pavel Mucha is a Senior Pre-Sales Specialist at Cybereason and one of the good guys working tirelessly to give our customers the upper hand against adversaries. His experience with Cybereason and McAfee makes him a valuable asset for anybody needing to understand how to defend their organisation against the next generation of cyber threats. A fluent Russian speaker, in his spare time Pavel collects old Saab cars – we guess somebody has to.
Saler Director, Osirium
Tim heads up the Sales team at leading UK Privileged Access Management solution provider Osirium. Osirium’s PxM Platform protects customer Privileged Accounts from the internal and external security breaches that pose critical threats to their business. Prior to joining Osirium Tim held senior cybersecurity sales, marketing and business development roles with major organisations including Celestix Networks and InTechnology.
General Manager , Netacea
Nick Baglin joined Netacea in January 2018, with a mission to grow and expand the company to be a leader in behavioural machine learning in the cyber security space. Drawing upon over 18 years’ experience in cyber security, Nick has held senior roles at HP Enterprise Security Services and CyberArk, where he was VP of Sales, EMEA and played a crucial role in the company’s growth from £250M to £2.2B.
Ladies of London Hacking Society,
Kate is the CEO and Founder of Cybermaniacs, an innovative cyber awareness company and the Director of Development for the Ladies of London Hacking Society. With 20 years in the IT trenches working with a range of organisations from trailblazers in the naughties to global organisations grappling with transformation and agility, she still sees people at the heart of change. Kate is currently a NED and Advisor to startups in the UK and US, and speaks internationally on leadership, cyber security, and technology change topics.
EMEA & Privacy Spokesperson, McAfee
From working with an Apple distributor in 1980, Nigel has over 30 years experience of computers, security, networking and mobility. He has a strong technical background, with roles in pre-sales and post-sales support and product management before technology marketing. His international knowledge started in 1987 and he has presented at security, privacy, e-commerce and networking conferences in over 50 countries.
He has written the book “GDPR: An action Guide for IT” and speaks and writes regularly on data protection regulations and user privacy. He has also contributed to a number of computing books on network protocols and security, written many articles and lived in California for a number of years before relocating back to the UK as he was missing the rain!
His experience has mirrored many of the most innovative areas of computing; Apple & IBM PCs in the 1980s, storage & networking in the 1990s, Internet performance & web security in the 2000s and mobility & cloud enablement in the 2010s.
You can follow him at www.twitter.com/wheresnigel
Marketing Director, Osirium
Chris has over 25 years’ experience in EMEA and worldwide enterprise software solutions marketing and sales. Chris served as Marketing Director for the successful MIMEsweeper content security business from early stages to its sale, and has extensive experience in the industry of leading marketing teams for lead generation, channel marketing, communications and brand development. Prior to joining Osirium Chris also held senior marketing leadership roles with Vocollect, Honeywell, PolicyMatter and Fujitsu ICL.
Chief Social Scientist, Virtru
Andrea Little Limbago is the Chief Social Scientist at Virtru, where she researches and writes on geopolitics, cybersecurity and privacy, and directs the company’s technical content. She also presents at a range of security, government and academic conferences, covering cybersecurity topics ranging from norms to bots to attack trends. She previously worked in academia and at the Joint Warfare Analysis Center (JWAC). While at JWAC, Little Limbago received the command’s top award for technical excellence for her analytic support across the Department of Defense. Little Limbago holds a Ph.D. in political science from the University of Colorado at Boulder, where she taught international relations and foreign policy courses, and a bachelor’s degree from Bowdoin College.
General Manage, New Ventures, CSIS Security Group
Daniel is CSIS’s General Manager for New Ventures and is also Co-Founder and CEO of Agile Response Technologies, a Copenhagen-based company that develops and commercialises an incident response and threat hunting platform. Prior to starting Agile in 2017, he served as Chief Marketing Officer and Managing Director, LATAM for S21sec. Earlier in his career, Daniel was a management consultant, working on strategic growth and operational performance improvement projects.
Vice President International,, ObserveIT
With more than 18 years of leadership and management experience in cybersecurity, fraud and telecommunications, Simon leads ObserveIT’s international strategy, management and execution. He has held strategic management and leadership roles with market-leading cybersecurity organisations including Entrust, RSA (Dell Technologies), Pindrop, and Cybereason. With many achievement awards, Simon has demonstrated the energy, passion and creativity required to ensure his customers succeed in competitive and emerging markets.
Strategic Intelligence Analyst in Intelligence-SI, Digital Shadows
Philip Doherty is a Strategic Intelligence Analyst on the Strategic Research Team at Digital Shadows. With a background in Countering Organized Crime and Terrorism research, Philip focuses his attention to mapping the activities of threat actors and how the cyber threat landscape affects cross-sector clients that have a prominent digital footprint.