Moderator

Colonel (Retd) John Doody FBCS FCMI CITP IISP MIOD

Industry Expert, British Computer Society

John Doody is cyber lead for BCS Security. John served at CESG/GCHQ for 10 years in the appointment of Head of Information Assurance Customer Services.

He has a wealth of knowledge across the whole spectrum of Information Assurance. In this latter appointment he was a major contributor to CESG’s move to a commercial business footing. He also has a major role as a Non Executive Director to a security company as well as providing Strategic Advice to a number of major UK and US IT Security companies. John is a retired officer of the UK Royal Corps of Signals, a Corps in which he served for 33 years to the rank of Colonel. John has chaired many international committees dealing with Information Assurance, communications and interoperability. John is well known on the national and international

Cyber/ Information Assurance Conference circuit where he has chaired many events and has given many talks on Information Assurance.

He was recently re-appointed as an International Class Director for Armed Forces Communications and Electronics Association (AFCEA) International (Fairfax Virginia USA).

He was elevated to the Infosecurity Europe Hall of Fame in 2012. 



Keynote speaker

Edward Snowden

Former Intelligence Officer & Whistleblower,

Edward Snowden is an American intelligence contractor who in 2013 revealed the existence of secret wide-ranging information-gathering programs conducted by the National Security Agency (NSA). Snowden was born in North Carolina but at a young age his family moved to central Maryland, a short distance from NSA headquarters at Fort Meade. He dropped out of high school and studied intermittently between 1999 and 2005 at a community college. Snowden completed a GED but did not receive a college degree. In 2004 he enlisted in the army reserve as a special forces candidate, but he was discharged four months later. In 2005 he worked as a security guard at the Center for Advanced Study of Language, a University of Maryland research facility affiliated with the NSA. Despite a relative lack of formal education and training, Snowden demonstrated an aptitude with computers, and he was hired by the Central Intelligence Agency in 2006. He was given a top secret clearance and in 2007 was posted to Geneva, where he worked as a network security technician under a diplomatic cover. Snowden left the CIA for the NSA in 2009, there he worked as a private contractor for the companies Dell and Booz Allen Hamilton. During this time, he began gathering information on a number of NSA activities—most notably, secret surveillance programs that he believed were overly broad in size and scope. In May 2013 Snowden requested a medical leave of absence and flew to Hong Kong, where during the following month he conducted a series of interviews with journalists from the newspaper The Guardian. Among the NSA secrets leaked by Snowden was a court order that compelled telecommunications company Verizon to turn over metadata (such as numbers dialed and duration of calls) for millions of its subscribers. Snowden also disclosed the existence of PRISM, a data-mining program that reportedly gave the NSA, the Federal Bureau of Investigation, and the Government Communications Headquarters—Britain’s NSA equivalent—“direct access” to the servers of such Internet giants as Google, Facebook, Microsoft, and Apple. On June 9, 2013, days after stories were initially published in The Guardian and The Washington Post without revealing the identity of their source, Snowden came forward, stating that he felt no need to hide because he had done nothing wrong. In a subsequent interview with the South China Morning Post, he claimed that the NSA had been hacking into Chinese computers since 2009 and that he had taken a job with Booz Allen Hamilton expressly to obtain information about secret NSA activities. The U.S. charged Snowden with espionage on June 14, and Justice Department officials, including Attorney General Eric Holder, began negotiating with authorities in Hong Kong in an attempt to initiate extradition procedures. The Hong Kong government declined to act, and Snowden, with the assistance of the media organization WikiLeaks, flew to Moscow, where his exact whereabouts became the source of intense speculation. Russian Pres. Vladimir Putin confirmed that Snowden, whose passport had been revoked by the U.S., remained within the confines of the international transit zone of Moscow’s Sheremetyevo airport. Putin resolutely stated that Russia would take no part in his extradition to the United States, and Snowden applied for asylum in some 20 countries, including Russia. Putin also made clear that he did not wish for Snowden’s presence to damage relations with the United States, and he said that if Snowden wished to remain in Russia, “he must stop his work aimed at bringing harm to our American partners.” After having spent more than a month in the Sheremetyevo transit zone, Snowden was granted temporary refugee status by Russia, and he left the airport in the company of a WikiLeaks staffer. Although U.S. Pres. Barack Obama was critical of Snowden’s methods, in August 2013 he announced the creation of an independent panel to examine the U.S. government’s surveillance practices. That panel’s findings, published in December 2013, recommended that the mass collection of telephone records be suspended and advised greater oversight of sensitive programs, such as those targeting friendly foreign leaders. Obama acted on a number of these suggestions and recommended congressional review of others, but the role of the NSA and its data-collection efforts remained a bone of contention between the intelligence community and privacy advocates. In April 2014 The Guardian U.S. and The Washington Post were awarded the Pulitzer Prize for public service for their roles in reporting on the NSA leaks. Snowden characterized the award as “a vindication” of his efforts to bring the secret surveillance programs to light. In August 2014, as Snowden’s grant of temporary asylum expired, the Russian government awarded him a three-year residence permit (effective August 1), which would allow him to leave the country for up to three months. He was also granted the opportunity to request an extension of that permit and, after five years of residence, to apply for Russian citizenship should he choose to do so.Snowden is the subject of two major films - Citizenfour, a documentary which won the Academy 2015 Award for Best Documentary Feature and the upcoming film, Snowden a biographical political thriller based on the book, The Snowden Files by Luke Harding and Time of the Octopus by Anatoly Kucherena. Snowden is being produced and directed by Academy Award-winner Oliver Stone and will be released in early 2016.
 
Topics: • Mass Surveillance, Secrecy & Democracy: When Data Collection Becomes a Threat to Free Societies • Restoring Trust: How To Solve The Next Generation of Privacy & Security Dilemmas • National Security Agency or National Surveillance Agency: Our Cyber Defenses Examined

 



Keynote speaker

Kevin Fielder

CISO, JUST EAT

Kevin is an innovative and dynamic security professional, with a track record and genuine passion for driving change by successfully engaging with all levels of the business.
He is a determined individual with proven ability to provide security insights to the business, in their language. These insights have gained board buy in for delivering security strategy aligned to key business goals. This is achieved by understanding the need to drive change through people, process and technology, rather than focusing exclusively on any one area.
Kevin takes pride in being a highly articulate, motivational and persuasive team-builder, with a strategic outlook and the ability to engage with and communicate innovative and effective security solutions to all levels of management.
Along with a proven ability to translate security into business language and articulate the business benefits Kevin is passionate about leading security innovations and making security a key part of the business proposition to its customers. Security should be made a key differentiator to drive sales and customer retention, not just a cost centre;  It's about doing the right thing and being a transparent and trusted partner!

 

Talk to him about security automation, putting the sec into devops, cultural change, or any other security areas that interest you.



Keynote speaker

Brett Johnson

The Original Internet Godfather,

Former United States Most Wanted, Brett “GOllumfun” Johnson, referred to by the United States Secret Service as “The Original Internet Godfather” has been a central figure in the cybercrime world for almost 20 years. Mr Johnson built and was leader of ShadowCrew, the precursor to today’s darknet markets. He was instrumental in developing many areas of online fraud while helping design, implement, and refine modern Identity Theft, Account Take Over Fraud, Card Not Present Fraud, IRS Tax Fraud, and countless other social engineering attacks, breaches, and hacking operations.
Upon his capture, the United States Secret Service hired Mr Johnson to work as a consultant and informant. Johnson worked with the Secret Service for several months before going on a cross country crime spree, being placed on the US Most Wanted List, being captured again, sent to prison, escaping prison, being captured yet again, and finally accepting responsibility for his actions.
Today, Brett works as a security consultant and public speaker. He has worked with groups such as the FBI, Microsoft, eMailage, NextCaller,IDology, AARP, BBWest, TIB, The ACFE, The Card Not Present Group, The Identity Theft Resource Council, PRO, Universities, and many others.
Brett has been featured on numerous media outlets, most recently NBC, CNN Money, ArsTechnica, The Independent, RT TV, and more.
Mr. Johnson can be contacted via www.anglerphish.com



Speaker

Jenny Radcliffe

“The People Hacker”,

Jenny Radcliffe  - aka “The People Hacker” - is a force to be reckoned with. She can diffuse a crisis situation, talk her way into a secure building and spot a psychopath at a hundred paces. She has been called a mind reader and a ‘human lie detector’, and likened to a Jedi Knight.

In reality, she is an expert in Social Engineering (the human element of security), negotiations, non-verbal communication and deception, using her skills to help clients from corporations and law enforcement, to poker players, politicians and the security industry.

Jenny speaks, consults and trains people in the skills of “people hacking” and explains how “Social Engineering” using psychological methods can be a huge threat to organisations of all sizes.  She reveals how that same knowledge is a valuable tool for security professionals of all types in the prevention of these attacks, scams and cons of all kinds.

Using a mixture of scams, psychological tactics, advanced profiling and non verbal communication skills, Jenny highlights how criminals, special interest groups  and others with mal-intent, can talk or trick their way into gaining access to  personnel, buildings and confidential information.

Using a blend of anecdotes, science and humour, Jenny is an exceptional and highly impactful speaker.  A regular keynote at major security events (Infosec, Rant, DISA, Nordic IT Security, ICS2, Trend Micro, Cisco, NTT, Bright talk, Cyber Security Week) and multiple TEDx contributor, Jenny has been a guest expert on security, scams and social engineering for various television and radio shows as well as online media.

Jenny is also the host of the podcast “The Human Factor” interviewing Industry Leaders, Bloggers, experts and fellow Social Engineers, about the human factor of security.



Seminar speaker

David Emm

Senior Security Researcher, Kaspersky

David joined Kaspersky Lab in 2004. He is a member of the company's Global Research and Analysis Team and has worked in the anti-malware industry since 1990 in a variety of roles, including that of Senior Technology Consultant at Dr Solomon's Software, and Systems Engineer and Product Manager at McAfee.

In his current role, David regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable advisor on all aspects of online security.

David is regularly mentioned in national print press as a cyber-security expert and has a wealth of experience in being filmed for such programmes as Good Morning Britain and BBC News.



Seminar speaker

Tom Wyatt

Senior Cyber Security Analyst, Bulletproof

The live hack will be presented by Tom Wyatt, a cyber security researcher and expert penetration tester with over a decade of experience in the industry. Having worked with companies across a variety of sectors, Tom has a unique insight, in his research he’s uncovered and reported numerous security vulnerabilities, including leading UK telecoms providers and US Internet search organisations.



Seminar speaker

Ian Evans

Managing Director for EMEA, OneTrust

Ian Evans serves as Managing Director for EMEA at OneTrust, a global leader in privacy management software which helps organizations operationalize data privacy compliance and Privacy by Design. Evans is a diversified senior executive with deep experience in data privacy and CRM technology applications and services.  He brings over 20 years of software industry experience to OneTrust as well as 10 years in direct and channel sales.  In his role, Evans supports thousands of global brands across the European, Middle Eastern, and African regions, leading the delivery of technology solutions to secure and privatize customer and employee personal information ahead of impending privacy regulations. Prior to OneTrust, Evans served as Vice President and Managing Director for EMEA at AirWatch (acq. by VMware in 2014 for $1.54B).  AirWatch now serves more than 20,000 global customers and is recognized as the undisputed market leader in enterprise mobility management.



Speaker

Dr Jamie Graves

CEO & Founder , ZoneFox

Jamie is a data security and enterprise software entrepreneur and is the CEO at ZoneFox. He attended the prestigious Ignite course at Cambridge University’s Judge Business School, and the Entrepreneur Development Programme at MIT. 

Jamie has a PhD in Computer Science, extensive security and digital forensics experience and was recently recognised as the 'Champion of Champions' at the inaugural Scottish Cyber Security awards for his contribution to the industry. 

ZoneFox protects business-critical assets; data and IP and has a proven track record protecting reputation, sales revenue, and competitive advantage for its growing client base.



Seminar speaker

Alex Bryson

Pre Sales Technical Engineer, Eset UK

Alex Bryson is a Technical Pre-sales Engineer at ESET UK. He specialises in listening to clients security needs and recommending the perfect software or hardware solutions, hosting seminars and webinars about big industry issues and ESET’s IT security solutions and providing support to ESET’s client base. He’s developed these skills over a lengthy career in IT, working at IBM, Zurich Insurance, Abbey Life and Cannon Technologies.



Seminar speaker


Seminar speaker

James Chappell

CTO & Co-Founder, Digital Shadows

James has over sixteen years’ experience of technical information security acting as an advisor to large private sector and government organisations. Much of his work has involved counteracting the growth of crime and fraud in computer networks and developing effective ways of measure and measuring the information security big picture.



Keynote speaker

Darren Thomson

CTO & Vice President, EMEA Region , Symantec

Darren Thomson is CTO & Vice President for the EMEA Region at Symantec, responsible for delivering technical strategy for customers and partners across the region. Darren heads the CTO office, driving the liaison between the global Research Labs, Symantec Ventures and the field organisation in EMEA. Since joining Symantec in July 2003, Darren has led various groups including global services practices covering Business Continuity Management, Storage & Data Management and Cloud Computing. He also led Symantec’s marketing strategy across the EMEA region. Prior to joining Symantec, Darren was Group Technical Strategist of The Morse Group, a pan-European systems integrator focused on the design and implementation of critical I.T. systems in the Financial Services, Telco and Media sectors. Darren’s background includes software engineering, hardware design and consulting. He is qualified in ITIL, CoBIT, Management of Risk (MoR), CISSP and Social Psychology. He is a regular contributor to various publications, podcasts, television and radio programmes across the region, and a published writer. His latest works include a book on “Delivery Utility Computing: Business Driven IT Optimization” (ISBN 0-470-01576-4). Darren also serves as a Non-Executive Director on the board of TeenTech to promote STEM fields in schools and attracting more women to the security industry.



Seminar speaker

Steven Broadwell

Senior Principal Security Engineer, Symantec

Steve is a Senior Principal Security Engineer at Symantec who, as a subject matter expert regularly engages with large global companies to deliver technical security briefings on threat and information protection throughout the Cyber landscape. He has over 19 years’ experience in supporting, securing, designing and creating successful solutions that deliver value to customers in different industries throughout the world.



Speaker

Robin Smith

Head of IT Security, South Yorkshire NHS Trust

Robin Smith is an experienced information and privacy professional, working across UK law enforcement and NHS during the last fifteen years to deliver transformation programmes for corporate information services. He is the author of four books on an array of topics including risk management, lean cyber strategies and improving data analytics. Robin’s research is focusing on cyber security futures and he is set to publish ‘How to Combat the Coming Cyber Crime Wave’ in 2018. He is also currently working on a feature documentary tracking the birth and ascension of the cybernetics movement in the post war era.



Speaker

Barry Scott

CTO – EMEA, Centrify

Centrify’s Barry Scott has over 25 years of UNIX, Windows and Linux experience working for many major organisations in various Infrastructure Operations and Architecture roles, across different industry verticals. For the past 12 years, Barry has been helping organisations manage their Identity Management and Auditing challenges, focusing on security, regulatory compliance and operational efficiency, especially using “AD bridge" technology. Barry's current role is focused around enabling Centrify customers to use infrastructure they already own – Microsoft's Active Directory – to control, secure and audit heterogeneous systems, mobile devices and applications, and also providing them a unified identity service across data centre, cloud and mobile using Centrify's on-premises and Cloud-based solutions.



Seminar speaker

Damian Saunders

Director of Software Composition , Synopsy

“Damian Saunders has a twenty-five year career spanning both the financial services and technology sectors. Specialising in enterprise cyber-security in recent years, he has worked mostly with early-phase technology in areas such as cloud computing, network virtualisation and open source security. As Director of Software Composition Analysis at Synopsys, he runs a business dedicated to helping European organisations better understand their use of public domain software and how to manage its attendant risks. Damian is an active blogger, industry commentator, oceanic yachtsman, vintage guitar collector, and a fiercely proud Cornishman.”