2018 AGENDA OVERVIEW

 
 

 

Day 1: Tuesday 27 March 2018

 
08.00  Registration
 

KNOW YOUR ENEMY

 
08.50 Welcome
 
08.55 Chaiperson's opening remarks
 
09.00 Keynote address: the future of cyber security and the information race 
Chris Inglis, Former Deputy Director,  National Security Agency
 
09.40 Cyber risk decision making: The right investments to reduce risk 
Rich Baich, CISO,  Wells Fargo
 
10.00 Premium Presentation Slot: Translating cyber threats into business risk
 
10.20   Speed Networking
 
10.40   Morning break and Exhibition Visit
 
11.20 Staying competitive in a world of ever increasing cyber risk 
Cheri McGuire, CISO,  Standard Chartered
 
11.40 The Friction of Cyber Risk and Third Party Risk Management 
Natasha Meaney, Chief Administrative Officer, Compliance & Operational Risk,  UBS
 
12.00   Roundtable discussions

 

 

ROUNDTABLES

 

Planning ahead: in the event of an attack, what decisions will you have to make?

Facilitator: Even Tvedt, VP Head of Security and Emergency Response, Statkraft
 
How do you meet the expectations of a modern workforce and keep the enterprise network secure?
 
Fscilitator: Tarun Samtani, CISO, Findel PLC

The Future of blockchain and digital currency

Facilitator: Leanne Kemp, CEO, Everledger

 

The Internet of Things: managing connected devices and vehicles
 
Facilitator: Uday Deshpande, CISO, Tata Group

Managing your insider threat

Facilitator: Mo Ahddoud, CISO, SGN
 
 
 
Beyond awareness: making employees do cyber security
 
Facilitator: Jacqueline Johnson, Group Head of IT Security, Nordea Bank
 

Measuring the effectiveness of information security

Facilitator: Phil Cracknell, CISO, Homeserve
 
 
Are our systems too complex?
 
Facilitator: Andrew Bochman, Cyber & Energy Security Strategist, National & Homeland Security, Idaho National Laboratory
 

 

12.50  Networking lunch & exhibition visit  

 

 

 STREAM ONE

SURVIVING SOPHISTICATED ATTACKS

14.40   The evolving threat landscape: what should your organisation be doing now to prepare?
Royce Curtin, Managing Director of Global Intelligence, Barclays
 

15.00  Lessons learned from high profile attacks

Jaya Baloo, CISO, KPN Telecom
 
15:20 Panel Discussion: How can you function offline and how can you get your business operational as quickly as possible? 
 
Rui Pedro Silva, Head of Europe IT, DAMCO
Tim Neill, Group Head, Crisis Management and IT Risk, London Stock Exchange Group
Patrick De Bruycker, Global IT Service Continuity Manager, British American Tobacco

 STREAM TWO

CYBER SECURITY AS A BUSINESS DIFFERENTIATOR

14.40 Cyber security strategy is now your business strategy
Jennifer Rigby, CIO, Lloyd’s of London
 
15.00 What motivates hackers? understanding the profile of a cyber attacker to inform your security defenses
Jamie Shea, Deputy Assistant Secretary, N.A.T.O
 
15.20  Panel Discussion: Digital transformation and cyber security - how can we safely enable the business through technology?
Lee Barney, Head of Information Security, Marks and Spencer
Cristian Goiceanu, Chief Security Officer, Banca Comerciala Romana- Erste Bank
Bob Brown, CIO, Manchester City Council
Simon Jenner, CISO, Booking.com
Andrew Bochman, Cyber & Energy Security Strategist
National & Homeland Security, Idaho National Laboratory

 STREAM THREE

CYBER SECURITY AROUND THE WORLD

14.40 The UAE: Current challenges and future opportunities for Cyber Security

Irene Corpuz, Head of the IT Security Section & acting CISO, Western Region Municipality, Abu Dhabi
 
15.00  How Israel became a world-leader on cyber security

Avi Shavit, Head of Cyber & Homeland Security Sector at Chief Scientist Office, C hief Scientist Office, Israel

 
15.20  Panel Discussion: How does regulation differ across the world and how can we harmonise our cyber security best practice?
Claudia Natanson, Director for Security and Resilience, Department for Work and Pension
Belisario Contreras, Cyber Security Program Manager, Organization of American States
Helen Rabe, Head of Security, Costa

 STREAM FOUR

DATA SECURITY

14.40 If we can’t protect our data, can we make it valueless?

Andreas Bergqvist, Group Head of Information Security, Handelsbanken
 
15.00  Managing access to enterprise data: digital identities, threats in privileged pathways and end point protection
Paul Jay, Global Head of Information and Cyber Security, Meggitt
 
15.20   Panel Discussion: GDPR – the consequences both intended and unintended
Michael Colao, Head of UK Security, AXA UK
Urmas Aamisepp, Chief Information Security Officer, Clas Ohlson
Michael Dierickx, Director of security engineering and information security officer, Panasonic Avionics
Jon Baines, Data Protection Officer (and GDPR Readiness), Network Rail

 

15:50  Afternoon network break
 
16:20 Premium Presentation Slot: Beating cybercrime: global trends, predictions & the lessons learnt in responding to the most advanced attacks
 
16:40 INTERNATIONAL VOICES PANEL
Sir Iain Lobban, former Director of GCHQ, will host an exclusive panel of former and active government officials from around the world.  Held under Chatham House Rule, the panelists will speak off the record about their cyber security priorities and the future of cyber legislation in their respective countries.
Featuring:
Rick Ledgett, Deputy Director, NSA (2014-2017)
Alastair MacGibbon, Special Adviser to the Prime Minister on Cyber Security, Government of Australia
Siim Sikkut, Government CIO of Estonia
Thomas Ahrenkeil, The Permanent Secretary of the Ministry of Defence, Denmark
Senior Representative, National Cyber Security Centre
 
17:25  Chair’s closing remarks

 

 

 

Day 2: Wednesday 28 March 2018

 
09.00 Chairperson’s opening remarks


A CEO PERSPECTIVE

 
9.10 Insights from Insurance 
Mark Weil, CEO,  Marsh UK and Ireland
 
09.30 Premium Presentation Slot: The biggest mistake companies make with data security is...
 
09.50 Healthcare under attack: what can we learn from this highly targeted industry about digital transformation and resilience in the face of attack? 
Rob Shaw, Chief Executive,  NHS Digital
 
10.10 Disruptive technology to solve cyber security problems in government and industry : AI and Machine learning 
Mark Testoni, CEO,  SAP National Security Services
 
10.30 The inside story of cybercrime: a view from the front line of international cyber policing 
Steve Wilson, Head of European Cybercrime Centre,  Europol
 
10.50  Networking coffee break & exhibition visit 

 

 

STREAM ONE

EVOLVING ROLES IN THE C-SUITE
 
11.40 What does the board want to hear from their CISO?  
 
Tim Neill, Group Head, Crisis Management & IT Risk, London Stock Exchange Group
 
12.00  IT is the business – rethinking the role of the IT team
Mieke Kooij, Security Director, The Trainline
 
12.20   Panel: The emergence of the “BISO”
Mike Pitman, BISO, Head of Information Security, John Lewis
Rich Baich, CISO, Wells Fargo
Simon Jenner, CISO, Booking.com
Tarun Samtani, CISO, Findel PLC
Jean-Francois Simons, CISO, Brussels Airlines

 STREAM TWO

MANAGING A BROAD ATTACK SURFACE
 
11.40 How does King manage its attack surface with over 1 billion users?
 
Giacomo Collini, Director of Information Security, King
 
12.00   Standards-based approach to cyber security strategy
Bruce Hopkins, Head of IT Security, Risk and Compliance, daa
 
12.20 Panel: what is the future of mobile and app security?
 
Giacomo Collini, Director of Information Security, King
Greg Hawkins, CTO, Starling bank
Emilio Vacca, Director, Mobile channel, Telegraph Media Group  

STREAM THREE

FRAUD AND CYBERCRIME
 
11.40 What can retailers and the financial sector do to combat fraud and cybercrime?
 
Mike Wyeth, Group Security Director, Shopdirect
 
12.00  Anti-fraud and information security functions
Hem Pant, Global CISO, Wholesale Bank, ING
 
12.20 Panel: How have breaches changed in scope, motivation and cost? 
 
Maria Vello, COO, Cyber Defence Alliance
Stefano Ciminelli, Deputy CISO, Swift
David Pope, CISO, DVLA
Mike Wyeth, Group Security Director, Shopdirect
Bruno Kalhoj, Head of Division, Security and Safety Division, Directorate General Administration, European Central Bank
 
 

STREAM FOUR

NEW WAYS TO TEST SECURITY EFFECTIVENESS
 
11.40 Deception-based cyber security: from reactionary to proactive defence
Russell Wing, Head of Information Security, London Metal Exchange
 
12.00 Combatting the Insider Cyber Threat using AI
James Bynoe, Head of Information Security and Compliance, eBay
 
12.20 Panel: The threat from Artificial Intelligence – who is right, Elon or Mark?
George Zarkadakis, Digital Lead, Willis Towers Watson 
James Bynoe, Head of Information Security and Compliance, eBay

 

12.40  Networking coffee break & exhibition visit  

 

 

  MANAGING LEGACY IT

14.00  Lessons Learned from a legacy IT overhaul at the Student Loans Company
Alun McGlinchy, Chief Information Technology Security Officer, Student Loans Company
 
14.20  Sponsor Presentation: third-party risk management and cyberthreat intelligence
 
14.40   Panel: Should you bring your SOC in-house?
Jonathan Lloyd-White, CISO, SMBC EMEA

  LOOKING TO THE FUTURE

14.00   The Future of the IoT and connected devices
Michael Dierickx, Director of security engineering and information security officer, Panasonic Avionics

 

14.20  Sponsor Presentation: The future of disruptive technology

 

14.40  Panel: the future of encryption

Alun McGlinchy, Chief Information Technology Security Officer, Student Loans Company

  WHERE CULTURE MEETS SECURITY

14.00  Social engineering tactics: how SEB created a phishing awareness programme that works

Jan Persson, Head of Group Security, SEB
 
14.20  Sponsor presentation: Intelligence led analysis: gaining an intelligent picture of securit
 
14.40  Panel: Cyber culture eats security strategy for breakfast
George Zarkadakis, Digital Lead, Willis Towers Watson
Simon Jenner, CISO, Booking.com
Jonathan Kidd, CISO, Hargreaves Lansdown
 

 

15.20     Networking coffee break & exhibition visit
 
16.00 When Security Tools Collide: testing the real-world usefulness of two services 
Dave Lenoe, Director, Product Security,  Adobe
 
16.20 How do you prevent a breach from evolving into a business-crippling attack? 
Simon Jenner, CISO,  Booking.com
 
16.40 How can we close the intelligence gap? 
Muhittin Hasancioglu, Vice President Special Projects,  Shell
 
17.00  Plenary wrap up session

17.20  Chair’s closing remarks and close of conference