London, 27 - 28 March 2018

Schedule

Create your personal agenda –check the favourite icon

Mar 2709:00
Conference pass

Keynote address: the future of cyber security and the information race

Keynotes
  • Current cyber security threats: How do they manifest, spread and how can they be contained?
  • How can we protect our most valuable infrastructure assets?
  • Winning the information security race: competition with foreign states and other actors
Mar 2709:20
Conference pass

The Internet of Things: what do we stand to gain and lose?

Keynotes
  • The IoT will bring many advantages to businesses: un-paralleled customer connectivity, brand new business models, agile working
  • What are the costs associated with these sweeping changes to the way businesses, homes and people connect?
  • Is our national cyber security ready for the Internet of Things?
Johan Vallin, Global Head of Data Science, Electrolux
Mar 2709:40
Conference pass

Cyber Risk Decision Making: The right investments to reduce risk

Keynotes
  • Which cyber technologies are worth the investment?
  • How can you demonstrate ROI to your board?
  • How should you explain your cyber security risk posture to your stakeholders?
  • What do investors want to know about your cyber security processes?
Mar 2711:20
Conference pass

Staying competitive in a world of ever increasing cyber risk

Keynotes
  • Aligning business and security imperatives
  • Do you have a cutting-edge and comprehensive Information Security plan?
  • Making use of your best assets: employees, vendors and security solutions
Mar 2711:40
Conference pass

Sponsor Presentation: Understanding the threat and building an effective cyber operations team to respond

Keynotes
  • your security mechanisms are built for the untrusted hacker and not the trusted insider; how can you redress the balance and understand your insider risk?
  • A lesson in the warning signs for abnormal behavior
  • Assess your privileged account security solutions
Mar 2712:00
Conference pass

Third Party Risk Management: the weakest link

Keynotes
  • Companies must carefully scrutinize and examine potential partners for cyber security vulnerabilities
  • To fail to effectively manage third parties exposes a company to criminal liability
  • How can you ensure your supply chain doesn’t leave you vulnerable to an attack?
Mar 2712:20
Conference pass

Roundtable discussions

Keynotes
Planning ahead: in the event of an attack, what decisions will you have to make?

The Future of blockchain and digital currency

Managing your insider threat

Measuring the effectiveness of information security

How do you meet the expectations of a modern workforce and keep the enterprise network secure?

The Internet of Things: managing connected devices and vehicles

Beyond awareness: making employees do cyber security

Are our systems too complex?
Mar 2714:20
Conference pass

The evolving threat landscape: what should your organisation be doing now to prepare?

Stream One
  • As threats become more sophisticated how can your organization prepare?
  • A diverse set of tools – people, technology, ideas – will enable you to survive future attacks
  • Should we have gradual evolution or radical change?
Royce Curtin, Managing Director of Global Intelligence, Barclays Bank Plc
Mar 2714:20
Conference pass

Cyber security strategy is now your business strategy: adopting new technology in line with customer expectations without leaving your enterprise vulnerable

Stream Two
  • Doing business and staying competitive in a world of ever increasing cyber risk
  • Trust as the new market differentiator
Jennifer Rigby, CIO, Lloyd'S Of London Ltd
Mar 2714:20
Conference pass

The UAE: Current challenges and future opportunities for Cyber Security

Stream Three
  • How has the Western Region Municipality, Abu Dhabi pursued a secure digital transformation?
  • Lessons learned so far and roadmap for the future
  • Reducing the gender gap in IT
Irene Corpuz, Section Head Of Planning And Information Technology Security, Western Region Municipality
Mar 2714:20
Conference pass

If we can’t protect our data, can we make it valueless?

Stream Four
  • Strategies for data protection in the face of ever-increasing ransomware and data theft
  • How much is data worth to a hacker?
  • Can you anonymize customer data to make it valueless? Will that undermine your business objectives?
Andreas Bergqvist, Head of Group Information Security, Svenska Handelsbanken
Mar 2714:40
Conference pass

Lessons learned from high profile attacks

Stream One
  • What separated the winners and losers in recent attacks?
  • How can you raise your cyber security protocols to match the survivors?
Jaya Baloo, Chief Information Security Officer, Kpn Telecom
Mar 2714:40
Conference pass

What motivates hackers? understanding the profile of a cyber attacker to inform your security defenses

Stream Two
  • Understanding the profile of your ‘average’ attacker
  • What motivates hackers to dump data publicly and how do they do it?
  • Using this knowledge to inform our cyber security defenses
  • Can you ever be fully protected?
Mar 2714:40
Conference pass

How Israel became a world-leader on cyber security

Stream Three
  • How Israel achieved its cyber security success?
  • Policy and Practice which supports or inhibits cyber innovation.
  • Building eco-system and collaboration private enterprise with public sector and academia
  • Which technologies will propel Israel’s cyber success?
  • What are the roadblocks to innovation and how can they be overcome?
Avi Shavit, Head of Cyber & Homeland Security Sector, Israel Innovation Authority
Mar 2714:40
Conference pass

Managing access to enterprise data: digital identities, threats in privileged pathways and end point protection

Stream Four
  • Authentication trends and standards
  • Thinking beyond passwords
  • Privileged account management
  • Managing user access in a multi-cloud enterprise
  • Combatting access governance blind spots
  • Stolen credential attacks can completely nullify all your security efforts, how can you respond?
Paul Jay, Global Head of Information & Cyber Security, Meggitt
Mar 2715:00
Conference pass

Sponsor Presentation: Reserved for Gold Sponsor Protecting your data with blockchain as a service

Stream Four
  • While a deluge of data in recent years can deliver valuable insights and analytics to help organizations innovate, this also presents new security challenges and attack vectors
  • Innovations in cryptography such as Format-Preserving Encryption (FPE) are enabling organizations to adopt a "data-centric" posture to protect this data
  • Gain insights into the technologies and best practices adopted by firms to deploy data protection solutions to protect their most valuable assets
Mar 2715:00
Conference pass

Sponsor Presentation: Reserved for Gold Sponsor which approach works best – offence or defence?

Stream One
  • Understand why your company is being targeted
  • How honeynets can be used to proactively seek out attacks with near zero false positives
  • Adopting the right approach to cyber security to protect your data and prevent attacks
planning for the worst-case scenario
Mar 2715:00
Conference pass

Sponsor presentation: Reserved for Gold Sponsor Using Machine Learning to Automate Advanced Cyber Defense

Stream Two
  • How machine learning and mathematics can automate advanced threat detection within networks
  • Why self-learning technology, known as the ‘immune system’ approach, detects threats early without using rules or signatures
  • How to gain 100% visibility across physical, virtual and cloud environments, including third-party cloud services and SaaS
Mar 2715:20
Conference pass

Panel Discussion the modern cyber security breach: how can you function offline and how can you get your business operational as quickly as possible?

Stream One
  • Grasping the threat of real world physical damage from cyber
  • Going beyond technology domains to crafting a human response to crisis
  • Defending the physical and procedural space
  • Which non-technology means should we be investing in?
Mar 2715:20
Conference pass

Panel Discussion Digital transformation and cyber security: how can we safely enable the business through technology?

Stream Two
  • Digital innovation - breaking from legacy IT systems and embracing new technology - is a key driver of business growth and enterprise value
  • How can companies embrace trends like AI, machine learning, blockchain, apps, without exposing themselves to cyber security risks?
  • Can cyber security be built into the digital transformation process?
Mar 2715:20
Conference pass

Panel Discussion GDPR – the consequences both intended and unintended

Stream Three
  • How will the GDPR really affect you?
  • As the attack economy shifts, are you ready for the fallout?
Michael Colao, Head of UK Security, AXA UK
 
Urmas Aamisepp, Chief Information Security Officer, Clas Ohlson
 
Michael Dierickx, Director of security engineering and information security officer, Panasonic Avionics
 
Jon Baines, Data Protection Officer (and GDPR Readiness), Network Rail
 
Mar 2716:20
Conference pass

Platinum Sponsorship Slot: Beating cybercrime: global trends, predictions & the lessons learnt in responding to the most advanced attacks • The current threat landscape and the geopolitical context o

Keynotes
  • The current threat landscape and the geopolitical context of cyber security
  • A look to the year ahead; what threats will you all be facing this time next year?
  • Which technologies will be dominating the cyber security space, and are there any that really merit the hype?
Mar 2716:40
Conference pass

INTERNATIONAL VOICES PANEL

Keynotes
Sir Iain Lobban, former Director of GCHQ, will host an exclusive panel of former and active government officials from around the world.  Held under Chatham House Rule, the panelists will speak off the record about their cyber security priorities and the future of cyber legislation in their respective countries.
 
Richard Ledgett, former Deputy Director, NSA
Siim Sikkut, National ICT Policy Adviser, Government Office of Estonia
Thomas Ahrenkiel, The Permanent Secretary of the Ministry of Defence, Denmark
Alastair MacGibbon, Special Adviser to the Prime Minister on Cyber Security, Government of Australia

Create your personal agenda –check the favourite icon

Mar 2809:10
Conference pass

Insights from Insurance

Keynotes
  • Understand your exposure to cyber risk from an insurance point of view
  • Which aspects of cybercrime can be insured against and what can’t?
  • Results of the Marsh UK Survey: how involved are boards in combatting cyber attacks and responding to incidents?
Mark Weil, CEO, Marsh & Co. Insurance Brokers Ltd.
Mar 2809:30
Conference pass

Sponsor presentation: The biggest mistake companies make with data security is...

Keynotes
  • Not aligning security with business goals
  • Is your security team good at considering how your IT projects impact overall business goals and revenue?
  • Learn to position yourself as a business enabler not an expense
Mar 2809:50
Conference pass

Healthcare under attack: what can we learn from this highly targeted industry about digital transformation and resilience in the face of attack?

Keynotes
  • Isolating infected parts of the network and containing the threat
  • Ransomware - to pay or not to pay?
  • Reducing the costs incurred and the data lost, and preventing life threatening disruption to services
Rob Shaw, Chief Executive, NHS Digital
Mar 2810:10
Conference pass

Disruptive technology to solve cyber security problems in government and industry: AI and Machine learning

Keynotes
  • How will the next wave of disruptive technology affect the cyber security industry ?
  • Cutting through the hype surrounding AI and Machine learning
Mark Testoni, CEO, SAP NS2
Mar 2810:30
Conference pass

The inside story of cybercrime: a view from the front line of international cyber policing

Keynotes
  • Are cyber attacks on your enterprise a result of espionage, organised crime or a random attack?
  • What have we learned from high-profile attacks in the last year and how can you adjust your security processes accordingly?
  • International collaboration models and open source platforms to keep you ahead of the threat
Mar 2811:40
Conference pass

What can retailers and the financial sector do to combat fraud and cybercrime?

Stream Three
  • Could FIs do more to combat cybercrime through ‘Know your customer’ processes?
  • How can retailers work with law enforcement?
  • A perspective from ex-law enforcement turned security director
Mike Wyeth, Security Advisor to the Board, Shop Direct Group
Mar 2811:40
Conference pass

Deception-based cyber security: from reactionary to proactive defence

Stream Four
  • Using honey nets and honey pots to lure hackers into your network
  • Why would you want to?!
  • Shifting to a proactive defense strategy
Russell Wing, Head of Information Security, London Metal Exchange
Mar 2811:40
Conference pass

What does the board want to hear from their CISO?

Stream One
  • With only 15% of boards satisfied with the information they are getting from management, how can you best present your board report?
  • Where might you be missing the mark?
  • How can you communicate in a way that is actionable and useful?
Tim Neill, Group Head, Crisis Management & IT Risk, London Stock Exchange Group
Mar 2811:40
Conference pass

How does King manage its attack surface with over 1 billion users?

Stream Two
  • How can your Development team build security into your applications?
  • Is it better to create these solutions in-house?
  • Tips for scaling your cyber security processes and protocols as your business booms
Giacomo Collini, Director of Information Security, King
Mar 2812:00
Conference pass

IT is the business – rethinking the role of the IT team

Stream One
  • Different circumstances call for different leadership skills
  • The current cyber climate demands CIOs, CISOs and CTOs with a strong grasp on business strategy and value-creation
  • Cyber security is no longer considered a solely ‘operational’ risk and IT professionals are moving to the c-suite
  • Is your IT team prepared for their new responsibilities? Are you?
Mieke Kooij, Security Director, The Trainline
Mar 2812:00
Conference pass

Standards-based approach to cyber security strategy

Stream Two
  • What does a sophisticated attack look like – a brief history of cyber attacks
  • Cyber Security and standards – what approaches are available
  • ISO 27932 and the NIST Framework – what approach did we take
  • Detect, Respond, Recover – cyber-attacks and incident response
  • Strategy execution – Benchmarking & tracking progress.
Bruce Hopkins, Head of IT Security, Risk and Compliance, Daa International
Mar 2812:00
Conference pass

Anti-fraud and information security functions

Stream Three
  • New methods for conducting fraud-related inquiries and investigations
  • Reallocating resources to achieve your goals
  • How can we best maintain anti-fraud programmes and related plans?
Hem Pant, Chief Information Security Officer, I.N.G. Wholesale Bank
Mar 2812:00
Conference pass

Combatting the Insider Cyber Threat using AI

Stream Four
  • how are bug bounty programmes being used to expose vulnerabilities in a controlled way?
  • Can you use AI to inform your cyber defences?
James Bynoe, eCG Head of Information Security & Compliance, Ebay
Mar 2812:20
Conference pass

Panel: The threat from Artificial Intelligence – who is right, Elon or Mark?

Stream Four
  • Mark Zuckerberg argues that AI is benign while Elon Musk has said “competition for AI superiority at national level most likely cause WW3”
  • Should we embrace new smart automation technology?
  • What place will it have in cyber security?
 
George Zarkadakis, Digital Lead, Willis Towers Watson
James Bynoe, Head of Information Security and Compliance, eBay
 
Mar 2812:20
Conference pass

Panel: The emergence of the “BISO”

Stream One
Panel: The emergence of the “BISO”
  • Implement an information security strategy that supports businesses goals and objectives
  • How much should CISOs understand finance?
  • Collaborate with security architects to discuss solutions with the business strategy in mind
  • Facilitate cross-department engagement to identify projects that enable business development while ensuring the necessary security controls are in place
Mike Pitman, BISO, Head of Information Security, John Lewis
 
Rich Baich, CISO, Wells Fargo
 
Simon Jenner, CISO, Booking.com
 
Tarun Samtani, CISO, Findel PLC
 
Jean-Francois Simons, CISO, Brussels Airlines
Mar 2812:20
Conference pass

Panel: what is the future of mobile and app security?

Stream Two
  • Mobile-readiness in the artificial intelligence age
  • Customer interaction at multiple touchpoints
  • The human side of mobile channels
 
Giacomo Collini, Director of Information Security, King
 
Greg Hawkins, CTO, Starling bank
 
Emilio Vacca, Director, Mobile channel, Telegraph Media Group
Mar 2812:20
Conference pass

How have breaches changed in scope, motivation and cost?

Stream Three
  • Cyber security breaches today can see 5% of a company’s GDP wiped overnight
  • How have cyber security breaches changed historically?
  • What will the future hold?
 
Maria Vello, COO, Cyber Defence Alliance
 
Stefano Ciminelli, Deputy CISO, Swift
 
David Pope, CISO, DVLA
 
Mike Wyeth, Group Security Director, Shopdirect
 
Bruno Kalhoj, Head of Division, Security and Safety Division, Directorate General Administration, European Central Bank
 
Mar 2814:00
Conference pass

Lessons Learned from a legacy IT overhaul at the Student Loans Company

Stream One
  • SLC began their IT overhaul two years ago
  • What lessons were learned along the way and what advice would I give to IT professionals grappling with legacy IT transformation issues?
Alun McGlinchy, Chief Information Technology Security Officer, Student Loans Company Ltd
Mar 2814:00
Conference pass

The Future of the IoT and connected devices

Stream Two
  • The connected world presents both challenges and opportunities for cyber security
  • Panasonic Avionics deals with fleets of planes flying all around the world, each connected to the internet
  • How do they manage their risk in such a connected and high-stakes environment?
Michael Dierickx, Director of security engineering and information security officer, Panasonic Avionics
Mar 2814:00
Conference pass

Social engineering tactics

Stream Three
  • SEBs program for increasing awareness among SEB client executives and our customers
  • Why are people so susceptible to social engineering attacks?
  • Why are hackers sometimes better able to engage your workforce than you are?
Jan Persson, Head of Global Security, S.E.B.
Mar 2814:20
Conference pass

Panel: Should you bring your SOC in-house?

Stream One
 
  • How should high value assets be monitored, and by whom?
  • Do the costs of building up an in-house security operations center outweigh the benefits?
  • Which other traditionally externally outsourced IT tasks should be brought in-house?
  • Which elements of your SOC should you outsource?
  • What will the next generation of SOCs look like?
Jonathan Lloyd-White, CISO, SMBC EMEA
 
Mar 2814:20
Conference pass

Panel: the future of encryption

Stream Two
  • Will technology companies have to do more to support counter terrorism operations?
  • Is encryption as secure as we think?
  • Is it as anonymous as we think?
  • Is quantum encryption coming sooner than we think?
 
Alun McGlinchy, Chief Information Technology Security Officer, Student Loans Company
 
Mar 2814:20
Conference pass

Panel: Cyber culture eats security strategy for breakfast

Stream Three
  • With the best intentions, your cyber security culture can undermine your security strategy
  • How to cultivate the best cyber security culture for your enterprise
 
George Zarkadakis, Digital Lead, Willis Towers Watson
Simon Jenner, CISO, Booking.com
Jonathan Kidd, CISO, Hargreaves Lansdown
 
Mar 2814:40
Conference pass

When Security Tools Collide: testing the real-world usefulness of two services

Keynotes

What’s the best way to test out a new security service? We decided it might be interesting to try testing two services at once – not in a traditional side-by-side bake-off, but testing them against each other, pitting a penetration testing service against a web application defense service. The results were interesting, illuminating, and helped us make decisions about the real-world usefulness of both services. 
 
David Lenoe, Director for Secure Software Engineering, Adobe Systems
Mar 2815:00
Conference pass

How do you prevent a breach from evolving into a business-crippling attack

Keynotes
  • Companies often fail to understand the true threat against their employees, suppliers and ultimately, their data
  • Does your board view data security as a "business problem" and not just an "IT problem"?
  • Moving beyond legacy IT solutions, from obsolete ‘perimeter protection' strategy vs. ‘data-centric' strategy
  • Staying on top of evolving cyber threat intelligence is key to strengthening your data security strategy
Simon Jenner, CISO, Booking.com
Mar 2815:20
Conference pass

How can we close the intelligence gap?

Keynotes
  • Encouraging knowledge sharing between industry, academia and public sector
  • Overcoming the main collaboration hurdles
  • Successful partnerships
  • creating a ‘public sector alumni’ program in the private sector, and using these networks to build a collaborative framework
Martyn Booth, Director of Information Security, Euromoney
last published: 13/Nov/17 09:05 GMT