2018 Agenda

London, 27 - 28 March 2018

Schedule

Create your personal agenda –check the favourite icon

Mar 2709:00
Conference pass

Keynote address: the future of cyber security and the information race

Keynotes
  • Current cyber security threats: How do they manifest, spread and how can they be contained?
  • How can we protect our most valuable infrastructure assets?
  • Winning the information security race: competition with foreign states and other actors
Mar 2709:20
Conference pass

Securing trust as well as technology – Getting the focus right

Keynotes
  • We focus on securing technology, but have we thought enough about securing trust?
  • How adversaries augment and amplify their objectives through attacking trust as well as technology
  • What can we do at a national, enterprise and business level do to secure trust?
Pete Cooper, Nonresident Senior Fellow at Atlantic Council Cyber Statecraft Initiative, The Atlantic Council
Mar 2709:40
Conference pass

Digital transformation and cyber security: how can we safely enable the business through technology?

Keynotes
  • Digital innovation - breaking from legacy IT systems and embracing new technology - is a key driver of business growth and enterprise value
  • How can companies embrace trends like AI, machine learning, blockchain, apps, without exposing themselves to cyber security risks?
  • Can cyber security be built into the digital transformation process?
Russell Wing, Head of Information Security, London Metal Exchange
Hal Moore, Science & Technology Advisor, Homeland Defense
Ofer Israeli, Chief Executive Officer and Founder, Illusive Networks
Pete Cooper, Nonresident Senior Fellow at Atlantic Council Cyber Statecraft Initiative, The Atlantic Council
Bob Brown, Chief Information Officer, Manchester City Council
Mar 2711:20
Conference pass

Deception-based cyber security: from reactionary to proactive defence

Keynotes
  • Using honey nets and honey pots to lure hackers into your network
  • Why would you want to?!
  • Shifting to a proactive defense strategy
Russell Wing, Head of Information Security, London Metal Exchange
Mar 2711:40
Conference pass

Towards new – and better – models for Cyber Risk Scoring

Keynotes
  • Shifts in the security landscape have created a need for better scoring and evaluation of cyber risk
  • Executives increasingly would like cyber risk to be framed in the context of the better understood models of enterprise risk management
  • A model for dynamic cyber risk scoring which can help optimize security spending and reduce risk
John Loveland, Global Head of Cyber Security Strategy, Verizon Enterprise Solutions
Bryan Sartin, Executive Director Global Security Services, Verizon Enterprise Solutions
Mar 2712:00
Conference pass

Identity access management and challenges with sustaining an adequate control environment

Keynotes
  • Aligning business and security imperatives
  • Do you have a cutting-edge and comprehensive Information Security plan?
  • Making use of your best assets: employees, vendors and security solutions
Gareth Carrigan, Standard Chartered Bank
Mar 2712:20
Conference pass

Roundtable discussions

Keynotes
1) Defence strategies against the ever growing threat of attacks
with Anthony Chadd, Senior Director, EMEA, Neustar

2) Cyber Insurance vs Cyber Assurance: How should you prepare to minimise business impactwith Adam Maskatiya, General Manager, Kaspersky Lab UK & Ireland

3) Strategies for managing the risk of targeted attacks
Attackers taking aim directly at your organization can cause the most damage.
What are the most effective means of detecting “low-and-slow” attacks?
How are organizations minimizing business impact once these attacks occur?
What is the right balance between investment in prevention and detection versus crisis response capabilities?
Ofer Israeli, Chief Executive Officer and Founder, Illusive Networks

4)Verizon Roundtable withBryan Sartin, Executive Director Global Security Services, Verizon Enterprise Solutions

5) Essential components of a vendor risk management program including GDPR withPhilip East, UK Sales Director and Russell Budworth, Regional Manager, UK,BitSight Technologies

6) Skills Diversity with Pete Cooper, Senior Research Fellow, Atlantic Council
Mar 2714:20
Conference pass

The evolving threat landscape: what should your organisation be doing now to prepare?

Stream One
  • As threats become more sophisticated how can your organization prepare?
  • A diverse set of tools – people, technology, ideas – will enable you to survive future attacks
  • Should we have gradual evolution or radical change?
Royce Curtin, Managing Director of Global Intelligence, Barclays Bank Plc
Mar 2714:20
Conference pass

Social engineering tactics

Stream Two
  • SEBs program for increasing awareness among SEB client executives and our customers
  • Why are people so susceptible to social engineering attacks?
  • Why are hackers sometimes better able to engage your workforce than you are?
Jan Persson, Head of Global Security, S.E.B.
Mar 2714:20
Conference pass

Establishing Cyber Security Best Practice

Stream Three
Claudia Natanson, CSO, Department Of Work And Pensions
Mar 2714:20
Conference pass

Kaspersky Lab Workshop: Redefining Enterprise Security in an Era of Digital Transformation

Stream Four - Kaspersky Lab Workshop
In the digital world, effective information security is now a key business success factor. As attackers find new ways to attack digital assets, the ability of the organization to maintain continuity, and the security of the information circulating in it, may be called into question. New attack methods and threat vectors require fundamentally new approaches to corporate protection.
As part of the World Cyber Security Congress in London on March 27, Kaspersky Lab will be conducting a seminar exploring ways to solve the problem of protection in the digital world, where the risks are so high, and where the only sure defense lies a comprehensive security approach.
Join us there to:
  • Find out about the threats organizations like yours are currently facing
  • Learn how to build reliable protection in the era of digital transformation
  • See how leading-edge global corporation has built its security on proven technologies
  • Put your questions to our experts
David Emm, Principal Security Researcher, Global Research & Analysis Team, Kaspersky Lab
Adam Maskatiya, General Manager, Kaspersky Lab UK & Ireland
Mar 2714:40
Conference pass

Human driven data economy: working with multiple identities and identifiers – project IHAN

Stream One
Antti Larsio, Senior Advisor, Sitra
Mar 2714:40
Conference pass

To be finalised

Stream Two
Jennifer Rigby, CIO, Lloyd's Of London
Mar 2714:40
Conference pass

How Israel became a world-leader on cyber security

Stream Three
  • How Israel achieved its cyber security success?
  • Policy and Practice which supports or inhibits cyber innovation.
  • Building eco-system and collaboration private enterprise with public sector and academia
  • Which technologies will propel Israel’s cyber success?
  • What are the roadblocks to innovation and how can they be overcome?
Avi Shavit, Head of Cyber & Homeland Security Sector, Israel Innovation Authority
Mar 2715:00
Conference pass

The future of defence against advanced attackers: how deception technologies will keep your critical assets secured

Stream One
Ofer Israeli, Chief Executive Officer and Founder, Illusive Networks
Mar 2715:00
Conference pass

Best practices for implementing security ratings

Stream Two
Don’t waste time hoping your organisation has adequate security performance. Instead, discover how Security Ratings can reshape your risk management program by identifying, quantifying, and mitigating security risk.

As mitigating third party risk becomes an essential business function across many industries, business relationships will be tested.Organisations must now subscribe to a “trust, but verify” philosophy to ensure their third parties are secure.

Join this session to learn how BitSight Security Ratings can transform your risk management program.
Philip East, UK Sales Director, BitSight Technologies
Mar 2715:20
Conference pass

Security insider: Curiosity killed the cyber attack

Stream One
Les Anderson, CSO, BT
Mar 2716:20
Conference pass

The inside story of cybercrime: a view from the front line of international cyber policing

Keynotes
  • Are cyber attacks on your enterprise a result of espionage, organised crime or a random attack?
  • What have we learned from high-profile attacks in the last year and how can you adjust your security processes accordingly?
  • International collaboration models and open source platforms to keep you ahead of the threat
Mar 2716:40
Conference pass

INTERNATIONAL VOICES PANEL

Keynotes
Sir Iain Lobban, former Director of GCHQ, will host an exclusive panel of former and active government officials from around the world. Held under Chatham House Rule, the panelists will speak off the record about their cyber security priorities and the future of cyber legislation in their respective countries.
Richard Ledgett, former Deputy Director, NSA
Fabio Rugge, Head of the Centre on Cyber Security, Italian Institute for International Political Studies
Thomas Lund Sørensen, Danish Centre for Cyber Security
Senior Speaker, National Cyber Security Centre
Uku Särekanno, Estonian Information System Authority

Create your personal agenda –check the favourite icon

Mar 2809:10
Conference pass

Insights from Insurance

Keynotes
  • Understand your exposure to cyber risk from an insurance point of view
  • Which aspects of cybercrime can be insured against and what can’t?
  • Results of the Marsh UK Survey: how involved are boards in combatting cyber attacks and responding to incidents?
Mar 2809:30
Conference pass

Fragile cyberworld - what to expect in 2018?

Keynotes
The world is already fragmented, and becoming a lot more so; the cyberworld – especially.

A lot of the discussion during meetings at WEF-2018 in Davos and on its sidelines concerned possible further future regional divisions around the world. But those divisions are already here, and have been for years. The World Wide Web is proof of this: a truly global Internet when people from anywhere, from the US to China, had access to the same digital services is long gone. Besides, today we have Europe’s increasing concern over digital privacy, while most EU citizens haven’t heard of the GDPR. Then there’s the rollback of the US’s net neutrality provisions, and protectionist legislation in Russia and other countries. Geopolitical tensions continue to increase and risk new clashes among nation states – even military conflict.

In his speech, Anton will provide an overview of the current worrying trends in the cybersecurity industry; explain how ‘balkanization’ is undermining its ability to do its job: protecting against cybercrime; and list what we need to do to slow if not reverse these trends.
Anton Shingarev, Vice-president for Public Affairs, Kaspersky Lab
Mar 2809:50
Conference pass

Cyber as a Domain of Operations: How is NATO Adapting?

Keynotes
Mar 2810:10
Conference pass

Disruptive technology to solve cyber security problems in government and industry: AI and Machine learning

Keynotes
  • How will the next wave of disruptive technology affect the cyber security industry?
  • Cutting through the hype surrounding AI and Machine learning
Mark Testoni, CEO, SAP NS2
Mar 2810:30
Conference pass

The Future Impact of AI in Cyber-Crime

Keynotes
Dave Palmer, Director of Technology, Darktrace
Mar 2811:40
Conference pass

The EU Experience in Global Cyber Capacity and Institution Building

Stream One
international cooperation and cyber capacity building at the intersection of cybersecurity and development
Nayia Barmpaliou, Policy Coordinator / Programme Manager for Organised Crime and Cyber, European Commission
Mar 2811:40
Conference pass

How does King manage its attack surface with over 1 billion users?

Stream Two
  • How can your Development team build security into your applications?
  • Is it better to create these solutions in-house?
  • Tips for scaling your cyber security processes and protocols as your business booms
Giacomo Collini, Director of Information Security, King
Mar 2811:40
Conference pass

What can retailers and the financial sector do to combat fraud and cybercrime: a historical perspective

Stream Three
  • Could FIs do more to combat cybercrime through ‘Know your customer’ processes?
  • How can retailers work with law enforcement?
  • A perspective from ex-law enforcement turned security director
Mike Wyeth, Security Advisor to the Board, Shop Direct Group
Mar 2812:00
Conference pass

What the board should know about Information/Cyber Security

Stream One
  • Different circumstances call for different leadership skills
  • The current cyber climate demands CIOs, CISOs and CTOs with a strong grasp on business strategy and value-creation
  • Cyber security is no longer considered a solely ‘operational’ risk and IT professionals are moving to the c-suite
  • Is your IT team prepared for their new responsibilities? Are you?
Krisztian Kenderesi, Interim CISO, River and Mercantile Group
Mar 2812:00
Conference pass

IT-Laws and Standards 2018: Cybersecurity in Germany and Europe

Stream Two
  • What does a sophisticated attack look like – a brief history of cyber attacks
  • Cyber Security and standards – what approaches are available
  • ISO 27932 and the NIST Framework – what approach did we take
  • Detect, Respond, Recover – cyber-attacks and incident response
  • Strategy execution – Benchmarking & tracking progress.
Dennis-Kenji Kipker, Project Manager VDE Competence Center for Information Security/CERT@VDE, German Association for Electrical, Electronic & Information Technologies
Mar 2812:00
Conference pass

Infosec challenges and insights 2018: From human to artificial intelligent

Stream Three
  • This presentation will focus on the challenges and fundamentals and roadmap of building an effective infosec program in 2018, and explore the emerging operational role of AI in infosec breach defense.
James Bynoe, eCG Head of Information Security & Compliance, Ebay
Mar 2812:20
Conference pass

Panel: Cyber culture eats security strategy for breakfast

Stream One
  • With the best intentions, your cyber security culture can undermine your security strategy
  • How to cultivate the best cyber security culture for your enterprise
David Pope, Chief Information Security Officer, D.V.L.A.
Jeff Moulton, Executive Director, Stephenson Technologies Corp
Kevin Millwood, Information Security Manager, Hargreaves Lansdown Plc
James Bynoe, eCG Head of Information Security & Compliance, Ebay
Jonathan Lloyd-White, CISO, SMBC EMEA
Mar 2812:20
Conference pass

Panel: what is the future of mobile and app security?

Stream Two
  • Mobile-readiness in the artificial intelligence age
  • Customer interaction at multiple touchpoints
  • The human side of mobile channels

Giacomo Collini, Director of Information Security, King

Greg Hawkins, CTO, Starling bank

Emilio Vacca, Director, Mobile channel, Telegraph Media Group
Mar 2812:20
Conference pass

Panel: How have breaches changed in scope, motivation and cost?

Stream Three
  • Cyber security breaches today can see 5% of a company’s GDP wiped overnight
  • How have cyber security breaches changed historically?
  • What will the future hold?
Jon Baines, Data Protection Adviser, Mishcon de Reya
Mike Wyeth, Security Advisor to the Board, Shop Direct Group
Carlos Sousa, CISO, Affidea BV
Mar 2814:00
Conference pass

Lessons Learned from a legacy IT overhaul at the Student Loans Company

Stream One
  • SLC began their IT overhaul two years ago
  • What lessons were learned along the way and what advice would I give to IT professionals grappling with legacy IT transformation issues?
Alun McGlinchy, Chief Information Technology Security Officer, Student Loans Company Ltd
Mar 2814:00
Conference pass

How smart connected product may shift the business paradigm from reactive to proactive, moving from a product to a product and service business model

Stream Two
Andrea Roero, CIO & Business Partner, Processes & Innovation, Cromodorawheels SpA
Mar 2814:20
Conference pass

Toy Joyriders: How Cayla could compromise your car

Keynotes
  • IoT vulnerabilities affect not just individual products but emerging ones too. In this presentation, Ken Munro will explorehow security flaws can lead to a compromise of your connected car. He’ll explore the configuration, authentication and data handling issues common to both products and the danger this could pose to the driver of a connected car.
    Takeaways:
  • Understand connectivity issues affecting Bluetooth Low Energy (BLE) and WiFi
  • Learn about mobile app weaknesses and how not to apply encryption
  • See the potential for database/user commands to be abused
  • Explore how audio surveillance is eroding user privacy AND safety
  • Appreciate the problems associated with OTA security updates
Tim Luck, Consultant, Pen Test Partners
Ken Munro, Partner, Pen Test Partners
Mar 2814:20
Conference pass

International Maritime Cybersecurity

Stream One
David Nordell, Senior VP, Centre for Strategic Cyberspace & Security Science
Mar 2814:20
Conference pass

1st Line of Defence in Managing Cyber Threats

Stream Two
Manoj Varsani, CTO, The House Crowd
Manoj Varsani, Chief Technology Officer, The House Crowd
Mar 2814:40
Conference pass

Cyber culture eats security strategy for breakfast

Keynotes
  • With the best intentions, your cyber security culture can undermine your security strategy
  • How to cultivate the best cyber security culture for your enterprise
Kevin Millwood, Information Security Manager, Hargreaves Lansdown Plc
Mar 2815:00
Conference pass

Basics of Cyber Hygiene: Knowing what to do, and Doing what we Know

Keynotes
Aman Sood, IT Risk Manager, Wadhwani Asset Management
Mar 2815:20
Conference pass

Making Compliance Count

Keynotes
It’s a brave new world, with bug bounties and crowd-sourced penetration tests now an up-and-coming way to augment security programs. But can you do the same with your compliance and certification programs? At Adobe, our security team has been working with our internal audit team and outside vendors to see if it’s possible – and the early returns are very encouraging! Find out more during this discussion of how you can leverage both internal and external security researchers to help with compliance efforts, while measuring your real-world security risk.
David Lenoe, Director for Secure Software Engineering, Adobe Systems
last published: 23/Mar/18 18:35 GMT

 

Cyber Security Congress

TO SPONSOR / EXHIBIT

Harry Fox
+44 (0)207 092 1222
Harry.Fox@terrapinn.com

TO SPEAK

Jennifer Clark
t/ +44 (0)207 092 1220
jennifer.clark@terrapinn.com

TO REGISTER

Tayyab Abbasi
+44 (0)207 092 1210
tayyab.abbasi@terrapinn.com


 

The Cyber Security Congress is two events: A world-class conference where business leaders from around the world meet; and, a unique cyber security and information technology exhibition. To visit the exhibition is free. There is, naturally, a registration fee to attend the conference.