Create your personal agenda –check the favourite icon
Keynote address: the future of cyber security and the information race
- Current cyber security threats: How do they manifest, spread and how can they be contained?
- How can we protect our most valuable infrastructure assets?
- Winning the information security race: competition with foreign states and other actors
The Internet of Things: what do we stand to gain and lose?
- The IoT will bring many advantages to businesses: un-paralleled customer connectivity, brand new business models, agile working
- What are the costs associated with these sweeping changes to the way businesses, homes and people connect?
- Is our national cyber security ready for the Internet of Things?
Johan Vallin, Global Head of Data Science, Electrolux
Cyber Risk Decision Making: The right investments to reduce risk
- Which cyber technologies are worth the investment?
- How can you demonstrate ROI to your board?
- How should you explain your cyber security risk posture to your stakeholders?
- What do investors want to know about your cyber security processes?
Staying competitive in a world of ever increasing cyber risk
- Aligning business and security imperatives
- Do you have a cutting-edge and comprehensive Information Security plan?
- Making use of your best assets: employees, vendors and security solutions
Sponsor Presentation: Understanding the threat and building an effective cyber operations team to respond
- your security mechanisms are built for the untrusted hacker and not the trusted insider; how can you redress the balance and understand your insider risk?
- A lesson in the warning signs for abnormal behavior
- Assess your privileged account security solutions
Third Party Risk Management: the weakest link
- Companies must carefully scrutinize and examine potential partners for cyber security vulnerabilities
- To fail to effectively manage third parties exposes a company to criminal liability
- How can you ensure your supply chain doesn’t leave you vulnerable to an attack?
Natasha Meaney, Chief Administrative Officer, Compliance & Operational Risk, UBS, UBS AG
Planning ahead: in the event of an attack, what decisions will you have to make?
The Future of blockchain and digital currency
Managing your insider threat
Measuring the effectiveness of information security
How do you meet the expectations of a modern workforce and keep the enterprise network secure?
The Internet of Things: managing connected devices and vehicles
Beyond awareness: making employees do cyber security
Are our systems too complex?
The evolving threat landscape: what should your organisation be doing now to prepare?
- As threats become more sophisticated how can your organization prepare?
- A diverse set of tools – people, technology, ideas – will enable you to survive future attacks
- Should we have gradual evolution or radical change?
Royce Curtin, Managing Director of Global Intelligence, Barclays Bank Plc
Cyber security strategy is now your business strategy: adopting new technology in line with customer expectations without leaving your enterprise vulnerable
- Doing business and staying competitive in a world of ever increasing cyber risk
- Trust as the new market differentiator
Jennifer Rigby, CIO, Lloyd'S Of London Ltd
The UAE: Current challenges and future opportunities for Cyber Security
- How has the Western Region Municipality, Abu Dhabi pursued a secure digital transformation?
- Lessons learned so far and roadmap for the future
- Reducing the gender gap in IT
Irene Corpuz, Section Head Of Planning And Information Technology Security, Western Region Municipality
If we can’t protect our data, can we make it valueless?
- Strategies for data protection in the face of ever-increasing ransomware and data theft
- How much is data worth to a hacker?
- Can you anonymize customer data to make it valueless? Will that undermine your business objectives?
Andreas Bergqvist, Head of Group Information Security, Svenska Handelsbanken
Lessons learned from high profile attacks
- What separated the winners and losers in recent attacks?
- How can you raise your cyber security protocols to match the survivors?
Jaya Baloo, Chief Information Security Officer, Kpn Telecom
What motivates hackers? understanding the profile of a cyber attacker to inform your security defenses
- Understanding the profile of your ‘average’ attacker
- What motivates hackers to dump data publicly and how do they do it?
- Using this knowledge to inform our cyber security defenses
- Can you ever be fully protected?
How Israel became a world-leader on cyber security
- How Israel achieved its cyber security success?
- Policy and Practice which supports or inhibits cyber innovation.
- Building eco-system and collaboration private enterprise with public sector and academia
- Which technologies will propel Israel’s cyber success?
- What are the roadblocks to innovation and how can they be overcome?
Avi Shavit, Head of Cyber & Homeland Security Sector, Israel Innovation Authority
Managing access to enterprise data: digital identities, threats in privileged pathways and end point protection
- Authentication trends and standards
- Thinking beyond passwords
- Privileged account management
- Managing user access in a multi-cloud enterprise
- Combatting access governance blind spots
- Stolen credential attacks can completely nullify all your security efforts, how can you respond?
Paul Jay, Global Head of Information & Cyber Security, Meggitt
Sponsor Presentation: Reserved for Gold Sponsor Protecting your data with blockchain as a service
- While a deluge of data in recent years can deliver valuable insights and analytics to help organizations innovate, this also presents new security challenges and attack vectors
- Innovations in cryptography such as Format-Preserving Encryption (FPE) are enabling organizations to adopt a "data-centric" posture to protect this data
- Gain insights into the technologies and best practices adopted by firms to deploy data protection solutions to protect their most valuable assets
Sponsor Presentation: Reserved for Gold Sponsor which approach works best – offence or defence?
planning for the worst-case scenario
- Understand why your company is being targeted
- How honeynets can be used to proactively seek out attacks with near zero false positives
- Adopting the right approach to cyber security to protect your data and prevent attacks
Sponsor presentation: Reserved for Gold Sponsor Using Machine Learning to Automate Advanced Cyber Defense
- How machine learning and mathematics can automate advanced threat detection within networks
- Why self-learning technology, known as the ‘immune system’ approach, detects threats early without using rules or signatures
- How to gain 100% visibility across physical, virtual and cloud environments, including third-party cloud services and SaaS
Panel Discussion the modern cyber security breach: how can you function offline and how can you get your business operational as quickly as possible?
- Grasping the threat of real world physical damage from cyber
- Going beyond technology domains to crafting a human response to crisis
- Defending the physical and procedural space
- Which non-technology means should we be investing in?
Panel Discussion Digital transformation and cyber security: how can we safely enable the business through technology?
- Digital innovation - breaking from legacy IT systems and embracing new technology - is a key driver of business growth and enterprise value
- How can companies embrace trends like AI, machine learning, blockchain, apps, without exposing themselves to cyber security risks?
- Can cyber security be built into the digital transformation process?
Panel Discussion How does regulation differ across the world and how can we harmonise our cyber security best practice?
- What are the challenges and opportunities of international cyber security legislation?
- Are there any major hurdles to international collaboration on cyber security? How can we overcome them?
- Are there regional-specific issues to be addressed?
Panel Discussion GDPR – the consequences both intended and unintended
- How will the GDPR really affect you?
- As the attack economy shifts, are you ready for the fallout?
, Head of UK Security, AXA UK Urmas Aamisepp,
Chief Information Security Officer, Clas Ohlson Michael Dierickx
, Director of security engineering and information security officer, Panasonic Avionics Jon Baines
, Data Protection Officer (and GDPR Readiness), Network Rail
Platinum Sponsorship Slot: Beating cybercrime: global trends, predictions & the lessons learnt in responding to the most advanced attacks
- The current threat landscape and the geopolitical context of cyber security
- A look to the year ahead; what threats will you all be facing this time next year?
- Which technologies will be dominating the cyber security space, and are there any that really merit the hype?
INTERNATIONAL VOICES PANEL
Sir Iain Lobban, former Director of GCHQ, will host an exclusive panel of former and active government officials from around the world. Held under Chatham House Rule, the panelists will speak off the record about their cyber security priorities and the future of cyber legislation in their respective countries.
Richard Ledgett, former Deputy Director, NSA
Siim Sikkut, National ICT Policy Adviser, Government Office of Estonia
Thomas Ahrenkiel, The Permanent Secretary of the Ministry of Defence, Denmark
Alastair MacGibbon, Special Adviser to the Prime Minister on Cyber Security, Government of Australia
Create your personal agenda –check the favourite icon
Insights from Insurance
- Understand your exposure to cyber risk from an insurance point of view
- Which aspects of cybercrime can be insured against and what can’t?
- Results of the Marsh UK Survey: how involved are boards in combatting cyber attacks and responding to incidents?
Mark Weil, CEO, Marsh & Co. Insurance Brokers Ltd.
Sponsor presentation: The biggest mistake companies make with data security is...
- Not aligning security with business goals
- Is your security team good at considering how your IT projects impact overall business goals and revenue?
- Learn to position yourself as a business enabler not an expense
Healthcare under attack: what can we learn from this highly targeted industry about digital transformation and resilience in the face of attack?
- Isolating infected parts of the network and containing the threat
- Ransomware - to pay or not to pay?
- Reducing the costs incurred and the data lost, and preventing life threatening disruption to services
Rob Shaw, Chief Executive, NHS Digital
Disruptive technology to solve cyber security problems in government and industry: AI and Machine learning
- How will the next wave of disruptive technology affect the cyber security industry ?
- Cutting through the hype surrounding AI and Machine learning
Mark Testoni, CEO, SAP NS2
The inside story of cybercrime: a view from the front line of international cyber policing
- Are cyber attacks on your enterprise a result of espionage, organised crime or a random attack?
- What have we learned from high-profile attacks in the last year and how can you adjust your security processes accordingly?
- International collaboration models and open source platforms to keep you ahead of the threat
What can retailers and the financial sector do to combat fraud and cybercrime?
- Could FIs do more to combat cybercrime through ‘Know your customer’ processes?
- How can retailers work with law enforcement?
- A perspective from ex-law enforcement turned security director
Mike Wyeth, Security Advisor to the Board, Shop Direct Group
Deception-based cyber security: from reactionary to proactive defence
- Using honey nets and honey pots to lure hackers into your network
- Why would you want to?!
- Shifting to a proactive defense strategy
Russell Wing, Head of Information Security, London Metal Exchange
What does the board want to hear from their CISO?
- With only 15% of boards satisfied with the information they are getting from management, how can you best present your board report?
- Where might you be missing the mark?
- How can you communicate in a way that is actionable and useful?
Tim Neill, Group Head, Crisis Management & IT Risk, London Stock Exchange Group
How does King manage its attack surface with over 1 billion users?
- How can your Development team build security into your applications?
- Is it better to create these solutions in-house?
- Tips for scaling your cyber security processes and protocols as your business booms
Giacomo Collini, Director of Information Security, King
IT is the business – rethinking the role of the IT team
- Different circumstances call for different leadership skills
- The current cyber climate demands CIOs, CISOs and CTOs with a strong grasp on business strategy and value-creation
- Cyber security is no longer considered a solely ‘operational’ risk and IT professionals are moving to the c-suite
- Is your IT team prepared for their new responsibilities? Are you?
Mieke Kooij, Security Director, The Trainline
Standards-based approach to cyber security strategy
- What does a sophisticated attack look like – a brief history of cyber attacks
- Cyber Security and standards – what approaches are available
- ISO 27932 and the NIST Framework – what approach did we take
- Detect, Respond, Recover – cyber-attacks and incident response
- Strategy execution – Benchmarking & tracking progress.
Bruce Hopkins, Head of IT Security, Risk and Compliance, Daa International
Anti-fraud and information security functions
- New methods for conducting fraud-related inquiries and investigations
- Reallocating resources to achieve your goals
- How can we best maintain anti-fraud programmes and related plans?
Hem Pant, Chief Information Security Officer, I.N.G. Wholesale Bank
Combatting the Insider Cyber Threat using AI
- how are bug bounty programmes being used to expose vulnerabilities in a controlled way?
- Can you use AI to inform your cyber defences?
James Bynoe, eCG Head of Information Security & Compliance, Ebay
Panel: The threat from Artificial Intelligence – who is right, Elon or Mark?
- Mark Zuckerberg argues that AI is benign while Elon Musk has said “competition for AI superiority at national level most likely cause WW3”
- Should we embrace new smart automation technology?
- What place will it have in cyber security?
, Digital Lead, Willis Towers WatsonJames Bynoe
, Head of Information Security and Compliance, eBay
Panel: The emergence of the “BISO”
Panel: The emergence of the “BISO”
- Implement an information security strategy that supports businesses goals and objectives
- How much should CISOs understand finance?
- Collaborate with security architects to discuss solutions with the business strategy in mind
- Facilitate cross-department engagement to identify projects that enable business development while ensuring the necessary security controls are in place
, BISO, Head of Information Security, John Lewis Rich Baich, CISO, Wells Fargo Simon Jenner, CISO, Booking.com Tarun Samtani
, CISO, Findel PLC Jean-Francois Simons,
CISO, Brussels Airlines
Panel: what is the future of mobile and app security?
- Mobile-readiness in the artificial intelligence age
- Customer interaction at multiple touchpoints
- The human side of mobile channels
, Director of Information Security, King Greg Hawkins
, CTO, Starling bank Emilio Vacca, Director, Mobile channel, Telegraph Media Group
How have breaches changed in scope, motivation and cost?
- Cyber security breaches today can see 5% of a company’s GDP wiped overnight
- How have cyber security breaches changed historically?
- What will the future hold?
, COO, Cyber Defence Alliance Stefano Ciminelli
, Deputy CISO, Swift David Pope,
CISO, DVLA Mike Wyeth
, Group Security Director, Shopdirect Bruno Kalhoj
, Head of Division, Security and Safety Division, Directorate General Administration, European Central Bank
Lessons Learned from a legacy IT overhaul at the Student Loans Company
- SLC began their IT overhaul two years ago
- What lessons were learned along the way and what advice would I give to IT professionals grappling with legacy IT transformation issues?
Alun McGlinchy, Chief Information Technology Security Officer, Student Loans Company Ltd
The Future of the IoT and connected devices
- The connected world presents both challenges and opportunities for cyber security
- Panasonic Avionics deals with fleets of planes flying all around the world, each connected to the internet
- How do they manage their risk in such a connected and high-stakes environment?
Michael Dierickx, Director of security engineering and information security officer, Panasonic Avionics
Social engineering tactics
- SEBs program for increasing awareness among SEB client executives and our customers
- Why are people so susceptible to social engineering attacks?
- Why are hackers sometimes better able to engage your workforce than you are?
Jan Persson, Head of Global Security, S.E.B.
Panel: Should you bring your SOC in-house?
- How should high value assets be monitored, and by whom?
- Do the costs of building up an in-house security operations center outweigh the benefits?
- Which other traditionally externally outsourced IT tasks should be brought in-house?
- Which elements of your SOC should you outsource?
- What will the next generation of SOCs look like?
, CISO, SMBC EMEA
Panel: the future of encryption
- Will technology companies have to do more to support counter terrorism operations?
- Is encryption as secure as we think?
- Is it as anonymous as we think?
- Is quantum encryption coming sooner than we think?
Chief Information Technology Security Officer, Student Loans Company
Panel: Cyber culture eats security strategy for breakfast
- With the best intentions, your cyber security culture can undermine your security strategy
- How to cultivate the best cyber security culture for your enterprise
, Digital Lead, Willis Towers WatsonSimon Jenner, CISO, Booking.comJonathan Kidd
, CISO, Hargreaves Lansdown
When Security Tools Collide: testing the real-world usefulness of two services
What’s the best way to test out a new security service? We decided it might be interesting to try testing two services at once – not in a traditional side-by-side bake-off, but testing them against each other, pitting a penetration testing service against a web application defense service. The results were interesting, illuminating, and helped us make decisions about the real-world usefulness of both services.
David Lenoe, Director for Secure Software Engineering, Adobe Systems
How do you prevent a breach from evolving into a business-crippling attack
- Companies often fail to understand the true threat against their employees, suppliers and ultimately, their data
- Does your board view data security as a "business problem" and not just an "IT problem"?
- Moving beyond legacy IT solutions, from obsolete ‘perimeter protection' strategy vs. ‘data-centric' strategy
- Staying on top of evolving cyber threat intelligence is key to strengthening your data security strategy
Simon Jenner, CISO, Booking.com
How can we close the intelligence gap?
- Encouraging knowledge sharing between industry, academia and public sector
- Overcoming the main collaboration hurdles
- Successful partnerships
- creating a ‘public sector alumni’ program in the private sector, and using these networks to build a collaborative framework
Martyn Booth, Director of Information Security, Euromoney
last published: 27/Nov/17 10:35 GMT