Day 2 - 26 April 2019

Cyber Security – Emerging Tech & Regulations

This session will focus on the impact that new technologies such as blockchain, artificial intelligence and machine learning will have on cybersecurity.  Using case studies from across key verticals, we will examine threats to data, the legal implications of data breaches and the role of standards and regulations.

09:30AM

Cyber Security – Emerging Tech & Regulations: Chair’s welcome and opening comments

Hide Details

09:50AM

Steve Wright

Interim DPO

Bank of England

Associated Talks:

10:50AM - Day 2

View Panel: The role of regulations & standards for cybersecurity compliance

09:50AM - Day 2

View Evolving cyber intelligence landscapes

View Full Info

Evolving cyber intelligence landscapes

  • Role of private, enterprise and governmental agencies in cyber intelligence – how is information shared across these?
  • What is the difference between tactical, technical, strategic and operational cyber threat intelligence?
  • The increasing role of automation, AI and machine learning for gathering and processing intelligence relating to cyber threats
  • Discussion of best practices for gathering and acting upon cyber threat intelligence
. Steve Wright, Interim DPO, Bank of England
Hide Details
More Details

10:20AM

Keynote: Legal implications of high profile data breaches

What are the legal implications of data breaches?  This talk will look at some recent examples and discuss current legislature in the UK and beyond surrounding data breaches. How does shared responsibility for cyber security along the stack add complexity to this issue? Discussing the role of GDPR after nearly a year of implementation in Europe.

Hide Details
More Details

10:50AM

Steve Wright

Interim DPO

Bank of England

Associated Talks:

10:50AM - Day 2

View Panel: The role of regulations & standards for cybersecurity compliance

09:50AM - Day 2

View Evolving cyber intelligence landscapes

View Full Info

John Elliott

Data Protection Advisor

Open Banking

Associated Talks:

10:50AM - Day 2

View Panel: The role of regulations & standards for cybersecurity compliance

View Full Info

Panel: The role of regulations & standards for cybersecurity compliance

  • What does the concept of standards really mean in the context of cybersecurity?
  • Exploring corporate association vs government based policies such as those from NCSC, Cloud Security Alliance, European Union etc…
  • How has GDPR one year on changed the approach to data protection from a cyber perspective?
  • Can a verticalized approach to standards work?
  • What is current Global regulation in this area?
. Steve Wright, Interim DPO, Bank of England
. John Elliott, Data Protection Advisor, Open Banking
Hide Details
More Details

11:30AM

Networking Break

12:00PM

Sarah Janes

Managing Director

Layer8

Associated Talks:

12:00PM - Day 2

View Security Behaviours: moving from knowing to doing

View Full Info

Security Behaviours: moving from knowing to doing

  • Why we’re stuck in a perpetual loop of telling people what to do and seeing no change in behaviour
  • The missing ingredient required to activate our workforce
  • Practical techniques to create grassroots change
. Sarah Janes, Managing Director, Layer8
Hide Details
More Details

12:10PM

Maninder Singh

Associate Director - Cyber Risk Services

Deloitte

Associated Talks:

12:10PM - Day 2

View Panel: Exploring Identity Access Management

View Full Info

Senior Representative, OneLogin

Associated Talks:

10:50AM - Day 1

View Keynote: Developing an effective cloud cyber security solution

11:50AM - Day 1

View Panel: Sharing responsibility for cloud security

10:20AM - Day 1

View Keynote: Common cyber security mistakes made by enterprises and how to avoid them

12:10PM - Day 2

View Panel: Exploring Identity Access Management

View Full Info

Panel: Exploring Identity Access Management

Despite the best efforts of cyber security professionals to update systems and protect against vulnerabilities, if access to these systems is not managed correctly, attackers could gain access resulting in costly data breaches.  Hence identity & access management (IAM) is a key component of modern cyber security planning and implementation. Controlling the use and issuance of administrative passwords in key.  This panel will analyse the following:

  • What factors need to be considered when implementing IAM systems?
  • The role will technologies like Blockchain, and biometrics have in IAM?
  • How important is IAM for cloud based systems, and what do security professionals have to consider differently?
  • How does privileged access management fit into IAM?
. Maninder Singh, Associate Director - Cyber Risk Services, Deloitte
. Senior Representative, OneLogin, ,
Hide Details
More Details

12:50PM

Afternoon Keynote: The rise of AI led cyber security and threat detection – stopping attacks before they happen

  • How machine learning and artificial intelligence can be used to improve threat detection and management
  • Machine learning going beyond traditional SIEM (security information and event management) methods
  • Why multi-cloud and more complex cloud environments mean more attack vectors
Hide Details
More Details

01:20PM

Networking Break

02:30PM

Is quantum encryption the key to cyber security?

Hide Details

02:50PM

Dave Palmer

Director of Technology

Darktrace

Associated Talks:

02:50PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

View Full Info

Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

  • Artificial intelligence, machine learning, and blockchain, are emerging tech cited as key in an increasingly complex security environment, but what challenges do these technologies pose?
  • Many key players are using security awareness and infrastructure is a key feature to differentiate themselves within the cloud wars, so how will this dictate how the market evolves?
  • As the hyperscalers are moving further up the stack to find the latest battleground – so who is going to come out on top?
  • Real life examples of where AI, ML and Blockchain are being utilised for security
. Dave Palmer, Director of Technology, Darktrace
Hide Details
More Details

03:30PM

Eduardo Dias

Deputy General Counsel/Deputy Chief Compliance Officer

UniTeller - Banorte

Associated Talks:

03:30PM - Day 2

View Cloud security – is Blockchain the missing link

View Full Info

Cloud security – is Blockchain the missing link

. Eduardo Dias, Deputy General Counsel/Deputy Chief Compliance Officer, UniTeller - Banorte
Hide Details
More Details

04:00PM

Session Close