Day 2 - 26 April 2019

Cyber Security – Emerging Technology

This session will focus on the impact that new technologies such as blockchain, artificial intelligence and machine learning will have on cyber security.  Using case studies from across key verticals, we will examine threats to data, cyber intelligence and access management.  We start the day looking at how cultures within companies have to change to be able to accommodate these new methodologies.

09:30AM

Paul McKay

Senior Analyst

Forrester

Associated Talks:

09:30AM - Day 2

View Cyber Security – Emerging Tech & Regulations: Chair’s welcome and opening comments

View Full Info

Cyber Security – Emerging Tech & Regulations: Chair’s welcome and opening comments

. Paul McKay, Senior Analyst, Forrester
Hide Details
More Details

09:50AM

Steve Wright

Former DPO | CEO

Bank of England | Privacy Culture

Associated Talks:

11:00AM - Day 2

View Panel: The role of regulations & standards for cybersecurity compliance

09:50AM - Day 2

View Evolving cyber intelligence landscapes

View Full Info

Evolving cyber intelligence landscapes

  • Role of private, enterprise and governmental agencies in cyber intelligence – how is information shared across these?
  • What is the difference between tactical, technical, strategic and operational cyber threat intelligence?
  • The increasing role of automation, AI and machine learning for gathering and processing intelligence relating to cyber threats
  • Discussion of best practices for gathering and acting upon cyber threat intelligence
. Steve Wright, Former DPO | CEO, Bank of England | Privacy Culture
Hide Details
More Details

10:20AM

Yiannis Pavlosoglou

Co-chair of the (ISC)² EMEA Advisory Board

(ISC)²

Associated Talks:

10:20AM - Day 2

View Implications of high profile data breaches

View Full Info

Implications of high profile data breaches

This talk will look at the need for commonality in training and certification in the face of a spate of new technologies in the workplace – including AI and automation IoT and IIoT – all of which heighten the risk of malicious and inadvertent data breaches.

The idea is that through accredited training and certification, skills and best practice can be replicated, maintaining a base standard of competence and compliance across industries as well as across borders. We will also look at the impact of a variety of recent data and cybersecurity regulations including GDPR, PSD2, Privacy Shield, NIS Directive etc. on training, skills development and organisational compliance.

. Yiannis Pavlosoglou, Co-chair of the (ISC)² EMEA Advisory Board, (ISC)²
Hide Details
More Details

10:40AM

Francesco Cipollone

Director of Events - UK Chapter

Cloud Security Alliance

Associated Talks:

10:40AM - Day 2

View Is the Cloud secure? It’s easy if you do it smart

11:50AM - Day 1

View Panel: Sharing responsibility for cloud security

View Full Info

Is the Cloud secure? It’s easy if you do it smart

This talk will explore the challenges of cloud transformation. The talk will provide top lessons learned from the research and projects CSA members have been part of.

We will explore cloud responsibilities, foundation, regulation, and toolkit to create facilitate a rapid transformation.

We will also touch on the topic of security by design, devsecops – and the role of security architecture & business in devsecops.

. Francesco Cipollone, Director of Events - UK Chapter, Cloud Security Alliance
Hide Details
More Details

11:00AM

Paul McKay

Senior Analyst

Forrester

Associated Talks:

09:30AM - Day 2

View Cyber Security – Emerging Tech & Regulations: Chair’s welcome and opening comments

View Full Info

Dr. Sanjana Mehta

Head of Market Research Strategy – EMEA

(ISC)2

Associated Talks:

11:00AM - Day 2

View Panel: The role of regulations & standards for cybersecurity compliance

View Full Info

Jon Townsend

Chief Information Officer

National Trust

Associated Talks:

11:00AM - Day 2

View Panel: The role of regulations & standards for cybersecurity compliance

View Full Info

Steve Wright

Former DPO | CEO

Bank of England | Privacy Culture

Associated Talks:

11:00AM - Day 2

View Panel: The role of regulations & standards for cybersecurity compliance

09:50AM - Day 2

View Evolving cyber intelligence landscapes

View Full Info

John Elliott

Data Protection Advisor

Open Banking

Associated Talks:

11:00AM - Day 2

View Panel: The role of regulations & standards for cybersecurity compliance

View Full Info

Panel: The role of regulations & standards for cybersecurity compliance

  • What does the concept of standards really mean in the context of cybersecurity?
  • Exploring corporate association vs government based policies such as those from NCSC, Cloud Security Alliance, European Union etc…
  • How has GDPR one year on changed the approach to data protection from a cyber perspective?
  • Can a verticalized approach to standards work?
  • What is current Global regulation in this area?
Moderator: . Paul McKay, Senior Analyst, Forrester
. Dr. Sanjana Mehta, Head of Market Research Strategy – EMEA, (ISC)2
. Jon Townsend, Chief Information Officer, National Trust
. Steve Wright, Former DPO | CEO, Bank of England | Privacy Culture
. John Elliott, Data Protection Advisor, Open Banking
Hide Details
More Details

11:40AM

Networking Break

12:00PM

Sarah Janes

Managing Director

Layer8

Associated Talks:

12:00PM - Day 2

View Security Behaviours: moving from knowing to doing

View Full Info

Security Behaviours: moving from knowing to doing

  • Why we’re stuck in a perpetual loop of telling people what to do and seeing no change in behaviour
  • The missing ingredient required to activate our workforce
  • Practical techniques to create grassroots change
. Sarah Janes, Managing Director, Layer8
Hide Details
More Details

12:10PM

Alfred Rolington

CEO

Cyber Security Intelligence

View Full Info

Marcel Dasen

Vice President of Engineering

Securosys SA

Associated Talks:

12:10PM - Day 2

View Panel: Exploring Identity Access Management

View Full Info

Eduardo Helering

Lead Solutions Engineer EMEA

OneLogin

Associated Talks:

10:50AM - Day 1

View Keynote: Does Multi Factor Authentication (MFA) without Single Sign On (SSO) make sense

12:10PM - Day 2

View Panel: Exploring Identity Access Management

View Full Info

Maninder Singh

Associate Director - Cyber Risk Services

Deloitte

Associated Talks:

12:10PM - Day 2

View Panel: Exploring Identity Access Management

View Full Info

Panel: Exploring Identity Access Management

Despite the best efforts of cyber security professionals to update systems and protect against vulnerabilities, if access to these systems is not managed correctly, attackers could gain access resulting in costly data breaches.  Hence identity & access management (IAM) is a key component of modern cyber security planning and implementation. Controlling the use and issuance of administrative passwords in key.  This panel will analyse the following:

  • What factors need to be considered when implementing IAM systems?
  • The role will technologies like Blockchain, and biometrics have in IAM?
  • How important is IAM for cloud based systems, and what do security professionals have to consider differently?
  • How does privileged access management fit into IAM?
Moderator: . Alfred Rolington, CEO, Cyber Security Intelligence
. Marcel Dasen, Vice President of Engineering, Securosys SA
. Eduardo Helering, Lead Solutions Engineer EMEA, OneLogin
. Maninder Singh, Associate Director - Cyber Risk Services, Deloitte
Hide Details
More Details

12:50PM

Orlando Scott-Cowley

Principal Technology Evangelist

Amazon Web Services

Associated Talks:

12:50PM - Day 2

View Using AI/ML to enhance security with AWS

View Full Info

Using AI/ML to enhance security with AWS

Applying Artificial Intelligence and Machine Learning to enhance security; or is the haystack broken? In this presentation you will learn why AI/ML can provide better haystack trawling, more robust anomaly detection and data classification in security applications, with real life case studies and examples.

. Orlando Scott-Cowley, Principal Technology Evangelist, Amazon Web Services
Hide Details
More Details

01:20PM

Networking Break

02:20PM

Andrew Lord

Head of Optical Research

BT

Associated Talks:

02:20PM - Day 2

View Keynote: Quantum Key Distribution – unhackable future networks

View Full Info

Keynote: Quantum Key Distribution – unhackable future networks

  • What is QKD?
  • Recent QKD developments
  • QKD Applications
  • QKD for Satellites
. Andrew Lord, Head of Optical Research, BT
Hide Details
More Details

02:50PM

Steffen Sorrell

Principal Analyst

Juniper Research

View Full Info

David Atkinson

Founder & CEO

Senseon

Associated Talks:

02:50PM - Day 1

View AI: Positive forces at work, or false positives?

02:50PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

View Full Info

Mike Bursell

Chief Security Architect

Red Hat

Associated Talks:

12:00PM - Day 2

View It’s not all tech: cultural change for DevSecOps

02:50PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

View Full Info

Dave Palmer

Director of Technology

Darktrace

Associated Talks:

02:50PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

View Full Info

Eduardo Diaz

Deputy General Counsel/Deputy Chief Compliance Officer

UniTeller - Banorte

Associated Talks:

03:30PM - Day 2

View Cloud security – is Blockchain the missing link

02:50PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

View Full Info

Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

  • Artificial intelligence, machine learning, and blockchain, are emerging tech cited as key in an increasingly complex security environment, but what challenges do these technologies pose?
  • Many key players are using security awareness and infrastructure is a key feature to differentiate themselves within the cloud wars, so how will this dictate how the market evolves?
  • As the hyperscalers are moving further up the stack to find the latest battleground – so who is going to come out on top?
  • Real life examples of where AI, ML and Blockchain are being utilised for security
Moderator: . Steffen Sorrell, Principal Analyst, Juniper Research
. David Atkinson, Founder & CEO, Senseon
. Mike Bursell, Chief Security Architect, Red Hat
. Dave Palmer, Director of Technology, Darktrace
. Eduardo Diaz, Deputy General Counsel/Deputy Chief Compliance Officer, UniTeller - Banorte
Hide Details
More Details

03:30PM

Eduardo Diaz

Deputy General Counsel/Deputy Chief Compliance Officer

UniTeller - Banorte

Associated Talks:

03:30PM - Day 2

View Cloud security – is Blockchain the missing link

02:50PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

View Full Info

Cloud security – is Blockchain the missing link

How can blockchain make Internet of Things (“IOT”) devices more secure?  Building the IOT requires a large number of interconnected devices.  Considering that these devices are vulnerable to hackers and are generally not secured-by-design, they need to be updated in order to patch their vulnerabilities in an effective manner.  This talk discusses how blockchain infrastructure can solve this problem and act as a platform where IOT device software and security protocols can be updated in a consistent and effective manner.

. Eduardo Diaz, Deputy General Counsel/Deputy Chief Compliance Officer, UniTeller - Banorte
Hide Details
More Details

04:00PM

Session Close