Day 1 - 17 March 2020
Enterprise Security – IoT & Digital Transformation
09:30AM
Alex Hilton
Chief Executive
Cloud Industry Forum

09:40AM - Day 1
View Enterprise Security – Digital Transformation: Chair’s Welcome & Opening Remarks

09:30AM - Day 1
View Enterprise Security – IOT & Digital Transformation: Chair’s Welcome and Opening Remarks
Enterprise Security – IOT & Digital Transformation: Chair’s Welcome and Opening Remarks
09:50AM
Vulnerability management for enterprises
- Exploitation of known vulnerabilities in software remains the greatest cause of security incidents within the enterprise.
- How can enterprises identify vulnerabilities within their organisations? What tools and methods are available?
- What are key factors to consider during the process, from identification through to prioritisation of fixes?
- Real life examples from across industry.
10:20AM
Keynote: Common cyber security mistakes made by enterprises and how to avoid them
Examining the common mistakes made my enterprises globally, and what business leaders can do to mitigate them. How cyber security can tackle the exponential growth in data from business systems that are incorporating more and more digital technology into their day to day business activities. Covering cloud, big data, AI, IOT and mobile devices and the security sensors meant to protect them from bad agents.
10:50AM
Alex Hilton
Chief Executive
Cloud Industry Forum

09:40AM - Day 1
View Enterprise Security – Digital Transformation: Chair’s Welcome & Opening Remarks

09:30AM - Day 1
View Enterprise Security – IOT & Digital Transformation: Chair’s Welcome and Opening Remarks
Andy Kennedy
EMEA Security Specialist

12:00PM - Day 1
View Panel: The evolution of cloud security – safeguarding the future

10:50AM - Day 1
View Panel: The evolution of cloud for enterprise cybersecurity
Panel: The evolution of cloud for enterprise cybersecurity
- Discussing the benefits vs challenges of implementing cloud based systems at enterprise scale – what do CISOs and CIOs need to consider?
- Public, Private or Hybrid: How cloud architecture impacts enterprise security
- Addressing the risks of the Cloud as a big data centre – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
11:30AM
Networking Break
12:00PM
Case Study: Securing ICS/SCADA
12:20PM
Panel: An E2E approach to tackling data security challenges of the IoT
- Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information
- Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
- What are the different considerations for consumer owned connected device vs. those owned by legal entities?
- Importance of other aspects of IoT security; testing, education of staff and physical security for devices
01:00PM
IT/OT Security Orchestration
01:30PM
Networking Break
02:30PM
Mansoor Hanif
Chief Technology Officer
Ofcom

02:30PM - Day 1
View A new range of wireless choices for Enterprise networks
A new range of wireless choices for Enterprise networks
03:00PM
Threats to infrastructure: cyber security for energy
The energy sector is an area of particular concern for cyber security authorities as the industry continues to embrace the Internet of Things with smart metering and other networked technologies which bring about potential vulnerabilities. The ‘Cyber Security in the Energy Sector’ report was published in 2017 by the Energy Expert Cyber Security Platform (EESCP), an expert group which provides guidance or recommendations to the European Commission in respect of the energy sector. This talk will cover:
- Role of legislation within the energy sector.
- Specific challenges across oil, gas, electricity, water and renewable energy.
- Challenges of securing data from smart grids and smart meters.
03:30PM
Cyber security for the transport industry
This talk will cover a specific case study from the transport industry around how cyber security affects all parts of the supply chain – from the factory floor, through to connected cars and vehicles themselves. Issues such as addressing customer fears around hacking, upgrading legacy equipment and working with third party providers will be covered.
04:00PM
Case Study: IoT, endpoint and mobile security – what lessons can we learn from BYOD initiatives?
Enterprises have long since been getting their heads around bring your own device (BYOD) – but with smartphones and tablets being superseded by wearables, sensors and more, what will this mean for the enterprise network – and the enterprise network manager?
- How can the performance of IoT devices on the network be securely managed without disrupting performance?
- The ownership of security from the manufacturer and the enterprise perspective
- What lessons can be learned from BYOD rollouts?