Day 1 - 25 April 2019
Enterprise Security – IOT & Digital Transformation: Chair’s welcome and opening comments
Security Strategy for the Enterprise
Designing a Security Strategy which works for your Enterprise, aligns with the threat landscape and can be understood by your Board
General Manager, Northern Europe
10:20AM - Day 1
11:50AM - Day 1
Keynote: Can you enable SaaS based Line of Business agility, without compromising IT security?
Head of IT Operations
10:50AM - Day 1
Panel: The importance of collaboration for enterprise cybersecurity
- Understanding the unique challenges of cyber security across industry, and that every party in the supply chain needs to understand these risks from chip vendors, cloud providers and software developers to OEM’s and customers.
- How can companies across the ecosystem collaborate to ensure stronger security?
- What influence can different verticals have here – from securing smart cities to connected vehicles, and what are the different considerations for each?
- Analysing the role and efficacy of standards and regulatory organisations in helping manage enterprise cyber security.
End to End security in IoT
- Importance of end to end security
- Challenges of achieving it
- How to address those challenges
Joint Vice-Chair, Smart Buildings Group & Adviser
IoT Security Foundation & TechWorks
12:20PM - Day 1
EMEIA IoT/OT Security & Critical Infrastructure Leader
12:20PM - Day 1
Panel: An E2E approach to tackling data security challenges of the IoT
- Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information
- Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
- What are the different considerations for consumer owned connected device vs. those owned by legal entities?
- Importance of other aspects of IoT security; testing, education of staff and physical security for devices
01:00PM - Day 1
Security Automation & Orchestration for IoT/Enterprise Delivered Through “Intent-Based Networking”
- Introduce the concept of “Intent-Based” Networking (IBN)
- Combining cybersecurity with automation techniques to reduce complexity, lower risk, and improve OPEX
- Ingesting security telemetry and device exhaust, leading to quicker threat detection/containment ability
- Completing the closed loop framework (IBN) to constantly learn, share threat information, and provide the logic to tie actionable responses to behavior (self-managing / self-healing)
Getting the Board on board
How to ensure that cyber education and awareness awareness are prioritised into the Board and Executive Management’s agenda
Director, Security Strategist Northern Europe
03:00PM - Day 1
Security as an Accelerator for Digital Transformation
Organisations embracing digital transformation are disrupting industries by out innovating competitors, winning new customers and stealing market share. Too often security is an afterthought and CISOs are frequently disregarded as detractors from business goals. Join Symantec as we discuss security as a differentiator and share our insights on how security can positively enable digital transformation.
Cyber security for the transport industry
This talk will cover a specific case study from the transport industry around how cyber security affects all parts of the supply chain – from the factory floor, through to connected cars and vehicles themselves. Issues such as addressing customer fears around hacking, upgrading legacy equipment and working with third party providers will be covered.
Director of Industrial Security Solutions
04:00PM - Day 1
Cognitive Security for the Industry 4.0 – Anomaly Detection and Integrity Protection
The Fraunhofer Institute for Secure Information Technology realized a conceptual study to detect attacks and other anomalies by means of Machine Learning, and report those to production control based on monitoring of industrial plants.
- Contrast to conventional Intrusion Detection Systems, this version does not need any type of defined attack patterns
- The continuous evaluation of field bus-, sensor-, production and ERP-data is the basis of the anomaly detection
- Means of autonomous process of machine learning, the system has the capability to recognize the standard range and raises an alarm by leaving it
Biraja Prasad Ghoshal
Deep Learning Evangelist
Tata Consultancy Services
05:00PM - Day 1
MeetUp – Digital Transformation London
This group is for anyone involved or interested in digital transformation. We will cover strategy with a focus on enterprise digital which will include subcategories such as devops, cloud, cybersecurity, agile software engineering,machine learning, lean product development, internet of things ,web, mobile and of course how to improve return on investment using technology.
Artificial Intelligence / Bayesian Deep Learning: why do we need smart data not big data” by Biraja Ghoshal
This talk will provide an introduction to Deep Learning / Artificial Neural Network which, due to relatively recent algorithmic breakthroughs, has become an increasingly popular technique for uncertainty assessment and decision analysis. This session will provide an overview of successful applications (including medical, financial services – risk). What is common to all of these applications is that the Bayesian network models can be built using a combination of uncertainty estimation along with point prediction and (often very limited) data leveraging Active Learning. Big question is what comes after ‘big data’? We will explain why Bayesian network answer in the form of smarter decisions from smart data and causal with estimated uncertainty.