Day 1 - 25 April 2019
Enterprise Security – IOT & Digital Transformation: Chair’s welcome and opening comments
Vulnerability management for enterprises
- Exploitation of known vulnerabilities in software remains the greatest cause of security incidents within the enterprise.
- How can enterprises identify vulnerabilities within their organisations? What tools and methods are available?
- What are key factors to consider during the process, from identification through to prioritisation of fixes?
- Real life examples from across industry.
Senior Sales Executive
10:20AM - Day 1
Keynote: Common cyber security mistakes made by enterprises and how to avoid them
Examining the common mistakes made my enterprises globally, and what business leaders can do to mitigate them. How cyber security can tackle the exponential growth in data from business systems that are incorporating more and more digital technology into their day to day business activities. Covering cloud, big data, AI, IOT and mobile devices and the security sensors meant to protect them from bad agents.
Panel: The importance of collaboration for enterprise cybersecurity
- Understanding the unique challenges of cyber security across industry, and that every party in the supply chain needs to understand these risks from chip vendors, cloud providers and software developers to OEM’s and customers.
- How can companies across the ecosystem collaborate to ensure stronger security?
- What influence can different verticals have here – from securing smart cities to connected vehicles, and what are the different considerations for each?
- Analysing the role and efficacy of standards and regulatory organisations in helping manage enterprise cyber security.
End to End security in IoT
- Importance of end to end security
- Challenges of achieving it
- How to address those challenges
EMEIA IoT/OT Security & Critical Infrastructure Leader
12:20PM - Day 1
Panel: An E2E approach to tackling data security challenges of the IoT
- Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information
- Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
- What are the different considerations for consumer owned connected device vs. those owned by legal entities?
- Importance of other aspects of IoT security; testing, education of staff and physical security for devices
01:00PM - Day 1
Security Automation & Orchestration for IoT/Enterprise Delivered Through “Intent-Based Networking”
- The “Intent-Based Networking” concept
- Leveraging an open standard-based platform approach that consists of generic compute, NFV, and orchestration concepts
- Automating and orchestrating security by using the platform to create reusable templates that maximize accuracy, efficiency, and repeatability (significantly improving OPEX).
- Using this platform approach to address both Enterprise and IoT based use cases
Getting the Board on board
How to ensure that cyber education and awareness awareness are prioritised into the Board and Executive Management’s agenda
Director, Security Strategist Northern Europe
03:00PM - Day 1
Security as an Accelerator for Digital Transformation
Organisations embracing digital transformation are disrupting industries by out innovating competitors, winning new customers and stealing market share. Too often security is an afterthought and CISOs are frequently disregarded as detractors from business goals. Join Symantec as we discuss security as a differentiator and share our insights on how security can positively enable digital transformation.
Cyber security for the transport industry
This talk will cover a specific case study from the transport industry around how cyber security affects all parts of the supply chain – from the factory floor, through to connected cars and vehicles themselves. Issues such as addressing customer fears around hacking, upgrading legacy equipment and working with third party providers will be covered.
Director of Industrial Security Solutions
04:00PM - Day 1
Cognitive Security for the Industry 4.0 – Anomaly Detection and Integrity Protection
The Fraunhofer Institute for Secure Information Technology realized a conceptual study to detect attacks and other anomalies by means of Machine Learning, and report those to production control based on monitoring of industrial plants.
- Contrast to conventional Intrusion Detection Systems, this version does not need any type of defined attack patterns
- The continuous evaluation of field bus-, sensor-, production and ERP-data is the basis of the anomaly detection
- Means of autonomous process of machine learning, the system has the capability to recognize the standard range and raises an alarm by leaving it
Biraja Prasad Ghoshal
Deep Learning Evangelist
Tata Consultancy Services
05:00PM - Day 1
MeetUp – Digital Transformation London
This group is for anyone involved or interested in digital transformation. We will cover strategy with a focus on enterprise digital which will include subcategories such as devops, cloud, cybersecurity, agile software engineering,machine learning, lean product development, internet of things ,web, mobile and of course how to improve return on investment using technology.
Artificial Intelligence / Bayesian Deep Learning: why do we need smart data not big data” by Biraja Ghoshal
This talk will provide an introduction to Deep Learning / Artificial Neural Network which, due to relatively recent algorithmic breakthroughs, has become an increasingly popular technique for uncertainty assessment and decision analysis. This session will provide an overview of successful applications (including medical, financial services – risk). What is common to all of these applications is that the Bayesian network models can be built using a combination of uncertainty estimation along with point prediction and (often very limited) data leveraging Active Learning. Big question is what comes after ‘big data’? We will explain why Bayesian network answer in the form of smarter decisions from smart data and causal with estimated uncertainty.