Day 2 - 14 November 2019

Cyber Security – Emerging Technology

This session will focus on the impact that new technologies such as blockchain, artificial intelligence and machine learning will have on cybersecurity.  Using case studies from across key verticals, we will examine threats to data, cyber intelligence and access management.


Cyber Security – Emerging Tech & Regulations: Chair’s welcome and opening comments

Hide Details


Evolving cyber intelligence landscapes

  • Role of private, enterprise and governmental agencies in cyber intelligence – how is information shared across these?
  • What is the difference between tactical, technical, strategic and operational cyber threat intelligence?
  • The increasing role of automation, AI and machine learning for gathering and processing intelligence relating to cyber threats
  • Discussion of best practices for gathering and acting upon cyber threat intelligence
Hide Details
More Details


Panel: Implementing DevSecOps in Enterprise

  • Discussing the need for DevSecOps for your security team?
  • Reconciling the goals and needs of your organisation with the ever shifting cyber security landscape.
  • Barriers to security: lack of security ‘culture’ in your organisation, getting C level buy in.
  • Examples of success from DevSecOps teams.
Hide Details
More Details


Keynote: Changing security culture

Hide Details


Networking Break


Panel: Exploring Identity Access Management

Despite the best efforts of cyber security professionals to update systems and protect against vulnerabilities, if access to these systems is not managed correctly, attackers could gain access resulting in costly data breaches.  Hence identity & access management (IAM) is a key component of modern cyber security planning and implementation. Controlling the use and issuance of administrative passwords in key.  This panel will analyse the following:

  • What factors need to be considered when implementing IAM systems?
  • The role will technologies like Blockchain, and biometrics have in IAM?
  • How important is IAM for cloud based systems, and what do security professionals have to consider differently?
  • How does privileged access management fit into IAM?
Hide Details
More Details


Afternoon Keynote: The rise of AI led cyber security and threat detection – stopping attacks before they happen

  • How machine learning and artificial intelligence can be used to improve threat detection and management
  • Machine learning going beyond traditional SIEM (security information and event management) methods
  • Why multi-cloud and more complex cloud environments mean more attack vectors
Hide Details
More Details


Networking Break


Case Study: Cyber Security

Hide Details


Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

  • Artificial intelligence, machine learning, and blockchain, are emerging tech cited as key in an increasingly complex security environment, but what challenges do these technologies pose?
  • Many key players are using security awareness and infrastructure is a key feature to differentiate themselves within the cloud wars, so how will this dictate how the market evolves?
  • As the hyperscalers are moving further up the stack to find the latest battleground – so who is going to come out on top?
  • Real life examples of where AI, ML and Blockchain are being utilised for security
Hide Details
More Details


Is quantum encryption the key to cyber security?

Hide Details


Session Close