Day 1 - 28 November 2018
Enterprise Security – IOT & Digital Transformation: Chair’s welcome and opening comments
Senior Director of IoT Security Strategy
09:50AM - Day 1
Keynote: Unlock the IoT’s potential by establishing trust
IoT projects, the backbone of enterprise digital transformation, have the tantalizing potential to improve operations and deliver customer value. However, if you can’t trust your IoT data and the “things” that produce it, there’s no point in undertaking the massive effort to buy and connect devices, collect and analyze their data, or worst of all make business decisions based on questionable data. This session will reveal strategies to enable trust in the IoT, turning it from a barrier and source of new vulnerabilities to a competitive differentiator.
Common cyber security mistakes made by enterprises and how to avoid them
The technological disruption and innovation is bringing in a rapid shift to the global threat landscape. As enterprises are preparing to get better equipped with tools, technologies and resources to reduce their cyber security risks, so are the adversaries trying to stay ahead of the game. The common security problems at the core still remain the same; only the scale, the emerging technologies and the risks to the business have evolved over time. This presentation will cover some of the most common cyber security mistakes made by enterprises and the business impacts that come along with them. With enterprises moving away from a perimeter-based approach to zero trust networks, the security strategy is only as strong as the weakest link. Key takeaways for those attending include how to stay ahead of the conventional attacks that usually occur from common misses in a company’s security strategy and the necessity to plan for actions that could be potential emerging risks for organizations
Global Director, Data Protection
10:50AM - Day 1
Chief Security Architect
10:50AM - Day 1
12:00PM - Day 2
Panel: The importance of collaboration for enterprise cybersecurity
- Understanding the unique challenges of cyber security across industry, and that every party in the supply chain needs to understand these risks from chip vendors, cloud providers and software developers to OEM’s and customers.
- How can companies across the ecosystem collaborate to ensure stronger security?
- What influence can different verticals have here – from securing smart cities to connected vehicles, and what are the different considerations for each?
- Analysing the role and efficacy of standards and regulatory organisations in helping manage enterprise cyber security.
Co-Founder & CEO
12:00PM - Day 1
The Security Status Quo is Killing Us
I get it, it is tough to move on from how we did things yesterday. In the security world, this is particularly true, and it is really holding us back from fighting ever advancing and sophisticated security threats. Today we are approaching 50 Billion devices on the Internet, which amounts to 7 per human. We must change how we approach the problem of securing this mess.
In this session, Mike Armistead will talk about many of these changes that we must adopt: For example reevaluating security operations and relying on entry-level security professionals to perform console monitoring. If the human analyst is distracted, fatigued, lacks domain knowledge, or is biased, the alert is likely to be dismissed without further review. We must shift from human-led security to machine-led security, from black and white thinking to working in the gray areas, and applying mathematics and probability theory to advance our security operations.
Senior Software Engineer, Security
12:20PM - Day 1
12:20PM - Day 1
Director of Technology, CTO Office
12:20PM - Day 1
Head of IoT Security
Cloakware by Irdeto
12:20PM - Day 1
Panel: An E2E approach to tackling data security challenges of the IoT
- Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information
- Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
- What are the different considerations for consumer owned connected device vs. those owned by legal entities?
- Importance of other aspects of IoT security; testing, education of staff and physical security for devices
IoT Security: PKI and Beyond
This presentation will discuss best practices for identifying and solving the practical security challenges encountered by businesses embarking on an Internet of Things (IoT) deployment. It will delve into the benefits of using Public Key Infrastructure (PKI) technology and its key role in providing reliable identity assurance and encryption for billions of endpoints. It will also explore where traditional enterprise use of PKI presents challenges in IoT environments and the alternative services and approaches organizations should consider to optimally establish trust in their IoT ecosystem.
Director Product Management
02:40PM - Day 1
Network Security Analytics & Centralized Management In IoT and Cloud World
Business Development Manager, IoT
03:00PM - Day 1
Securing the Smart Factory and Critical Infrastructure
The past few years have seen an increase in Cyber threats and attacks in the industrial and energy sectors. Lanner describes the best practices of securing the devices and networks used to provide services and some of the new products to prevent and manage these threats.
Beyond IT: DOE Case Study
Advancing cybersecurity is a core priority for the Department of Energy (DOE). DOE is approaching the cybersecurity challenge as an enterprise effort, incorporating assets and capabilities from across our programs and National Laboratories. The DOE Cybersecurity Strategy (2018-2020) defines a highly collaborative approach to strengthening the cybersecurity and resilience of the Department’s networks and systems including the operational technology assets it owns.
- Informed and engaged customers are more likely to become invested partners.
- Managing risks to the Department’s own science, technology, nuclear security, and energy infrastructure.
- Approach to deliver high quality IT and cybersecurity, continuously improve our cybersecurity posture, transition from IT owner to IT broker, and excel as stewards of taxpayer dollars.