Agenda


The European Information Security Summit 2018 (TEISS)

TEISS 2018 features over 60 sessions in 3 distinctive streams

OPENING PLENARY – LONDON SUITE

KEYNOTE: Are you already breaching the Data Protection Bill 2017?

  • What can’t I do under the Data Protection Bill? Encouraging innovation while protecting privacy
  • What’s the risk of a criminal offence? Avoiding the unlimited fines
  • Outlining the exemptions designed to safeguard sensitive sectors
09:10

KEYNOTE: Why cyberthreats could kill your digital transformation

We live in a connected world, and many organizations have responded with digital transformation programs encompassing cloud, remote endpoints, shared networks, and more.  How long can these connected systems and processes survive in a world of next generation, increasingly stealthy and complex cyber threats?

This keynote will consider the threats facing digitally-powered businesses today and in the coming years – and how the security industry can help them address these threats. Not just through multi-layered, machine-learning and intelligence-based protection, but, equally importantly, through collaboration – with each other and with the business community – to share intelligence, build skills, and ensure security is built in from the very start of every new product and service.

by Adam Maskatiya, General Manager UK & Ireland, Kaspersky Lab Show Profile

09:35

Announcing the TEISS Awards

  • Nominated candidates will discover in this session which other entries are shortlisted alongside theirs
  • Conference delegates will be invited to review and judge these entries online after the conference
  • Winners of the inaugural Information Security Peer Award will be declared and celebrated at a ceremony in June

by Stephen Citron, Director, The Peer Awards Show Profile

10:50

Introductions

10:55

Refreshment Break & Networking

11:00

Roundtables

11:30

Workshop

11:30

Lunch & Networking

12:30
CHAIR: Martin Smith, Founder, The Security Company

CASE STUDY: People, the strongest link

  • Transforming perceptions of people’s role in your organisation’s security
  • What security education, awareness and training can do, and what it can’t
  • Innovating cyber security education to make it more effective

by Emma W, People-Centered Security Team Lead, National Cyber Security Centre Show Profile

13:35

BUSINESS UPDATE: Board regulatory requirements & liability

14:00

HEAD TO HEAD: Is training a waste of money?

Should you spend your budget on training or technology? Which has a greater chance of mitigating incidents? Which has a better ROI?

This head-to-head will champion the two approaches to identify the best areas of cyber security investment.

by Vijay Rathour, Partner, Grant Thornton Show Profile

by Martin Smith, Founder, The Security Company Show Profile

by Raef Meeuwisse, External Relations Director & Author of 'Cybersecurity for Beginners', Isaca London Chapter Show Profile

by Simon Townsend, Chief Technologist EMEA, Ivanti Show Profile

by Andrew Rice, Information Security Strategist, Interpublic Group Show Profile

14:25

Introductions

15:25

Refreshment Break & Networking

15:30

CASE STUDY: Improving compliance in order to minimise incidents

  • The single-funnel approach: making reporting easy and accessible
  • Making minor improvements to effect significant behavioural change within your staff

by Evie Monnington-Taylor

16:00

HOW TO: Make the employee the first line of defence

  • Creating an engaging training programme to improve prompt incident recognition
  • Five minor improvements to effect behavioural change within your staff

by Mark Brown, MD Financial Markets, Initiative Lead - Cyber Security, ING Show Profile

16:50
CHAIR: Ed Moyle, Director Thought Leadership, ISACA

BUSINESS UPDATE: Developing technology & evolving security

by Tom Salmon, Customer Engineer for Google Cloud Platform, Google Show Profile

13:35

BUSINESS UPDATE: The future impact of AI in cybercrime

The risks from the digital era have changed. We should now expect attacks on enterprise physical assets as well as the deliberate undermining of data-driven strategic decisions aimed to cause damage in the long term. AI and machine learning developments offer new opportunities for resilience across the whole digital business but will how will these same developments by used by digital criminals?

by Dave Palmer, Director of Technology, Darktrace Show Profile

14:00

PANEL DISCUSSION: The pros and cons of implementing AI as a cyber security measure

  • Using AI as a data discovery tool
  • Is AI purely a tool for speeding information or will it change the management of cyber space?
  • How much of a risk is it? Preparing for the ways it can be turned against us

by GP Singh, Global Head of NPL - AI & Robotics, Deutsche Bank Show Profile

by Akhil Lalwani, Head of Data Insights and Innovation, Prudential Show Profile

by Sue Daley, Head of Programme, TechUK Show Profile

14:25

Introductions

15:25

Refreshment Break & Networking

15:30

CASE STUDY: Improving incident detection through capturing new behaviour analytics

  • Using technology to protect ‘boxes from brains’ (and vice versa) through advanced communications
  • Moving from legacy detection techniques to full-spectrum behaviour analytics across the enterprise
  • Integrating a suite of sensors and analysis to build a corporate immune system of automatic actions

by Dr Mils Hills, Director, Centre for Security, Crisis, Risk Advisory and Management, University of Northampton Show Profile

16:00

As attackers evolve, so must machines: advancing machine learning beyond the hype

The demand for machine learning (ML) in security is growing fast. There are countless approaches, but there’s also a lot of hype. This talk provides a frank assessment of the strengths and weaknesses of static analysis, decompilation, detonation, in-context analysis, and other emerging approaches, all grounded in real-world examples and specific algorithmic details.

by a speaker from Carbon Black

16:25

TOMORROW’S CYBER: What quantum computing means for cyber security

  • How soon will quantum computing become a corporate reality?
  • Slowing down the hackers: the impact of quantum computing on encryption

by Carlos Perez-Delgado, Lecturer in Computing, University of Kent Show Profile

16:50
CHAIR: A representative from the IoT Security Foundation

TOMORROW’S CYBER : 12 IoT controls for auditing security on connected devices

In the near future IoT devices will carry a white goods equivalent rating scale, similar to washing machines and refrigerators. Instead of energy usage, manufacturers will be measured on the number and type of security controls they have implemented. To begin the journey on IoT control standardisation, this presentation lists 12 IoT controls to provide a simple method to audit IoT devices which focuses on the device’s environment of use.

by Yiannis Pavlosoglou, Executive Director of Cyber Resilience, UBS Show Profile

13:35

BUSINESS UPDATE: Estate management & device monitoring for IoT

14:00

SPRINGBOARD DISCUSSION: Taking responsibility for IoT beyond your business

  • Society 5.0 – integrating man and machine
  • The threats and opportunities of IoT security
  • Securing big urban data and critical national infrastructure in smart environments

by Angeline Hayles-Henderson, Solicitor, Birmingham City Council Show Profile

by Julie Alexander, Director, Urban Development & Smart Cities, Siemens Show Profile

by Peter Warren Show Profile

by Dr. Martin Schulz, Senior Research Fellow, Fujitsu Research Institute Show Profile

14:25

Introductions

15:25

Refreshment Break & Networking

15:30

CASE STUDY: Broadening your risk awareness of the IoT attack surface

  • Cataloguing the devices vulnerable to hacking, who in your organisation is buying them, and where they are
  • Guarding connected devices against DDoS attacks
  • Planning for idiosyncratic hacks: how can you prevent a smart car from being run off the road?

by Chad Childers, Connected x Security, Ford Motor Company Show Profile

16:00

BUSINESS UPDATE: Patching & malware vaccines for IoT devices

16:25

TOMORROW’S CYBER: The future of smart systems

  • Predicting the impact of connected systems on social behaviour and technology over the next five years
  • Which industries will survive? Which will need to evolve?

by Cam Macomber, Global Head of Threat Intelligence, Philips Show Profile

16:50

NETWORKING

Drinks Reception

17:15
CHAIR: Martin Smith, Founder, The Security Company

Introductions

09:00

CASE STUDY: Designing the human element into eServices

  • Overcoming legacy systems to implement Smart changes
  • Creating an E-State: how the Estonian government improved national cyber security

by Crystal LaGrone, Department of Privacy Technologies, Cybernetica Show Profile

09:10

CASE STUDY: Improving cyber hygiene within your workforce through effective risk management

by Martin Eber, Head of Information Security Risk, Asia Pacific, HSBC Show Profile

09:40

Refreshment Break & Networking

10:30
CHAIR: Ed Moyle, Director Thought Leadership, ISACA

Introductions

09:00

BUSINESS UPDATE: Data classification

by David Topping, Data and Information Security Specialist Show Profile

09:10

HOW TO: Manage third party data protection

 

 

09:40

HOW TO: Fight back against phishing

  • Identifying patterns from the tide of spam: who’s being targeted, how, and where from?
  • Using this information to improve defences and follow up on attacks

by Lesley Marjoribanks, Head of Ethical Phishing, Royal Bank of Scotland Show Profile

10:05

Refreshment Break & Networking

10:30
CHAIR: A representative from the IoT Security Foundation

Introductions

09:00

CASE STUDY: Ethics and IoT – a new generation of smart cities

  • Designing delivery systems from scratch: Google’s Quayside Development in Toronto
  • Assessing the risks attendant in advanced data collection
  • Exploring an ethical framework for IoT data gathering and usage
  • What can be done to mitigate the information being passively taken by companion robots such as the Amazon Echo and the Roomba?

by Professor Tom Sorell, Professor of Politics and Philosophy, University of Warwick Show Profile

09:10

BUSINESS UPDATE: Authenticating IoT devices

09:40

TOMORROW’S CYBER: On the Internet of Things, no one knows you’re a fridge

2017 has seen escalating cyber attacks which commoditised cybercrime into the next ‘as-a-service’, and huge data breaches involving millions of citizens have become the new norm. Despite the volume of cyber attacks, we are experiencing low attacker capability. Alongside this, many organisations are trying to understand how the Internet of Things can be used to increase productivity and reduce costs. As attacks evolve, what happens when we add IoT to the mix? What will future attacks look like and how can we defend against them?

by Paul Heffernan, Group CISO, Unipart Group Show Profile

10:05

Refreshment Break & Networking

10:30

DISCUSSION FORUMS

Industry-specific Fishbowl Discussions

11:15

Disruptive Start-Up Pecha Kucha

11:15

Workshop 1

11:15

Workshop 2

11:15

Lunch & Networking

12:15

CLOSING PLENARY – LONDON SUITE

The TEISS Peer Award Shortlist Showreel

Conference delegates will be given a first glimpse of a selection of the innovative nominated entries

13:30

KEYNOTE: The next generation of online security

  • Protecting online identities in an increasingly connected world: what are the major risks and how can you mitigate them?
  • Moving away from the old methods: what will tomorrow’s security look like, and what standards will they have to meet?

by a speaker from Yubico

13:40

KEYNOTE: Outlining the impact of different cyber threats on the global economy

by David Nordell, Senior Vice President, International Strategy, Policy & Law, Centre for Strategic Cyberspace & Security Science Show Profile

14:10

Interactive incident response simulation

Your organisation learned it has suffered a cyber breach in an extremely public manner. Press are demanding an explanation or Social Media will fill the silence. You need to investigate and mitigate from further damage, but will your collective responses and decisions limit the damage of this breach? See how your efforts fair during this fast-paced cyber breach simulation.

by Steve Watt, CIO, University of St Andrews Show Profile

14:40

Closing Remarks

15:50
16:00 Close of Conference
back to top

Copyright © Lyonsdown Ltd. 2016. All rights reserved.