OPENING PLENARY – LONDON SUITE
We live in a connected world, and many organizations have responded with digital transformation programs encompassing cloud, remote endpoints, shared networks, and more. How long can these connected systems and processes survive in a world of next generation, increasingly stealthy and complex cyber threats?
This keynote will consider the threats facing digitally-powered businesses today and in the coming years – and how the security industry can help them address these threats. Not just through multi-layered, machine-learning and intelligence-based protection, but, equally importantly, through collaboration – with each other and with the business community – to share intelligence, build skills, and ensure security is built in from the very start of every new product and service.09:35
Should you spend your budget on training or technology? Which has a greater chance of mitigating incidents? Which has a better ROI?
This head-to-head will champion the two approaches to identify the best areas of cyber security investment.14:25
by Evie Monnington-Taylor16:00
The risks from the digital era have changed. We should now expect attacks on enterprise physical assets as well as the deliberate undermining of data-driven strategic decisions aimed to cause damage in the long term. AI and machine learning developments offer new opportunities for resilience across the whole digital business but will how will these same developments by used by digital criminals?14:00
The demand for machine learning (ML) in security is growing fast. There are countless approaches, but there’s also a lot of hype. This talk provides a frank assessment of the strengths and weaknesses of static analysis, decompilation, detonation, in-context analysis, and other emerging approaches, all grounded in real-world examples and specific algorithmic details.
by a speaker from Carbon Black16:25
In the near future IoT devices will carry a white goods equivalent rating scale, similar to washing machines and refrigerators. Instead of energy usage, manufacturers will be measured on the number and type of security controls they have implemented. To begin the journey on IoT control standardisation, this presentation lists 12 IoT controls to provide a simple method to audit IoT devices which focuses on the device’s environment of use.13:35
2017 has seen escalating cyber attacks which commoditised cybercrime into the next ‘as-a-service’, and huge data breaches involving millions of citizens have become the new norm. Despite the volume of cyber attacks, we are experiencing low attacker capability. Alongside this, many organisations are trying to understand how the Internet of Things can be used to increase productivity and reduce costs. As attacks evolve, what happens when we add IoT to the mix? What will future attacks look like and how can we defend against them?10:05
CLOSING PLENARY – LONDON SUITE
Conference delegates will be given a first glimpse of a selection of the innovative nominated entries13:30
by a speaker from Yubico13:40
Your organisation learned it has suffered a cyber breach in an extremely public manner. Press are demanding an explanation or Social Media will fill the silence. You need to investigate and mitigate from further damage, but will your collective responses and decisions limit the damage of this breach? See how your efforts fair during this fast-paced cyber breach simulation.14:40