Day 2 - 20 June 2019

Cyber Security – Emerging Tech & Regulations

This session will focus on the impact that new technologies such as blockchain, artificial intelligence and machine learning will have on cybersecurity.  Using case studies from across key verticals, we will examine threats to data, the legal implications of data breaches and the role of standards and regulations.

09:30AM

Talal Rajab

Head of Cyber and National Security

TechUk

Associated Talks:

09:30AM - Day 2

View Cyber Security – Emerging Tech & Regulations: Chair’s welcome and opening comments

View Full Info

Cyber Security – Emerging Tech & Regulations: Chair’s welcome and opening comments

. Talal Rajab, Head of Cyber and National Security, TechUk
Hide Details
More Details

09:50AM

Senior Representative, NCSC NL

Nationaal Cyber Security Centrum

Associated Talks:

09:50AM - Day 2

View Keynote: Evolving cyber intelligence landscapes

View Full Info

Keynote: Evolving cyber intelligence landscapes

  • Role of private, enterprise and governmental agencies in cyber intelligence – how is information shared across these?
  • What is the difference between tactical, technical, strategic and operational cyber threat intelligence?
  • The increasing role of automation, AI and machine learning for gathering and processing intelligence relating to cyber threats
  • Discussion of best practices for gathering and acting upon cyber threat intelligence
. Senior Representative, NCSC NL, , Nationaal Cyber Security Centrum
Hide Details
More Details

10:20AM

Nick Nagle

Head of Information Security

Condé Nast International

Associated Talks:

10:20AM - Day 2

View Building a security ecosystem

View Full Info

Building a security ecosystem

The security challenges Condé Nast face as a media organisation, rapidly evolving to meet the digital demands, plus undertaking an organisation transformation programme to become a single global entity. Such vast and rapid changes require security to match, and a blueprint for a robust foundational integrated security ecosystem will be described, utilising automation and intelligence to grow the security capability while meeting the future demands of the business.

. Nick Nagle, Head of Information Security, Condé Nast International
Hide Details
More Details

10:50AM

Eddie Ekwo

Head of Technical Information Security

Arriva

Associated Talks:

10:50AM - Day 2

View Sharing the responsibility of cyber security across the rail transport industry

View Full Info

Sharing the responsibility of cyber security across the rail transport industry

  • Cybersecurity isn’t just an operator’s problem;
  • Cybersecurity is an issue for industry;
  • Appropriate use of standards can deliver a coordinated approach;
  • Security in depth will fill any gaps;
  • One operator’s approach is considered.
. Eddie Ekwo, Head of Technical Information Security, Arriva
Hide Details
More Details

11:20AM

Networking Break

12:00PM

Jaco Jacobs

Security Senior Principal

Accenture Security

Associated Talks:

12:00PM - Day 2

View Effective security management within multi-cloud environments

View Full Info

Effective security management within multi-cloud environments

How to apply consistent security across multiple tier-one cloud providers

. Jaco Jacobs, Security Senior Principal, Accenture Security
Hide Details
More Details

12:30PM

Richard Mardling

Identity Access Management Director

Unilever

Associated Talks:

12:30PM - Day 2

View Panel: Exploring Identity Access Management

View Full Info

Panel: Exploring Identity Access Management

Despite the best efforts of cyber security professionals to update systems and protect against vulnerabilities, if access to these systems is not managed correctly, attackers could gain access resulting in costly data breaches.  Hence identity & access management (IAM) is a key component of modern cyber security planning and implementation. Controlling the use and issuance of administrative passwords in key.  This panel will analyse the following:

  • What factors need to be considered when implementing IAM systems?
  • The role will technologies like Blockchain, and biometrics have in IAM?
  • How important is IAM for cloud based systems, and what do security professionals have to consider differently?
  • How does privileged access management fit into IAM?
. Richard Mardling, Identity Access Management Director, Unilever
Hide Details
More Details

01:10PM

David Friend

CEO

Wasabi

Associated Talks:

01:10PM - Day 2

View Afternoon Keynote: The Bottomless Cloud – How AI and Abundance Thinking are Going to Change Everything

View Full Info

Afternoon Keynote: The Bottomless Cloud – How AI and Abundance Thinking are Going to Change Everything

The world is at the precipice of one of the most dramatic shifts in history: the transition from an industrial society driven by finite natural resources to one that is based on the near infinite abundance of data. With unimagined increases in data capture and storage a new kind of value is emerging that has the power to profoundly transform our lives, our economy, and our businesses—from personalized medicine and autonomous vehicles, to loyal brands that know what you need before you know to ask for it. In this very near future, every person and digital device will have its own digital-self—a digital twin which knows more about us than we know about ourselves. And each one of these digital twins will require ten times as much digital data as exits in the world today! Your digital-self will be one of your most valuable assets, requiring radical new technologies and approaches for how you own, protect, and share your digital behaviors. Yet, the promise of AI may be delayed by decades without a new way of thinking about data—how we accumulate it, save it, and pay for it; welcome to The Bottomless Cloud, a radical new way to look at the economics and the value of digital data. Fascinating, engaging, and incredibly timely, The Bottomless Cloud provides a front row seat to the future of how we will live, work, and play in the 21st Century.

. David Friend, CEO, Wasabi
Hide Details
More Details

01:40PM

Hema Lakkaraju

Founder and CEO

HAYAG Corp.

Associated Talks:

01:40PM - Day 2

View The emerging role of holistic compliance in healthcare

View Full Info

The emerging role of holistic compliance in healthcare

Privacy, security and health regulation framework in the digital healthcare industry

. Hema Lakkaraju, Founder and CEO, HAYAG Corp.
Hide Details
More Details

01:50PM

Networking Break

03:00PM

Berend Tel

Director

Axxemble

Associated Talks:

03:00PM - Day 2

View Compliance by Design: incorporating security and privacy requirements within processes

View Full Info

Compliance by Design: incorporating security and privacy requirements within processes

As responsibility increases to comply with security and privacy requirements as a result of laws and regulations as well as public opinion and customer demand, organisations are challenged to incorporate such requirements into their business processes. These requirements however impact the entire context of processes: tools, infrastructure, communications, staff etc. Adapting to these new requirements therefore requires a multidisciplinary approach in which all involved stakeholders work together.

In this presentation, an approach is provided that aims to incorporate security and privacy requirements by taking four key elements as the foundation for redesigning processes:
1. Establish trust
2. Innovate rather than protect
3. Use single identity and single data
4. Transparency and compliance
This approach is illustrated using several examples.

. Berend Tel, Director, Axxemble
Hide Details
More Details

03:20PM

Alix Leboulanger

Senior Defense & Security Industry Analyst- Digital Transformation

Frost & Sullivan

View Full Info

Paul Ducklin

Senior Technologist

Sophos

Associated Talks:

10:50AM - Day 2

View Keynote: How to win the cybersecurity arms race

03:20PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

09:50AM - Day 1

View Why crooks love the cloud (and what to do about it)

View Full Info

Dave Palmer

Director of Technology

Darktrace

Associated Talks:

03:20PM - Day 2

View Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

View Full Info

Panel: How artificial intelligence and blockchain are the battlegrounds for the next security wars

  • Artificial intelligence, machine learning, and blockchain, are emerging tech cited as key in an increasingly complex security environment, but what challenges do these technologies pose?
  • Many key players are using security awareness and infrastructure is a key feature to differentiate themselves within the cloud wars, so how will this dictate how the market evolves?
  • As the hyperscalers are moving further up the stack to find the latest battleground – so who is going to come out on top?
  • Real life examples of where AI, ML and Blockchain are being utilised for security
Moderator: . Alix Leboulanger, Senior Defense & Security Industry Analyst- Digital Transformation, Frost & Sullivan
. Paul Ducklin, Senior Technologist, Sophos
. Dave Palmer, Director of Technology, Darktrace
Hide Details
More Details

04:00PM

Session Close