Cyber Security Infographic A snapshot of key issues to answer the questions “What are CIO’s and CISO’s top security concerns and biggest challenges?” “One of the biggest challenges for CIO’s ...
Infographic Elizabeth Gladen today21 August 2015 10
**** Be kept informed of future events here ****
The Future of Cyber security 2015 is a national cyber security conference for senior professionals that focuses on how organisations can protect themselves, customers, employees and citizens.
This one day cyber security conference is set to provide essential intelligence that enables senior directors and managers to drive their cyber security strategy forward.
Cyberseer will be showcasing the Darktrace Enterprise Immune System alongside example trends and threats from our Darktrace Managed Service, providing the intelligence needed for organisations to cope in the increasingly complex landscape.
If you are attending the show and would like to see the Darktrace technology in action, schedule in advance a demo at the Cyberseer stand on the day: Request a Darktrace Demo
8:30 Registration – Coffee – Networking
9:00 Chairs Opening Address – Mike Loginav
9:05 Government cyber security strategy – Chris Gibson
It has been three years since the government launched its cyber security strategy, backed by £860m of investment up to 2016. Progress was updated in Decemeber 2014. How close are we to delivering its four (below) objectives? What are the key challenges in 2015 and beyond?
9.25 Defence Cyber Protection Partnership – Working together to better protect Defence information
– Daniel Selman
The session will talk about why the DCPP was formed, the work it has done to address the objective of improving the protection from the cyber threat of Defence Information when held in the supply chain. It will discuss the three work streams of Information Sharing, Education and Awareness and Measurements and Standards with the focus on the latter’s development of the Cyber Security Model and its component parts of a Risk Assessment process, Supplier Assurance questionnaire and Defence Cyber Profiles and how these work to set a risk level for a contract, set out the assurance measures a supplier must correspondingly take, how this compliance will be measured and how it aligns with our assurance activities in Defence, wider government and beyond.
9.40 Richard Back Presentation Slot
9.55 Defending your King with Pawns – An Adaptice Cyber Defense Strategy – Nick Pollard
In Chess, the placement of Pawns int eh first few moves can determine if the strategy you defined needs to be altered to engineer the same outcome, or be completely redefined. Knowing the activity of your Endpoints in singular understanding or in aggregate can help define or alter your cyber defence strategy, ensuring you are executing a strategy that focuses on filling the gaps of your latest security weaknesses. Endpoint intelligence gives you a means to detect a compromise while your perimeter security framework is being implemented and defend against an attack should one occur.
10.30 Coffee & networking
11.00 Seminar Stream 1 – Attend 1 of 2 Industry Expert Sessions
12.00 Lunch & Networking
13.00 The Hacker Zone
The illegal hacking macket is thriving – and it is costing UK businesses £34bn a year, according to a study by the Centre for Economics and Business Research (CEBR). The costs go much further than revenue, with brand damage and lost IP also forming part of the fall out. It is essential that firms have an understanding of the growing threat.
13.05 Latest Hacking Insights from Cal Leeming
13.20 Squads, Tribes and Security Culture at Skyscanner – Stuart Hirst
Skyscanner is a rapidly growing yet agile internet business which has grown from 100 employees to 750 in 4 years. How does security fit into this rapidly changing organisation and what strategies does it employ? Stu Hirst is the IT Security Manager & Squad Lead and will explain not only how security works at Skyscanner, but will also give real-life examples of incidents, threats and how the company deals with these. Stu won’t tell you stories of what has happened to other organisations. We’ve all read those stories. He’ll explain what he deals with on a daily basis and how strategy in a DevOps environment is helping shape a new security posture for many organisations.
13.35 Quenching The Big Data Thirst – Adam Blake
The insecurity of legacy systems that many large organisations across every sector, from the financial industry to the manufacturing still rely on to this day are often poorly documented, badly maintained, and yet are business critical assets.
This presentation will highlight the risks of leaving these assets unmaintained with some demos of how they can be compromised and how this can negatively impact business operations.
13.50 Your Legacy Is Here To Haunt You
14.05 Bad guys are exploiting your DNS: here’s how to stop them – Dr Malcolm Murphy
DNS is a great tool for bad guys to exploit. They can use it for DDoS attacks, propagating malware and stealing data from your organisation. And they are: it’s up there with web traffic as the most popular attack vector.
Most people are blissfully unaware that this is happening in their organisation. We will talk about some of the threats and risks, and steps you should take to protect your organisation’s data and reputation.
14.20 eBuyer Case Study – Tarun Samtani
14.30 Ixia Presentation
14.45 Presentation From Neira Jones
15.20 Coffee & Networking
15.50 Banking Case Study From RBS – Scott Barnett
16.05 IT WASN’T ME, IT WAS BENNETT ARRON
Several years ago, award-winning and stand-up comedian Bennett Arron was in serious debt. He owed thousands of pounds to mobile phone companies, catalogues and department stores. Only it wasn’t him. Bennett was a victim of Identity Theft, the fastest growing crime in the UK. This theft resulted in Bennett and his pregnant wife becoming penniless and homeless.
Years later, Bennett wrote a comedy show about his experience. The show was critically acclaimed at the Edinburgh Festival and led to Bennett being asked to direct and present a Documentary for Channel 4. The Documentary, How To Steal An Identity, was Pick of The Week in The Guardian and The Telegraph and was called ‘Fascinating and Disturbing’ by the TV Times. IT went on to be shortlisted for a BAFTA.
In the Documentary, Bennett proved the ease of ID theft, by first stealing the identities of the general public and then stealing the identity of the then Home Secretary, Charles Clarke.
This action resulted in Bennett being arrested in a dawn raid by Scotland Year and given the code-named Operation Hydrogen.
16.30 Chairs Closing Remarks – Mike Loginov
Prices available on request. Request Your Discounted Delegate Ticket
Written by: Elizabeth Gladen
JOIN THIS WEBINAR & LEARN HOW TO TAKE THE SWEAT OUT OF THE SOC. Date: Tues 13th August | Time: 11:00 – 12:00 GMT Listen to Cyberseer’s ‘Taking the Sweat out of the SOC’ webinar where we discuss Machine Learning Enabled Analytics and Services that help eliminate alert fatigue, close the skills gap and improves visibility. Your security ...
© Copyright Cyberseer - All Rights Reserved.