skip to Main Content
Visit Cyberseer At Future Of Cyber Security 2015 Event Web Banner

Cyberseer at The Future of Cyber Security 2015

**** This event has now taken place ****

**** Be kept informed of future events here ****

Event Date: 24th September

Location: Prospero House Conference Centre, Central London

The Future of Cyber security 2015 is a national cyber security conference for senior professionals that focuses on how organisations can protect themselves, customers, employees and citizens.

This one day cyber security conference is set to provide essential intelligence that enables senior directors and managers to drive their cyber security strategy forward.

Cyberseer will be showcasing the Darktrace Enterprise Immune System alongside example trends and threats from our Darktrace Managed Service, providing the intelligence needed for organisations to cope in the increasingly complex landscape.

Book a Darktrace & Managed Service Demo at the show:

If you are attending the show and would like to see the Darktrace technology in action, schedule in advance a demo at the Cyberseer stand on the day: Request a Darktrace Demo

Event Programme:

8:30        Registration – Coffee – Networking
9:00        Chairs Opening Address – Mike Loginav

  • Overview of the latest cyber threats and new methods to protect against them
  • The risks and costs of cybercrime to UK businesses
  • Preparing business and the government: skills and mock cyber attacks

9:05        Government cyber security strategy – Chris Gibson

It has been three years since the government launched its cyber security strategy, backed by £860m of investment up to 2016. Progress was updated in Decemeber 2014. How close are we to delivering its four (below) objectives? What are the key challenges in 2015 and beyond?

  • Making the UK one of the most secure places in the world to do business in cyberspace
  • Making the UK more resilient to cyber attack and better able to protect our interests in cyberspace
  • Helping shape an open, vibrant and stable cyberspace that supports open societies
  • Building the UK’s cyber security knowledge, skills and capability

9.25        Defence Cyber Protection Partnership – Working together to better protect Defence information

– Daniel Selman

The session will talk about why the DCPP was formed, the work it has done to address the objective of improving the protection from the cyber threat of Defence Information when held in the supply chain. It will discuss the three work streams of Information Sharing, Education and Awareness and Measurements and Standards with the focus on the latter’s development of the Cyber Security Model and its component parts of a Risk Assessment process, Supplier Assurance questionnaire and Defence Cyber Profiles and how these work to set a risk level for a contract, set out the assurance measures a supplier must correspondingly take, how this compliance will be measured and how it aligns with our assurance activities in Defence, wider government and beyond.

9.40        Richard Back Presentation Slot
9.55        Defending your King with Pawns – An Adaptice Cyber Defense Strategy – Nick Pollard

In Chess, the placement of Pawns int eh first few moves can determine if the strategy you defined needs to be altered to engineer the same outcome, or be completely redefined. Knowing the activity of your Endpoints in singular understanding or in aggregate can help define or alter your cyber defence strategy, ensuring you are executing a strategy that focuses on filling the gaps of your latest security weaknesses. Endpoint intelligence gives you a means to detect a compromise while your perimeter security framework is being implemented and defend against an attack should one occur.

10.10     Q&A
10.30     Coffee & networking
11.00     Seminar Stream 1 – Attend 1 of 2 Industry Expert Sessions
12.00     Lunch & Networking
13.00     The Hacker Zone

The illegal hacking macket is thriving – and it is costing UK businesses £34bn a year, according to a study by the Centre for Economics and Business Research (CEBR). The costs go much further than revenue, with brand damage and lost IP also forming part of the fall out. It is essential that firms have an understanding of the growing threat.

13.05     Latest Hacking Insights from Cal Leeming
13.20     Squads, Tribes and Security Culture at Skyscanner – Stuart Hirst

Skyscanner is a rapidly growing yet agile internet business which has grown from 100 employees to 750 in 4 years. How does security fit into this rapidly changing organisation and what strategies does it employ? Stu Hirst is the IT Security Manager & Squad Lead and will explain not only how security works at Skyscanner, but will also give real-life examples of incidents, threats and how the company deals with these. Stu won’t tell you stories of what has happened to other organisations. We’ve all read those stories. He’ll explain what he deals with on a daily basis and how strategy in a DevOps environment is helping shape a new security posture for many organisations.

13.35     Quenching The Big Data Thirst – Adam Blake

The insecurity of legacy systems that many large organisations across every sector, from the financial industry to the manufacturing still rely on to this day are often poorly documented, badly maintained, and yet are business critical assets.

This presentation will highlight the risks of leaving these assets unmaintained with some demos of how they can be compromised and how this can negatively impact business operations.

13.50     Your Legacy Is Here To Haunt You
14.05     Bad guys are exploiting your DNS: here’s how to stop them – Dr Malcolm Murphy

DNS is a great tool for bad guys to exploit. They can use it for DDoS attacks, propagating malware and stealing data from your organisation. And they are: it’s up there with web traffic as the most popular attack vector.

Most people are blissfully unaware that this is happening in their organisation. We will talk about some of the threats and risks, and steps you should take to protect your organisation’s data and reputation.

14.20     eBuyer Case Study – Tarun Samtani
14.30     Ixia Presentation
14.45     Presentation From Neira Jones
15.05     Q&A
15.20     Coffee & Networking
15.50     Banking Case Study From RBS – Scott Barnett
16.05     IT WASN’T ME, IT WAS BENNETT ARRON

Several years ago, award-winning and stand-up comedian Bennett Arron was in serious debt. He owed thousands of pounds to mobile phone companies, catalogues and department stores. Only it wasn’t him. Bennett was a victim of Identity Theft, the fastest growing crime in the UK. This theft resulted in Bennett and his pregnant wife becoming penniless and homeless.

Years later, Bennett wrote a comedy show about his experience. The show was critically acclaimed at the Edinburgh Festival and led to Bennett being asked to direct and present a Documentary for Channel 4. The Documentary, How To Steal An Identity, was Pick of The Week in The Guardian and The Telegraph and was called ‘Fascinating and Disturbing’ by the TV Times. IT went on to be shortlisted for a BAFTA.

In the Documentary, Bennett proved the ease of ID theft, by first stealing the identities of the general public and then stealing the identity of the then Home Secretary, Charles Clarke.

This action resulted in Bennett being arrested in a dawn raid by Scotland Year and given the code-named Operation Hydrogen.

16.30     Chairs Closing Remarks – Mike Loginov

Register to attend the event through Cyberseer & receive a 50% discount.

Prices available on request. Request Your Discounted Delegate Ticket

Get in touch

Learn more about our cyber security solutions or have an enquiry about a Cyber Security Professional speaking at your next event, get in touch: e-mail [email protected]

Search