Conference Day 1
8:50 am - 9:00 am DEFENCE IQ WELCOME REMARKS
9:00 am - 9:10 am CHAIRMAN’S OPENING REMARKSBharat Thakrar - Head of Business And Cyber Resilience BT Global Services
9:10 am - 9:50 am IMPLEMENTING AND INVESTING IN THREAT INTELLIGENCE SOLUTIONS
- Collecting threat intelligence from internal and external sources
- Correlation of the data and risk prioritisation
- Distributing intelligence across multi-vendor security controls, across the enterprise
- Gaining greater visibility into the IT landscape to enable appropriate and swift action
9:50 am - 10:30 am UNDERSTANDING THE INTELLIGENCE CYCLE AND ITS ROLE IN THE PRIVATE SECTORJon Gray - Cyber Threat Intelligence Manager PWC
- Exploring how the military- specifically the Intelligence Corps- utilise the intelligence cycle to provide top level overview of threats
- What lessons can the private sector learn from how the military uses intelligence?
- What makes retired Intelligence Corps personnel so desirable in the private sector for threat intelligence roles?
Jon GrayCyber Threat Intelligence Manager
10:30 am - 11:00 am MORNING COFFEE AND NETWORKING
11:00 am - 11:40 am HOW TO EFFECTIVELY MAKE USE OF THREAT INTELLIGENCE ON A GLOBAL SCALE: THE CITI BANK EXPERIENCE
- Training and hiring the correct personnel for threat intelligence teams
- Creating coherent threat intelligence feeds that avoid the sharing of millions of endpoints simultaneously
- Building faith in the role of threat intelligence in the support of cyber security strategy by the rapid correction of false positives through automated feedback loops
- Advanced analysis and meaningful data-driven visuals
11:40 am - 12:20 pm Cyber Threat Intelligence: A Day at the Beach
D-Day was no “Day at the Beach”: it took planning, coordination, logistics, and intelligence to bring it all together. Cyber Threat Intelligence programs can learn a lot from history and this talk will walk participants through threat intelligence operations and management with concrete examples of security operations workflows.
12:20 pm - 1:20 pm NETWORKING LUNCH
1:20 pm - 2:00 pm CREATING DIGESTABLE THREAT INTELLGIENCE REPORTS FOR THE BOARD
- Translating raw threat intelligence data into succinct reports
- Providing concise and actionable intelligence to the board to advise cyber security strategy
- Highlighting actions and the ROI of strategic decisions made on the back of threat intelligence data
2:00 pm - 2:40 pm DEVELOPING ‘ACTIONABLE’ CYBER THREAT INTELLIGENCE
- Availability of real-time intelligence can help organisations prevent and contain the impact of cyber attacks
- Developing greater maturity in an organisation’s data gathering and processing capabilities and how automation can be leveraged to better filter and highlight information that is directly relevant to important risk areas
- Developing a situational awareness of the threat environment and how continuous monitoring can help capture the risk signals and indicators across the ecosystem
2:40 pm - 3:10 pm AFTERNOON TEA AND NETWORKING
3:10 pm - 3:50 pm PANEL DISCUSSION: ARTIFICIAL INTELLIGENCE & MACHINE LEARNING: CYBER SECURITY RISK VS OPPORTUNITY?
- Effectively leveraging disruptive technologies to provide supporting capability to organisations’ threat intelligence platforms
- Negating the effect of false positives by removing the sense of alert fatigue and a decrease in sensing
- Assessing the risks of AI when used alongside a network: Risk of insecure configuration, poor AI authentication leading to new attack vectors or, in the worse-case scenario, AI being directly compromised to turn against people and the services we rely on
3:50 pm - 4:20 pm Machine Learning and AI: Saving Security or Job Stealing Digital Overlords?
Headlines suggest that the future of the IT department (including information security) looks to be increasingly reliant upon machines doing the work, courtesy of the adoption and explosion of automation technologies, artificial intelligence and machine learning. How capable can machines ultimately become in securing businesses from an increasing array of threats? What role does this leave for humans?
This presentation will explore the rise in popularity of artificial intelligence generally, what it means for businesses and its potential to improve efficiency and security. Which areas of security strategy may have the most to gain and lose in this transformation?
This presentation will:
•Consider the power of AI in threat intelligence, security operations and incident response
•Discuss how AI and predictive analytics can lower risk
•Question whether automation will always require the human factor
4:20 pm - 5:00 pm CYBER SECURITY, TERRORISM, AND BEYOND: ADDRESSING EVOLVING THREATS TO THE HOMELANDTodd Renner - London Assistant Legal Attaché FBI
- Working with counterparts to predict and prevent attacks, rather than simply react after the fact
- Using technical capabilities and traditional investigative techniques—such as sources and wiretaps, surveillance, and forensics—to fight cyber crime
- Coordinating cyber investigations and address jurisdictional hurdles and differences in the law from country to country through overseas legal attaché offices
- Understanding how government sponsored agencies can work with vulnerability industries to better provide intelligence
- Promoting interaction and sharing between law enforcement and the private sector
Todd RennerLondon Assistant Legal Attaché