27 - 29 November, 2018 | Hilton London Kensington, London, United Kingdom

Conference Day 1

8:50 am - 9:00 am DEFENCE IQ WELCOME REMARKS

img

Bharat Thakrar

Head of Business And Cyber Resilience
BT Global Services

9:10 am - 9:50 am KEYNOTE PRESENTATION: DEFINING THREAT INTELLIGENCE ACROSS THE COMPLETE CYBER LANDSCAPE

Devon Rollins - Director Cyber Threat Intelligence (CTI) Capital One
  • Understanding how separate understandings and definitions of ‘Threat Intelligence’ has created a disjointed and unsecure operating environment
  • Why a singular Threat Intelligence definition is required across the total cyber security network
  • Linking objectives between Threat Intelligence and Incident Response teams in the Security Operations Centre (SOC)
  • Case studies on achieving cohesion between teams
img

Devon Rollins

Director Cyber Threat Intelligence (CTI)
Capital One

9:50 am - 10:30 am BECOMING PROACTIVE, NOT REACTIVE, IN CYBER INCIDENT RESPONSE

Peter Culley - SOC manager and Cyber Intelligence Authority Vodafone
  • Distinguishing between proactive threat intelligence systems and reactive incident response methods
  • Assessing the advantages and disadvantages of each approach, and how you can identify the best foundation for your organisation
  • Combining Threat Intelligence and Incident Response to one joint operating model within the SOC
  • How can you deliver fit-for-purpose solutions across the full cyber security spectrum?
img

Peter Culley

SOC manager and Cyber Intelligence Authority
Vodafone

10:30 am - 11:00 am MORNING COFFEE AND NETWORKING

11:00 am - 11:40 am RECONSIDERING THE SOC: UNDERSTANDING THE STRUCTURAL APPROACH TO CYBER SECURITY AT THOMAS COOK

Mousa Haidari - Cyber Security Operations Manager Thomas Cook
  • An introduction to the cyber security approach developed at Thomas Cook
  • Why was this restructuring of the IT teams considered necessary?
  • Understanding the advantages in cyber security gained from this new approach
  • How this new cyber model has fostered greater internal support for IT operations within Thomas Cook
img

Mousa Haidari

Cyber Security Operations Manager
Thomas Cook

11:40 am - 12:10 pm BECOMING THREAT INTELLIGENT

Igors Konovalovs - Director, FireEye iSIGHT Intelligence
o   Foundational elements of a successful Cyber Threat Intelligence Program
o   Functional and Organizational role of Cyber Threat Intelligence
o   Intelligence Communications and stakeholders within an organisation
o   Tactical and Strategic outcomes of a Cyber Threat Intelligence framework


Igors Konovalovs

Director,
FireEye iSIGHT Intelligence

12:10 pm - 12:50 pm RULES OF ENGAGEMENT: FACTORS THAT AFFECT THE ENGAGEMENT OF SENIOR LEADERS

Toby Rose - Cyber Operations Manager UK MoD
  • Understanding the priorities of senior leaders at board and director levels
  • How these priorities translate across to the cyber security environment
  • Expanding threat intelligence from the SOC to the C-Level organisation
  • How can you practically apply these approaches in your organisation?
img

Toby Rose

Cyber Operations Manager
UK MoD

12:50 pm - 1:50 pm NETWORKING LUNCH

1:50 pm - 2:30 pm KEYNOTE PRESENTATION: THE THREAT INTELLIGENCE AND INCIDENT RESPONSE MODEL AT THE ROYAL BANK OF SCOTLAND

Silas Bartlett - Head of Threat Intelligence Royal Bank of Scotland
  • Understanding the financial services information sharing platform, how this is built into the RBS threat intelligence model and how this can be transposed into your organisation
  • How to build cyber security through awareness and training within large Financial Service organisations
  • Steps to maintaining pace with consistent, rapid pace of developments in cyber-crime technology to mitigate risk from cyber attacks
  • Critical next steps in securing the RBS against cyber crime over the next 5 years
img

Silas Bartlett

Head of Threat Intelligence
Royal Bank of Scotland

2:30 pm - 3:10 pm EXERCISE IS GOOD FOR YOU: BEST PRACTICE IN MATURITY ASSESSMENT FROM FINANCIAL SERVICES EXPERIENCE

Ralph Smith - Director, UK Member Services Programme FS-ISAC
  • How to realistically assess your own incident response capability and preparedness, and compare and contrast your incident response approach and like-for-like performance with those of industry peers
  • How this model can be used to determine future requirements in your cyber security development
  • Steps to identifying and building a robust cyber security profile through tailored threat intelligence and incident response systems designed for your requirement and budget
  • Engaging senior board members of your organisation and getting them to understand the benefits of this capability
img

Ralph Smith

Director, UK Member Services Programme
FS-ISAC

3:10 pm - 3:40 pm AFTERNOON TEA AND NETWORKING

  • The O/T security challenge and the challenges specific to O/T in the nuclear sector
  • Understanding how the CBEST framework could be used in the civil nuclear sector
  • An overview of results of live testing of OT systems under this redefined framework
  • Understanding the challenges faced during this trial – is this model easily translated across other sectors
img

Dan Coats

ONR Inspector - Nuclear Security Civil Nuclear Security Programme – Cyber Security & Information Assurance Team
Office for Nuclear Regulation

4:20 pm - 5:00 pm BUILDING A UNIVERSAL CYBER SECURITY MATURITY MODELLING SYSTEM

Ian Glover - President CREST
  • An update on the universal cyber security maturity modelling system scheduled for release this year
  • How will this system be used to accurately model your organisation’s cyber threat intelligence maturity level?
  • Understanding how your cyber maturity level will impact your threat intelligence and incident response requirements and capabilities
  • Using the maturity model to highlight vulnerabilities within your organisation to enhance cyber response
img

Ian Glover

President
CREST

5:00 pm - 5:15 pm CHAIRMAN’S CLOSING REMARKS AND END OF DAY ONE