Conference Day 2
9:00 am - 9:10 am CHAIRMAN’S RECAP OF DAY ONEBharat Thakrar - Head of Business And Cyber Resilience BT Global Services
9:10 am - 9:50 am CYBER SECURITY: THE NEW FRONT LINE OF NATIONAL DEFENCE?Todd Renner - London Assistant Legal Attaché FBI
- Reflecting on the increasing threat to national infrastructures from state and non-state actors, and how this has redefined the security relationship between the private sector and government bodies
- How state threat intelligence gathering is communicated between government agencies and global commercial organisations, and how private threat intelligence data is used at government level
- Understanding how the FBI and government partners can support commercial organisations’ cyber security measures
- Closing the loop between government enforcers and the private sector for total cyber security
Todd RennerLondon Assistant Legal Attaché
9:50 am - 10:30 am DEFINING THE NEW CYBER THREAT LANDSCAPE IN THE FOURTH INDUSTRIAL REVOLUTIONSebastian Hess - Cyber Risk Engineer AIG
- Understanding how the increase in automated systems and the Internet of Things (IoT) will redefine the security operations centre (SOC)
- Assessing how threat intelligence operators can maintain security coverage in the new, connected world
- Defining the new parameters for threat intelligence in the digital age
- Can complete threat awareness and management be achieved in the fourth industrial revolution?
Sebastian HessCyber Risk Engineer
10:30 am - 11:00 am MORNING COFFEE AND NETWORKING
11:00 am - 11:40 am THE ROLE OF NATIONAL CYBER SECURITY BODIES IN ENSURING NATIONAL THREAT INTELLIGENCESenior Speaker - National Cyber Security Centre
- Understanding the role of the NCSC in providing national threat intelligence reports to private and public sectors
- Converting sector-level threat assessments into actionable intelligence at organisational level
- The role of the NCSC in supporting incident response measures within the private sector
- How can you engage with the NCSC for cyber support?
National Cyber Security Centre
11:40 am - 12:20 pm THE ‘SOFT SKILLS’ APPROACH TO MACHINE LEARNING SYSTEMSJon Gray - Cyber Threat Intelligence Manager PWC
- Defining the ‘soft skills’ of human analysts in threat intelligence and incident response
- Outlining the advantages of these skills over the ‘buttonology’ of AI dependency
- How can you ensure balance between human ‘soft skills’ and AI data management capability to achieve the best threat intelligence approach for your organisation?
- Creating a hybrid approach to TI and Incident Response through a combination of human and machine analytics
Jon GrayCyber Threat Intelligence Manager
12:20 pm - 1:20 pm NETWORKING LUNCH
1:20 pm - 2:00 pm PANEL DISCUSSION: RECOGNISING THE TRUE THREAT INDICATORS IN THE DARKWEB
- Should all organisations be tracking threats developing on the darkweb?
- How can businesses recognise and respond to breaches in their security from darkweb sources?
- How far will the new GDPR and similar regulations mitigate data security risks?
- Is there a best practice approach to monitoring the darkweb? How can organisations develop these approaches in an often unknown landscape?
2:00 pm - 2:40 pm THE BLOCKCHAIN POTENTIAL FOR CYBER SECURITYFatema Marelli - Incident Response and intelligence analyst PWC
- An introduction to blockchain, and application in cyber security
- Understanding the potential of blockchain in security applications
- Utilising blockchain against payment diversion fraud and similar cyber crimes
- What are the realistic timeframes for blockchain in cyber security models?
Fatema MarelliIncident Response and intelligence analyst
2:40 pm - 3:10 pm AFTERNOON TEA AND NETWORKING
3:10 pm - 3:50 pm RECOGNISING FUTURE COMPROMISE INDICATORS AT ALL CYBER SECURITY LEVELSNeil Sidnell - Cyber Threat Intelligence and Security Uk MoD
- Developing an understanding of the true risk of cyber attack through probably analysis of threat against vulnerability
- Moving away from the generic cyber threat intelligence model through bespoke in-house data modelling approaches
- Demonstrating how misunderstanding of threat at the initial assessment stage can undermine all levels of cyber security
- Understanding the common indicators of cyber breach – how can your workforce be trained to recognise these indicators early?
Neil SidnellCyber Threat Intelligence and Security
3:50 pm - 4:30 pm FROM INCIDENT RESPONSE TO SOCProfessor John Walker FRSA - Advisory Board, Research Centre in Cyber Security (KirCCS)
- Steps to evolving past the ‘tick box’ approach to cyber security
- Building the correct model to incident response
- identifying stepping stones to security – people, communications and legalities of cyber
- Approaches to overcoming the barriers to building a fit for purposed SOC
Professor John Walker FRSAAdvisory Board,
Research Centre in Cyber Security (KirCCS)