27 - 29 November, 2018 | Hilton London Kensington, London, United Kingdom

Conference Day 2

img

Bharat Thakrar

Head of Business And Cyber Resilience
BT Global Services

9:10 am - 9:50 am CYBER SECURITY: THE NEW FRONT LINE OF NATIONAL DEFENCE?

Todd Renner - London Assistant Legal Attaché FBI
  • Reflecting on the increasing threat to national infrastructures from state and non-state actors, and how this has redefined the security relationship between the private sector and government bodies
  • How state threat intelligence gathering is communicated between government agencies and global commercial organisations, and how private threat intelligence data is used at government level
  • Understanding how the FBI and government partners can support commercial organisations’ cyber security measures
  • Closing the loop between government enforcers and the private sector for total cyber security
img

Todd Renner

London Assistant Legal Attaché
FBI

9:50 am - 10:30 am DEFINING THE NEW CYBER THREAT LANDSCAPE IN THE FOURTH INDUSTRIAL REVOLUTION

Sebastian Hess - Cyber Risk Engineer AIG
  • Understanding how the increase in automated systems and the Internet of Things (IoT) will redefine the security operations centre (SOC)
  • Assessing how threat intelligence operators can maintain security coverage in the new, connected world
  • Defining the new parameters for threat intelligence in the digital age
  • Can complete threat awareness and management be achieved in the fourth industrial revolution?
img

Sebastian Hess

Cyber Risk Engineer
AIG

10:30 am - 11:00 am MORNING COFFEE AND NETWORKING

11:00 am - 11:40 am THE ROLE OF NATIONAL CYBER SECURITY BODIES IN ENSURING NATIONAL THREAT INTELLIGENCE

Senior Speaker - National Cyber Security Centre
  • Understanding the role of the NCSC in providing national threat intelligence reports to private and public sectors
  • Converting sector-level threat assessments into actionable intelligence at organisational level
  • The role of the NCSC in supporting incident response measures within the private sector
  • How can you engage with the NCSC for cyber support?
img

Senior Speaker


National Cyber Security Centre

11:40 am - 12:20 pm THE ‘SOFT SKILLS’ APPROACH TO MACHINE LEARNING SYSTEMS

Jon Gray - Cyber Threat Intelligence Manager PWC
  • Defining the ‘soft skills’ of human analysts in threat intelligence and incident response
  • Outlining the advantages of these skills over the ‘buttonology’ of AI dependency
  • How can you ensure balance between human ‘soft skills’ and AI data management capability to achieve the best threat intelligence approach for your organisation?
  • Creating a hybrid approach to TI and Incident Response through a combination of human and machine analytics
img

Jon Gray

Cyber Threat Intelligence Manager
PWC

12:20 pm - 1:20 pm NETWORKING LUNCH

1:20 pm - 2:00 pm PANEL DISCUSSION: RECOGNISING THE TRUE THREAT INDICATORS IN THE DARKWEB

  • Should all organisations be tracking threats developing on the darkweb?
  • How can businesses recognise and respond to breaches in their security from darkweb sources?
  • How far will the new GDPR and similar regulations mitigate data security risks?
  • Is there a best practice approach to monitoring the darkweb? How can organisations develop these approaches in an often unknown landscape?

2:00 pm - 2:40 pm THE BLOCKCHAIN POTENTIAL FOR CYBER SECURITY

Fatema Marelli - Incident Response and intelligence analyst PWC
  • An introduction to blockchain, and application in cyber security
  • Understanding the potential of blockchain in security applications
  • Utilising blockchain against payment diversion fraud and similar cyber crimes
  • What are the realistic timeframes for blockchain in cyber security models?
img

Fatema Marelli

Incident Response and intelligence analyst
PWC

2:40 pm - 3:10 pm AFTERNOON TEA AND NETWORKING

3:10 pm - 3:50 pm RECOGNISING FUTURE COMPROMISE INDICATORS AT ALL CYBER SECURITY LEVELS

Neil Sidnell - Cyber Threat Intelligence and Security Uk MoD
  • Developing an understanding of the true risk of cyber attack through probably analysis of threat against vulnerability
  • Moving away from the generic cyber threat intelligence model through bespoke in-house data modelling approaches
  • Demonstrating how misunderstanding of threat at the initial assessment stage can undermine all levels of cyber security
  • Understanding the common indicators of cyber breach – how can your workforce be trained to recognise these indicators early?
img

Neil Sidnell

Cyber Threat Intelligence and Security
Uk MoD

  • Steps to evolving past the ‘tick box’ approach to cyber security
  • Building the correct model to incident response
  • identifying stepping stones to security – people, communications and legalities of cyber
  • Approaches to overcoming the barriers to building a fit for purposed SOC

Professor John Walker FRSA

Advisory Board,
Research Centre in Cyber Security (KirCCS)

4:30 pm - 4:45 pm CHAIRMAN’S CLOSING REMARKS AND END OF MAIN CONFERENCE

Bharat Thakrar - Head of Business And Cyber Resilience BT Global Services
img

Bharat Thakrar

Head of Business And Cyber Resilience
BT Global Services