Registration - coffee - networking
Chair's opening address

Colonel (Retd) John Doody

Security in 2018

  • The changing face of cyber crime: 2018’s cyber threats and new methods to protect against them
  • The risks and costs of cybercrime to businesses
  • Cyber skills: The importance of education and hiring the right people
  • GDPR: The importance of compliance and timetable for success 
GDPR – Collateral Benefits

Junaid Farooqui

What GDPR has to do with Information Security? One of the key themes of the new regulation is about protection of personal data and an organisation cannot be fully compliant to GDPR without adequate security controls. Most of the rights given to a data subject exist in DPA 1998, however this regulation is coming up with lot of teeth as there are heavy tangible fines which can bring intangible reputational damage that is extremely difficult for any organisation to quantify and might be greater than the regulatory fines. GDPR presents a good opportunity to improve and enhance information security posture, not just around personal data but to spread the benefits across other information assets in the organisation. In this session I will try to highlight some of the IT Security areas which possibly require risk assessment with GDPR lens to deploy new or alter existing controls. 

How compliance regulation, threat intelligence and machine learning will impact cybersecurity in 2018

Neil Cooper

  • Takeaways from 2017, the stories that made the headlines (and some which should have!)
  • The role of forensic reporting in threat hunting and data protection
  • Life after GDPR
  • Why the insider threat will continue to diversify, and how to keep up
Malware Attacks: History and Future

Holly Grace Williams

An adventure through the malicious software attack timeline. Examining the history of malicious software, the advent of advanced persistent threats and recent developments in automated malicious attacks. Explaining how recent malware is performing actions considered advanced for malware, but run-of-the-mill for security testers. Covering recent data in the area nation-state attacks and crime group developments - such as changes in modern ransomware. Drawing conclusions for the future suggesting that things might soon get worse.

Self Learning, Self Defending Networks

Bea Gully

In this session, learn: 

  • How new machine learning and mathematics are automating advanced cyber defense 
  • Why 100% network visibility allows you to detect threats as they happen, or before they happen
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk 
  • Real-world examples of unknown threats detected by ‘immune system’ technology
How to Tackle the GDPR: A Typical Privacy & Security Roadmap

Kevin Kiley

As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

Coffee & Networking
Two 45 minute seminars will be available to choose from

Please Click here for seminar information.

Lunch and networking
Two 45 minute seminars will be available to choose from

Please Click here for seminar information

Chairs Afternoon Address

Colonel (Retd) John Doody

Practical approach to GDPR programme

Tarun Samtani, CISSP

We all know that GDPR will bring a massive change in the way businesses operate and handle personal data. This short discussion will give you to tips to jumpstart your GDPR programme and some easy approaches to take to achieve success in a short space of time. 

1) GDPR Challenges for businesses.

2) Focus on the goals not vendors.

3) ICO & Data subject expectations - May 2018 onwards.

4) GDPR Strategic approach

The presentation topic is: “GDPR compliance and your cyber security programme” and will be covering:

Tony Drewitt

  • The impact of obligations imposed by the General Data Protection Regulation (GDPR) on cyber security in public sector organisations
  • Cyber security and privacy – common challenges and solutions
  • The practical steps to initiating a GDPR compliance programme.
Is DNS a Part of Your Cyber Security Strategy?

Rob Bolton

Detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks, being part of a data loss prevention program– DNS can help with this and much more, but are you leveraging it as part of your security controls and processes? 

DNS is the perfect choke point to stop not just data exfiltration through it, but also detect and stop malware from spreading and executing.

In this session, you'll learn:

  • The value of DNS as part of your cyber security strategy
  • How DNS can provide your SIEM with actionable intelligence
  • How DNS can add value to other security controls, such as vulnerability scanners and end point protection

Join Infoblox for a discussion on this often overlooked topic

Protecting yourself & your business against the threat of Cybercrime

Jennie Williams

With cybercrime in the news on an almost daily basis it is important to understand how you can take steps to protect both yourself and your business from this crime.  Jennie Williams, Cyber Protect Officer from Titan – the North West Regional Organised Crime Unit will help you to understand what threats exist and some steps you can take to help protect yourself.

Coffee and networking
Can we trust Government Bodies to keep our Data Secure?

Patricia Vella

The public sector deals with huge amounts of data. It is increasingly realising this information can be used to better serve citizens, offering them more personalised and relevant services. However, these vast amounts of data also pose a security risk. This session will look at:

  • Personal data held by government bodies
  • Security threats to the data held by government bodies
  • Real life examples of government data breaches and how they occurred
  • Governments and GDPR
The Risks and Opportunities of GDPR

Prof. William Buchanan OBE

This presentation will outline the requirements for GDPR, and analyse whether organisations are ready to comply. It will outline the usage of encryption and in creating citizen-focused systems.

Afternoon Speakers Q&A Panel
Chairs Closing Remarks

Colonel (Retd) John Doody

Drinks Reception

Supported by: