Cyber Security Conference

Venue: One Drummond Gate, London

Date: 08 October 2015


Cyber Security Conference

Dealing with the cyber threat is a complex and constantly evolving challenge. Every business relies on the confidentiality, integrity and availability of its data. Protecting information, whether it is held electronically or by other means, should be at the heart of the organisation’s security planning. Public and private sector entities have to maintain a high level of preparedness and be able to identify potential threats and implement appropriate procedures and processes in order to protect and keep their information safe.

Some of the questions that should be taken into consideration are:

  • Who would want access to our information and why?
  • How would this information be acquired and what methods could be used?
  • How could they benefit from its use?
  • How damaging would the loss of data be?
  • What would be the effect of the attack and how would it affect the business?
  • What measures do we need to take to keep information and data safe and our business intact?

The forthcoming Conference aims to answer all  these questions. In addition, it will discuss the key changes in ISO/IEC 27001 and ISO/IEC 27002 standard and demonstrate how the industry benefits from implementing the standards. There will be updates about the latest trends and issues that Information and Cyber Security professionals face and what should be done to overcome these challenges.  

In particular, you will be able to:

  • Understand the importance of standards and how they support overall business continuity
  • Undertake steps for a successful implementation
  • Discuss security challenges associated with moving sensitive data and system to the Cloud
  • Learn about the complex processes and technologies around e-discovery
  • Hear from leading industry experts about cyber security threats and how to ensure your business remains protected
  • Get more information about potential risks that cyber security professionals need to be aware of
  • Actively participate in discussions with peers and get your questions answered by leading industry experts

 


Agenda

08:30 - 09:15 Breakfast briefing
Tom Nicholls
, Global Commercial Manager, BSI 

09:00 - 09:30 Registration

09:30 - 09:45 Chairman's opening remarks
Andreas Fuchsberger, Regional Standards Officer, Microsoft

09:45 - 10:05 Keynote
Rik Ferguson, Vice President of Security research, Trend Micro 

10:05 – 10:25 Using 27001 to Manage Risk of Cyber Crime
Bridget Kenyon, Head of Information Security, University College London

10:25 - 10:40 Q&A


10:40 - 11:00 Tea and coffee


11:00 – 11:20 Critical Need for Effective Cyber Security Governance
Vernon Poole, Head of Business Consultancy, Sapphire

11:20 – 11:50 Cyber Risk - The Organizational Perspective
Dr. Russell Price, Chairman, Continuity Forum 

11:50 – 12:10 Aircraft Hacking: myth or truth
Ruben Santamarta, Principal Security Consultant, IOActive

12:10 – 12:40 Discussion - Data Takeaway
Protecting your data on mobile devices – What happens when mobile devices are no longer protected by network security? What happens to the endpoint data that is on and off network? What should be done to increase security infrastructure effectiveness and ensure that data is secure as it reaches endpoints?
Lee Barney, Head of Information Security, Home Retail Group
Bridget Kenyon, Head of Information Security, University College London
Tony Williams, Information Risk & Security Consultant, Tonnik Consulting
12.40 – 13.00 "It won't happen to me" From Cyber Espionage to Cyber Attack
Simon Schofield
, Head of Cyber Security Practice, BAE Systems 


13.00  14.00 Lunch

14.00 – 14.20 What the Cybercriminal  Did Next!
Dr Chris Allgrove, Head of Identity in Government, CESG

14.20 – 14.40 Policing Cybercrime
Iggy Azad, Detective Sergeant, Metropolitan Police

14.40 – 15.00 Q&A


15.00 – 15.20 Tea & Coffee


15.20 – 15.40 Security in the Cloud and BS ISO/IEC 27018
Andreas Fuchsberger, Regional Standards Officer, Microsoft

15.40  16.00 eDiscovery in a Regulatory and Law Enforcement Context
Kate Greenwood, Advanced Associate – Cyber Forensics, FCA

16.00 – 16.20 There Are Two Types of Company: those that have been hacked and those that don't know yet. Which one are you?
Terence Greer-King, Director of Cyber Security, Cisco

16.20 – 16.40 Incident Response in a Complex World
Tony Williams, Information Risk & Security Consultant, Tonnik Consulting
16.40 – 16.50 Q&A

16.50 – 17.00 Chairman's Closing Remarks
Andreas Fuchsberger, Regional Standards Officer, Microsoft

Who should attend?

The conference will be of particular interest to all those responsible for or dealing with Information and Cyber Security within their organizations including:

  • Chief information officer
  • Security architect
  • Technology officer
  • IT systems manager
  • Security analyst
  • Risk and information security manager
  • Head of ig
  • Quality systems manager
  • Network engineer
  • Head of risk
  • Head of IT
  • Technical director
  • Head of ict
  • Information assurance officer
  • Risk manager
  • Practice manager
  • Quality and information security manager
  • Quality director
  • Infrastructure manager
  • Data analyst
  • Governance & compliance manager
  • Assurance delivery team assistant manager
  • IT project officer
  • IT support services manager

Book your place

To book your place simply click on one of the options below.

Definition of rates:

Standard rate:  Includes organizations that are not controlled by the government and often have ltd or plc at the end of the full company name.

Public sector rate: Organizations that provide basic government services, including the police, military, public roads, primary education and healthcare. This rate also applies to local authorities, councils and government departments, schools and hospitals.

SME rate: An organization that employs fewer than 250 people and has an annual turnover of less than £25 million.

Cyber Security event - Standard

Full rates (Effective as of 11.08.2015)

Members: £160
Non Members: £320



 

Cyber Security event - Public sector/Charity/SME

Full rates (Effective as of 11.08.2015)

Members: £130
Non Members: £260




 Your basket
Your basket is empty

ISO 14001

ISO 14001 - the world's most popular environmental management system (EMS) standard, has been revised