register here


Registration - Coffee - Networking


Chairs Opening Address
Colonel (Retd) John Doody, BCS, The Chartered Institute for IT


Key Note Address : Watching the Horizon
  • Situational Awareness
  • The role of CERT-UK and CISP
  • Working in partnership
Chris Gibson - Director of the UK's national Computer Emergency Response Team (CERT-UK)


The Importance of Continued Efforts to Combat Cyber Threat

On the 10th July 2014 The Intelligence and Security Committee Annual Report .
In this presentation we examine:

  • e-Trust cannot be solved by technology. Who controls the token you trust? The e-ID Directive
  • The proposed EU Network & Information Security Directive and reforms to EU Data Protection Legislation
  • Is Industry doing enough about threats to business and the economy or should it be the Government?
Lord Erroll, Independent Crossbench Peer, House of Lords


How to Manage the Evolution of BYOD through Secure Mobility in the Cloud

Employee-owned devices are an essential part of corporate connectivity. Employees today are bringing personal devices into the enterprise and accessing corporate information, while mobile. When these devices are not secured, it introduces a range of security threats like data leakage and breached networks. Enterprises must take advantage of the evolving mobile landscape by empowering personal devices for productive business use through a secure BYOD program, as well as seeking the advantages of cloud deployments.

The evolutionary nature of BYOD presents a security-centric challenge for businesses with corporate assets on mobile devices. AirWatch’s Duncan Brown, enterprise account executive, will provide attendees with a deeper understanding of enterprise mobility in the evolving BYOD era, while ensuring mobile security and compliance in the cloud.

Duncan Brown, Account Executive, Airwatch


Enterprise key management – Barclays Bank

The bad guys want the keys to your organisation. Are they secure?

Robust cryptographic controls are at the heart of Cyber Security defence. As cryptography becomes ubiquitous a new major battlefront is opening up with increasing frequency and sophistication of attacks against cryptographically secured assets.

Andrew Moore will talk about industry trends, define what good key management looks like, highlight mistakes to avoid and describe how cryptography can be deployed at scale in a global organisation.

Andrew Moore | Director of Information Integrity & Protection (IIP) - Barclays Bank


IBM :Solution Provider Presentation

With reports of network breaches and data losses consistently making the news, cyber security is a key discussion topic for every corporation and for every government agency. Today’s CISOs face organised and determined adversaries as they implement new initiatives and strive to achieve the optimal risk- based security strategy for their organisations.

This presentation reviews the latest trends in attack behaviours and provides high level insights into how organisations can enhance their security strategies .

Peter Jopling, Software Security Director, IBM United Kingdom Ltd


Morning Q & A Session


Coffee and Networking


Seminar Stream 1

Choose to attend 1 of 2 Industry Expert Sessions!

Click here to go to the seminars page.


Lunch and Networking


Seminar Stream 2

Choose to attend 1 of 2 Industry Expert Sessions!

Click here to go to the seminars page.


Chairs Afternoon Address
Colonel (Retd) John Doody, BCS, The Chartered Institute for IT


Forget the Horse, this is the year of the F[Ph]ish and the RAT

· Pedalling FUD about cyber attacks or simply being realistic.
· Known Unknowns or Unknown Unknowns; unlike weapons of mass destruction cyber attacks are a real and present danger.
· So what’s this APT stuff all about and is it really that easy to evade our defences?
· Let’s deal in statistics.
· “I have a cunning plan”.

Graham Mann, Managing Director of Encode UK Ltd


Cybercrime ­Recognition and Resolution

Networks are facing a rapidly evolving threat landscape full of modern applications, exploits, malware and attack strategies that are capable of avoiding traditional methods of detection. Threats are delivered via applications that dynamically hop ports, use non-standard ports, tunnel within other applications or hide within proxies, SSL or other types of encryption. This presentation will highlight the routes taken by APTs, Modern Malware and other forms of CyberThreat to infest networks whilst also examining how to control them at the network perimeter, the data centre and the remote network user.

Will Matthews - Senior Technical Security Consultant , Palo Alto Networks


How recent cyber attacks were dealt with in Korea

This talk will address various types of threat that exists as well as those that are evolving, how cyber security policy or activities are coordinated and implemented among relevant sectors, and some unique approaches for countering recent cyber threats in Korea.

Dr Jong-hyun Baek, Senior Researcher and Principal technical staff for KR-CERT, KISA Korea Internet & Security Agency



Information Technology (IT) is at the center of every business regardless of size. Data flows, outsourcing, enterprise resource planning, computer aided manufacturing, customer relationship management systems and simply running your business are subject to IT systems. Companies are storing and processing more and more personal and sensitive data. Modern digital business is vulnerable to cyber attacks, privacy breaches, data protection violations and internal human errors. Thus, companies increasingly face new exposures to third party liability, business interruption, regulatory consequences and reputational damage. Companies are challenged to respond to these risks. IT security and adequate internal processes and policies are one necessary part of the answer. Beyond that, companies need to think about possible risk mitigation for the remaining exposures.

Nigel Pearson, Global Head of Fidelity, Allianz Global Corporate & Specialty (AGCS)


Defense in Depth: Re-enlisting the Host as the New Network Edge

Traditionally host systems have been left out of the network defense in depth paradigm due to the computational cost, and technology tradeoffs required to deploy robust security, and monitoring solutions on production systems. Solarflare is helping address this problem by introducing their SolarSecure, and SolarCapture Pro solutions, which enable high speed packet capture, filtering, bridging, and Denial of Service defenses within the host. This session will cover the technical and business challenges of deploying security and monitoring on hosts connected to high-speed networks, and the technical aspects of the SolarSecure and SolarCapture solutions.

David Riddoch, Chief Architect - Solarflare


Coffee and Networking


The Power of Cyber-Resilience – Managing Risk and Recovering from Breaches

• The number of cyber attacks targeted at organisations of all industries and sizes has escalated exponentially according to recent reports.
• Good risk-mitigation strategies can reduce cyber risk, but they cannot eliminate cyber attacks.
• Businesses need to assume a breach will happen and prepare accordingly.
• An organisation’s ability to respond to and recover from security breaches – its cyber-resilience – is fundamental to its risk management strategy.
• Information security standards are an important element in building a strong, resilient information and communication infrastructure.
• This session will examine cyber risk, the pervasiveness of cyber-incidents and the key steps in building a cyber-resilience strategy.

Alan Calder - CEO of IT Governance


Q and A Panel Discussion


Chair's Closing Remarks
Colonel John Doody (Retd) , BCS, The Chartered Institute for IT


Event Close