Agenda


The TEISS 2019 agenda is below, with more speakers and sessions being added regularly.

08:00 Registration and welcome refreshments

Chair’s introduction and welcome

by Mark Johnson, Founder & CEO, The Risk Management Group Show Profile

09:00

Safeguarding the nation – the NCSC vision for a more secure Britain

PLENARY KEYNOTE

by Ciaran Martin, CEO, National Cyber Security Centre Show Profile

09:10

Plenary Keynote

09:30

Behavioural psychology in the Fortune 500 – changing habits to protect your organisation from cyber criminality

PLENARY KEYNOTE

  • The number one cyber security threat facing the world!
  • What role behavioural science plays in Cyber Security
  • Why the CMO wins with the CFO and the CSO loses
  • How to modify belief and align with other CXOs to reduce cyber liability in the organisation

by Adam Anderson, Founder/CSO, Element Security Group Show Profile

09:50

Collaboration, Simplicity, Certainty: How organisations can work together to defend everyone from cyber criminality

PLENARY PANEL SESSION

  • Moving to institutionalised, active collaboration and organisational learning that spans organisations, industries and countries
  • Creating a cyber security process that turns volatility into business as normal
  • What makes collaboration effective, and what are the challenges to collaborating effectively?
  • How do you merge the interests of private and public sector bodies to form effective collaboration

by James Hatch, Director - Cyber Security, BAE Systems Show Profile

by Ian Burgess, Head of Cyber Security, UK Finance Show Profile

by Titta Tajwer, CISO, News UK Show Profile

by Tim Sadler, CEO & Co-Founder, Tessian Show Profile

10:10

11:00 Morning refreshments & networking

Workshop 1

by Cyberproof Show Profile

11:30

Let’s get offensive: Using cyber-attack simulations to improve your cyber security posture

  • Is Gartner right? “Is the Pentest really dead?”
  • ….and is the killer Breach and Attack Simulation?
  • Validate every vector of a mutivector attack – test yourself before, during, and after an attack
  • Validate how safe you are NOW – launch 50 attacks at yourself live at the Roundtable

by Jonathan Gad, VP Business Development, Cymulate Show Profile

11:30

Rethink Data Loss Prevention: Shift from Prevention to Protection

  • Where do legacy DLP solutions fall short?
  • How to manage insider threat, compliance and incident response without stifling users

by Richard Agnew, VP EMEA, Code42 Show Profile

11:30

IAM; How analytics is changing everything

  • How to analyse your entitlement data quickly and effectively
  • How moving department is a clean-up opportunity
  • Why a quick preventative control delivers more benefits than a slow detective one
  • Why Gamification and Security go together, and how to harness social media approach to reduce cyber threats

by Mark Rodbert, CEO, idax Software Show Profile

11:30

AI: Positive forces at work, or false positives?

  • False positives or ‘innocent anomalies’ are a huge distraction for over-stretched security teams
  • How can a unique AI approach gather context and triangulate threats across the entire digital estate?
  • Automate investigation, reduce false positives and simplify the security stack

by David Atkinson, CEO, Senseon Show Profile

11:30

Best practice in securing your Open Source components

by Whitesource Software

11:30

How do you solve a problem like CyberSecurity?

  • Is Security a Tactical or Strategic project to your business?
  • Is the Cyber Security Industry its own worst enemy? Confusing? Overwhelming?
  • EDR – Is it worth all of the hype?
  • Do you approach security as a system? Or implement solutions to fill the ‘gap’?

by Marina Partlett, Corporate Enterprise Territory Account Manager, Sophos Show Profile

11:30

Point Product and Alert Overload: The Future of Cyber Security?

  • Are too many security products and is this a serious problem for organisations of all sizes?
  • Is the current industry solution – use yet more products – causing an unmanageable level of complexity, along with alert overload?
  • Is it even possible to develop a genuinely integrated, adaptive, automated security solution – capable of preventing attacks before they occur?
  • How is the idea of “really, truly, fully automated cyber security” might just be about to become a reality and how is this a game changer for the industry?

by Richard Walters, CTO, Censornet Show Profile

11:30

Is cyber security training a waste of your budget? Where to focus security education to have the greatest impact

11:30

AI and machine learning: Can you use legacy data to calculate the risk of future attacks?

11:30

How do you run your hacking and incident response exercises, and how do these replicate “live” threats?

11:30

12:30 Lunch & networking

Security innovation awareness through vendor relationships – One CISO’s bold experiment

BEST-PRACTICE BRIEFING

  • How do you learn about disruptive tech?
  • VARs, Vendor Aggregators and conferences like this one!
  • Direct Vendor Engagement
  • My experiment with vendor engagement, and what I’ve learned from it

by Allan Alford, CISO, Mitel Show Profile

13:40

Measuring progress in cultural change – which metrics are quantifiable, repeatable and comparable

PANEL SESSION

  • The importance of establishing benchmarks before engaging in any change exercise, both qualitative and quantitative
  • Recognising and reflecting behavioural psychology, cognitive abilities, social attitudes and modern work-environments
  • Definitions and objectives – what do we want the end ‘culture’ to look like, so that we can establish progress against this
  • Can you measure employees’ emotions about organisational security?

by John Scott, Head of Security Education, Bank of England Show Profile

by Lucy Payne, Security Awareness and Engagement Lead, Aviva Show Profile

by Louise Cockburn, Information Security Awareness and Culture Manager, Quilter Show Profile

by Paul Holland, Information Security Lead, Hiscox Show Profile

14:05

Am I the security risk in your supply chain? Why your compliance checklists don’t offer the information security you need

CASE STUDY

  • What do compliance checklists really protect?
  • Which compliance questions reveal the biggest security risks with 3rd parties
  • Alternative approaches to identifying risk in the supply chain
  • How to work up and down the supply chain to improve information security

by Bridget Kenyon, Global CISO, Thales eSecurity Show Profile

14:55

Chair’s opening remarks

by David Topping, COO, BlueSky Show Profile

13:30

CyberSecurity Ratings: How an independent and out-side in perspective helps you manage and report on cybersecurity performance and third party risk management

CASE STUDY

  • Why are increasing numbers of companies using external ratings
  • What are cyber security ratings?
  • How are ratings calculated?
  • What types of risks do they identify?

by James Warriner, EMEA Channel Sales Manager, BitSight Show Profile

13:40

GDPR and global data protection variations: What have we learned and what are we still working on?

PANEL SESSION

  • Update on the latest global data protection variations – is GDPR becoming the global data privacy standard
  • Harmonising data protection approach for different legislative regions
  • Brexit & data protection – latest update
  • What have we learned about contracts between controllers-processors, and the implementation of data protection policies

 

by Deborah Haworth, CISO, Penguin Random House UK Show Profile

by Rocio de la Cruz, Principal Associate, Gowling WLG Show Profile

by Shash Patel, Director, Information Risk Management & Privacy, Air Products Show Profile

by Matt Middleton-Leal, General Manager EMEA, Netwrix Corporation Show Profile

14:05

Security innovations from Google: Preventing phishing and Zero Trust security

BEST-PRACTICE BRIEFING

  • How Google prevents its employees being phished, having no reported or confirmed account takeovers since 2017
  • What we are doing to protect billions of consumers and customers, and how they can prevent phishing like Google
  • Zero Trust: How Google provides secure remote access to 80,000+ employees without the use of a VPN
  • How you can take advantage of Google’s ongoing research and investment in security

by Tom Salmon, Customer Engineer for Google Cloud Platform, Google Show Profile

14:55

A New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

BEST-PRACTICE BRIEFING

  • Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats
  • How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time
  • Why automation and autonomous response is enabling security teams to neutralise in-progress attacks, prioritise resources, and tangibly lower risk
  • Real-world examples of subtle, unknown threats that routinely bypass traditional controls

by Dave Palmer, Director of Technology, Darktrace Show Profile

13:40

External Threats: Emerging recent trends in cyber criminality and the current risk landscape

PANEL SESSION

  • Meeting the challenge of destructive and disruptive attacks from defence in depth intended to deter intrusive attacks
  • Managing the nuances of a threat management discipline in a risk management culture
  • The implications of new regulatory direction on cyber resilience as operational resilience
  • Changing geo-political context affecting the threat environment for commerce and industry

by Tony Adams, Head of Investigations, Digital Forensics and Prevent Programme, National Cyber Crime Unit Show Profile

by Craig Rice, Chief Security Officer, Pay.UK Show Profile

by Martin Smith MBE, Chairman & Founder, The Security Company Show Profile

by Niall MacLeod, Director of Solutions Engineering – EMEIA, Anomali Show Profile

14:05

Common failings of IoT – avoid providing attackers with toehold to exploit on your corporate network

BEST-PRACTICE BRIEFING

  • Discuss the emergence of the IoT and it’s enabling technologies
  • Explain why the security of IoT devices and apps is so poor
  • Demonstrate exactly how devices can be compromised, and how that can put your corporate network at risk
  • Show how you can make networks and users resilient to attack via IoT devices

by Ken Munro, Partner, Pen Test Partners Show Profile

14:55

15:20 Afternoon refreshments & networking

Fixing the disconnect – using the right language and translating from SOC to C Suite and back again

BEST PRACTICE BRIEFING

  • Translating C Suite priorities to your security team
  • Communicating threats and risks upwards to your C Suite
  • Where technical jargon helps, and where it hinders
  • Measuring and reporting progress and impact

by Dr. Sandra Bell, Head of Resilience Consulting, Sungard AS Show Profile

16:00

Getting the CEO on board: How high-level buy-in turned our people into our strongest line of defence

CASE STUDY

  • Can colleagues, customers and partners be the strongest line of defence in the fight for information security?
  • Leading through example and changing the culture at c-level
  • Combine this with education and awareness and avoiding a blame culture,
  • Empowering colleagues to become security champions, rather than being afraid of it.

by Mark Nicholls, Head of Information Security & Governance, Peabody Show Profile

16:25

Alternative approaches to recruitment: Attracting and retaining talent from non-traditional routes

CASE STUDY

  • Are some skills sets more transferable than others for cyber security careers?
  • Overcoming ingrained prejudices in cyber recruitment
  • Hire experience or hire to train?
  • Moving away from a blame culture to retain your best security staff

by Martin Smith MBE, Chairman & Founder, The Security Company Show Profile

16:50

Implementing secure single-factor authentication: The right and wrong way to end weak password use

BEST-PRACTICE BRIEFING

  • The death of the password?
  • Can SFA securely replace 2FA and MFA?
  • When something you have replaces something you are or something you know
  • Best-practice in deploying SFA across whole organisations

by Yubico Show Profile

16:00

Blockchain beyond the marketing: Where is it currently in use, and what are the lessons for Information Security professionals?

PANEL SESSION

  • How can information security specialists engage with this technology?
  • Insight in the adoption opportunities and challenges for the wider business economy
  • How the UK government is approaching investment and regulation of Blockchain
  • Is blockchain technology in itself secure?

by Dr Maria Grazia Vigliotti, Founder & Director, Sandblocks Consulting Show Profile

by Roxanne Morison, Head of Digital Policy, CBI Show Profile

by Tim Holmes-Mitra MBE, Co-founder, Broadhaven Show Profile

16:25

Real cases of Social Engineering: Hackers, competitors and insiders

CASE STUDY

  • How attackers, in a real case over 13 months, used social engineering to turn a dedicated employee into a malicious insider, what the devastating consequences were for the victims and how a competitor got their hands dirty in the attack.
  • What are the four social engineering attack vectors and how they are employed by attackers?
  • Why does social engineering work so well as an attack vector and what to look out for when trying to defend against it?
  • Some simple defensive steps you can take to make yourself a less appealing target of social engineering

by Lisa Forte, Partner, Red Goat Security Show Profile

16:00

The threat from AI – latest research into the cyber security of AI

RESEARCH BRIEFING

  • Is AI going to stop cybercrime?
  • The threat from smart malware and botnets
  • Where is the intersection between AI, cyber security, and human-computer Interaction?
  • How do we ensure security, privacy and transparency in complex and automated systems?

by Dr Jose Such, Director of the EPSRC-NCSC Academic Centre of Excellence in Cyber Security Research (ACE-CSR), King's College London Show Profile

16:25

The Decalogue of Contractual Security Sins

CASE STUDY

by Sebastian Avarvarei, Director Advisory Security Services, Wolters Kluwer Show Profile

16:50

17:15 Drinks reception & networking

08:00 Welcome refreshments & networking

Challenging and changing your data protection culture: Building awareness and engaging individuals inside and outside the office

CASE STUDY

  • Exploring the challenges of harnessing a data protection culture within your business.
  • How you can potentially overcome those challenges to embed a data protection culture.
  • How you ensure individuals are aware of their data protection responsibilities both inside and outside the office.
  • How you ensure individuals remain engaged with those responsibilities

by Matthew Kay, Group Data Protection Officer, Balfour Beatty Show Profile

09:10

Remaining agile and fast-moving: Identifying priorities and risks, and resourcing a team to match

CASE STUDY

by Kevin Fielder, CISO, Just Eat Show Profile

09:35

Effective threat intelligence communication strategies: Upwards, downwards and outwards

CASE STUDY

  • Communicating threats to different audiences, and how they decipher what they have just been told
  • Effective means and methods of communication tailored to your audience
  • Delivering the bad news with the good news – marrying the threat with the prevention in a single message
  • External communications and why your Press & Publicity team are critical to you

by Nick Nagle, CISO, Condé Nast International Show Profile

10:00

Chair’s opening remarks

by David Topping, COO, BlueSky Show Profile

09:00

Automatic profiling and GDPR: Is your use of AI to profile users and make automated decisions compliant?

LEGAL BRIEFING

  • GDPR – Profiling Overview including; Data; Subject; Fundamental Rights
  • Article 22 – Interpretational challenges for sole automated processing
  • Striking a balance – Public Benefit & Individual harms
  • What of the future? – identifying risk; working towards more efficient compliance; DPIAs; Privacy by Design and Certification

by Angeline Hayles-Henderson, Solicitor - Data Protection/Privacy and Information Law, Birmingham City Council Show Profile

09:10

Understanding and securing your data crown jewels: Building and implementing a new model to assess the sensitivity of data, and applying protective controls

CASE STUDY

  • Understanding the extent of your data holding – your crown jewels
  • Creating new methods to assess the content of data for its sensitivity and protection
  • Developing security policy based on data sensitivity to meet risk appetite, security protection and legal requirements
  • Embedding data ownership for improved governance

by Andy Wall, Chief Security Officer, Office for National Statistics Show Profile

09:35

Integrating privacy engineering into your information security practices

CASE STUDY

  • Where can privacy processes beat hackers, and where can security awareness beat them?
  • Why a reliance on security is not the same as privacy
  • Which legal, policy and operational processes need to be considered when implementing privacy engineering?
  • Evaluating whether your systems fulfil users’ privacy needs

by Jon Townsend, CIO, National Trust Show Profile

10:00

The growing power of actionable Threat Intelligence in Organisation Security Stack

CASE STUDY

  • How do organizations cope with a lot of Threat Intelligence feeds? Is more always better?
  • Can we make Threat Intelligence really actionable?
  • What is Contextual Threat Intelligence?
  • How is today’s Network Perimeter Security Stack prepared to support a lot of Indicators of Compromise?

by Kirill Kasavchenko

09:10

The problem of trust and how it can destroy your organisation

BEST-PRACTICE BRIEFING

  • What is trust in an organisational context?
  • Why is it a problem for security professionals?
  • Why do people trust wrongly?
  • How can we make sure people trust appropriately?

by Jeremy Swinfen Green, Head of Consulting, TEISS Show Profile

09:35

The security risk from legacy IoT devices on your network: Where vulnerabilities may lie and how to mitigate the risk for the future and new devices joining the network

BEST-PRACTICE BRIEFING

  • What are the three most important issues should you consider when implementing IoT?
  • What are the challenges and risks with these three issues?
  • What risks you should be aware of for each issue?
  • How should you address each issue to mitigate current and future risk?

by Phil Beecher, President/CEO, Wi-Sun Alliance Show Profile

10:00

10:25 Morning refreshments & networking

Policy Free DLP: Endpoints to Cloud

DEMONSTRATION SESSION

by Paul Martin CISSP, Senior Systems Engineer, Code42 Show Profile

11:00

Demonstration 2

DEMONSTRATION SESSION

by Yubico Show Profile

11:20

Demonstration 3

DEMONSTRATION SESSION

11:40

Workshop 2

by Hackerone Show Profile

11:00

Workshop 3

by Egress Show Profile

11:00

12:00 Lunch & networking

Chair’s introduction and welcome

by Geoff McDonald, Co-Founder, Minds@Work Show Profile

13:30

Unacceptable personal pressure: How senior Cyber Security Executives safeguard their own mental health, and those of their teams

PLENARY PANEL SESSION

This panel of leading information security professional discuss different strategies for maintaining a healthy work/life balance for themselves, for the teams they lead, and how they share professional and personal concerns.

  • How CISOs have a duty of care to protect the mental health of those that they work with
  • How to recognise burn out in your team and yourself, and ways in which we can reduce the stress of individuals
  • Building a team culture and values, and how your culture influences honesty and openness
  • Understanding personality types and triggers, and creating a circle of trust

by Paul Watts, CISO, Dominos Pizza Show Profile

by Thom Langford, CISO, Publicis Groupe Show Profile

by Mark Walmsley, CISO, Freshfields Bruckhaus Deringer LLP Show Profile

by Deborah Haworth, CISO, Penguin Random House UK Show Profile

by Allan Alford, CISO, Mitel Show Profile

by Kevin Fielder, CISO, Just Eat Show Profile

13:40

Plenary Keynote

14:40

Chair’s closing remarks

15:00

15:50 Conference close

back to top

Copyright © Lyonsdown Ltd. 2018. All rights reserved. TEISS® is a registered trademark of Lyonsdown Limited.