TEISSLondon 2019 Feb. 12, 2019 to Feb. 13, 2019, London, UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
PLENARY KEYNOTE: Safeguarding the nation – the NCSC vision for a more secure Britain Ciaran Martin N/A
PLENARY KEYNOTE: Understanding & Managing Risk across your digital infrastructure Ali Neil N/A
PLENARY KEYNOTE: Behavioural psychology in the Fortune 500 – changing habits to protect your organisation from cyber criminality Adam Anderson The number one cyber security threat facing the world!What role behavioural science plays in Cyber ...
PLENARY PANEL SESSION: Collaboration, Simplicity, Certainty: How organisations can work together to defend everyone from cyber criminality James Hatch , Ian Burgess , Titta Tajwer , David Nordell , Tim Sadler Moving to institutionalised, active collaboration and organisational learning that spans organisations, industries and countriesCreating a ...
BEST-PRACTICE BRIEFING: Security innovation awareness through vendor relationships – One CISO’s bold experiment Allan Alford How do you learn about disruptive tech?VARs, Vendor Aggregators and conferences like this one!Direct Vendor ...
PANEL SESSION: Measuring progress in cultural change – which metrics are quantifiable, repeatable and comparable John Scott , Paul Holland , Lucy Payne , Louise Cockburn , Carlos Valderrama The importance of establishing benchmarks before engaging in any change exercise, both qualitative and quantitativeRecognising ...
CASE STUDY: Am I the security risk in your supply chain? Why your compliance checklists don’t offer the information security you need Bridget Kenyon What do compliance checklists really protect?Which compliance questions reveal the biggest security risks with 3rd ...
PANEL SESSION: GDPR and global data protection variations: What have we learned and what are we still working on? Deborah Haworth , Rocio Cruz , Shash Patel , Matt Middleton-leal Update on the latest global data protection variations – is GDPR becoming the global data ...
CASE STUDY: A Playbook for “Reasonable and Appropriate” Security Measures and Safeguards Jacob Eborn Understand the requirements and importance of implementing “reasonable and appropriate” security measures and safeguards for ...
BEST-PRACTICE BRIEFING: A New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks Dave Palmer Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threatsHow new immune system ...
PANEL SESSION: External Threats: Emerging recent trends in cyber criminality and the current risk landscape Martin Smith , Craig Rice , Niall Macleod , Tony Adams Meeting the challenge of destructive and disruptive attacks from defence in depth intended to deter ...
BEST-PRACTICE BRIEFING: Common failings of IoT – avoid providing attackers with toehold to exploit on your corporate network Ken Munro Discuss the emergence of the IoT and it’s enabling technologiesExplain why the security of IoT ...
BEST PRACTICE BRIEFING: Fixing the disconnect – using the right language and translating from SOC to C Suite and back again Dr. Sandra Bell Translating C Suite priorities to your security teamCommunicating threats and risks upwards to your C ...
CASE STUDY: Getting the CEO on board: How high-level buy-in turned our people into our strongest line of defence Mark Nicholls Can colleagues, customers and partners be the strongest line of defence in the fight for ...
CASE STUDY: Alternative approaches to recruitment: Attracting and retaining talent from non-traditional routes Martin Ingle Are some skills sets more transferable than others for cyber security careers?Overcoming ingrained prejudices in ...
BEST-PRACTICE BRIEFING: The future of authentication: Secure passwordless login for employees and customers Claire Galbois-alcaix The death of the password?Can SFA securely replace 2FA and MFA?When something you have replaces ...
PANEL SESSION: Blockchain beyond the marketing: Where is it currently in use, and what are the lessons for Information Security professionals? Dr Vigliotti , Roxanne Morison , Tim Holmes-mitra How can information security specialists engage with this technology?Insight in the adoption opportunities and challenges ...
BEST-PRACTICE BRIEFING: Security innovations from Google: Preventing phishing and Zero Trust security Tom Salmon How Google prevents its employees being phished, having no reported or confirmed account takeovers since ...
CASE STUDY: Real cases of Social Engineering: Hackers, competitors and insiders Lisa Forte How attackers, in a real case over 13 months, used social engineering to turn a ...
RESEARCH BRIEFING: The threat from AI – latest research into the cyber security of AI Dr Jose Such Is AI going to stop cybercrime?The threat from smart malware and botnetsWhere is the intersection ...
CASE STUDY: The Decalogue of Contractual Security Sins Sebastian Avarvarei Why do we keep running into security issues with our IT contracts?What are the most ...
CASE STUDY: Challenging and changing your data protection culture: Building awareness and engaging individuals inside and outside the office Matthew Kay Exploring the challenges of harnessing a data protection culture within your business.How you can potentially ...
CASE STUDY: Remaining agile and fast-moving: Identifying priorities and risks, and resourcing a team to match Kevin Fielder N/A
CASE STUDY: Effective threat intelligence communication strategies: Upwards, downwards and outwards Nick Nagle Communicating threats to different audiences, and how they decipher what they have just been toldEffective ...
LEGAL BRIEFING: Automatic profiling and GDPR: Is your use of AI to profile users and make automated decisions compliant? Dan Whitehead GDPR – Profiling Overview including; Data; Subject; Fundamental RightsArticle 22 – Interpretational challenges for sole ...
CASE STUDY: Understanding and securing your data crown jewels: Building and implementing a new model to assess the sensitivity of data, and applying protective controls Andy Wall Understanding the extent of your data holding – your crown jewelsCreating new methods to assess ...
CASE STUDY: Integrating privacy engineering into your information security practices Jon Townsend Where can privacy processes beat hackers, and where can security awareness beat them?Why a reliance ...
CASE STUDY: The growing power of actionable Threat Intelligence in Organisation Security Stack Kirill Kasavchenko How do organizations cope with a lot of Threat Intelligence feeds? Is more always better?Can ...
BEST-PRACTICE BRIEFING: The problem of trust and how it can destroy your organisation Jeremy Swinfen Green What is trust in an organisational context?Why is it a problem for security professionals?Why do ...
BEST-PRACTICE BRIEFING: The security risk from legacy IoT devices on your network: Where vulnerabilities may lie and how to mitigate the risk for the future and new devices joining the network Phil Beecher What are the three most important issues should you consider when implementing IoT?What are the ...
PLENARY PANEL SESSION: Unacceptable personal pressure: How senior Cyber Security Executives safeguard their own mental health, and those of their teams Thom Langford , Allan Alford , Deborah Haworth , Kevin Fielder , Paul Watts , Mark Walmsley This panel of leading information security professional discuss different strategies for maintaining a healthy work/life ...