24th-26th April 2018 | London Hilton Canary Wharf

Agenda Day 1

8:30 am - 9:00 am REGISTRATION & COFFEE

9:00 am - 9:10 am 0900 CHAIRMAN’S OPENING REMARKS

9:10 am - 9:40 am BUILDING TRUST WITH CYBER SECURITY PARTNERS

·          Why large multinational organisations are increasingly looking to outsource cyber security to third parties
·          Demonstrating how a lack of communication between site teams and third party security providers can create security lapses
·          How can you identify reliable cyber security partners?
·          How can cyber security providers demonstrate capabilities in an underreported industry? 

9:40 am - 10:10 am Session reserved for: AIRBUS

10:10 am - 10:40 am HOW TO BUILD A CYBER DEFENCE THROUGH ORGANISATIONAL ENGAGEMENT

Keith Kent - Business Security Liaison National Grid
•Demonstrating the risks of cyber attack within organisations is a major challenge leaving industry over-exposed to threat
•Effectively securing against cyber risk requires active involvement from all organisation personnel
•How do you address a lack of appreciation for cyber security risks within organisations
•How actively engaging with your organisations leads to stronger cyber security risks
img

Keith Kent

Business Security Liaison
National Grid

10:40 am - 11:10 am MORNING COFFEE AND NETWORKING

11:10 am - 11:40 am HOW TO MAKE YOUR MANUFACTURING PROCESS CYBER RESILIENT

Barak Perelman - CEO Indegy
  • What does resilience look like?
  • Explore the strategies that will make your business resilient


Barak Perelman

CEO
Indegy

11:40 am - 12:10 pm ENSURING QUALITY AND COMPLIANCE DURING THE PROCUREMENT PROCESS & IDENTIFYING SUPPLY CHAIN PARTNERS ON THE INTERNATIONAL MARKET

John Easton - Lecturer, School of Electronic, Electrical and Systems Engineering University of Birmingham
•How cyber security considerations impact current procurement processes 
•How Organisations have been successful in meeting compliance requirements across it’s international supply chain
•Slow development cycles of manufacturing equipment cause disparity between available equipment and required cyber resilience 
•Why limited market options and vetting processes can result in high costs and reliance on equipment with known faults

img

John Easton

Lecturer, School of Electronic, Electrical and Systems Engineering
University of Birmingham

• Incorporating Cyber Security into the business model
• An architectural approach to Cyber Security
• Why system visibility is necessary to managing your cyber security
• Making cyber security a central pillar to supporting your organisation


Michelle Balderson

Global Director, Subject Matter Expert, Operational Technology and Critical Infrastructure
Fortinet

12:40 pm - 1:10 pm Session reserved for: HONEYWELL PROCESS SOLUTIONS


1:10 pm - 2:10 pm NETWORKING LUNCH

2:10 pm - 2:20 pm Session reserved for: Belarc

2:10 pm - 2:40 pm WHY CYBER SECURITY RISK NEEDS TO BE COMMUNICATED AT BOARD LEVEL

Thomas Olsen - Director Lagoni Engineering
•Demonstrating where a lack of understanding of cyber security at board level is resulting in exposure to hidden risk
•Why communicating cyber security risks to senior levels is a requirement for building cyber security
•How to communicate to the board using specific, industry-relevant, outcome-based case studies
•Understanding how board level ‘buy in’ leads to cultural change on cyber risk
img

Thomas Olsen

Director
Lagoni Engineering

2:40 pm - 3:00 pm Session reserved for: WATERFALL

Michael Firstenberg - Industrial Security Manager Waterfall Security


Michael Firstenberg

Industrial Security Manager
Waterfall Security

3:00 pm - 3:30 pm AFTERNOON TEA AND NETWORKING

3:30 pm - 12:00 am WHY THE GAP BETWEEN OPERATIONAL TECHNOLOGY (OT) AND INTERNET TECHNOLOGY (IT) POSES A THREAT TO CYBER SECURITY

Andy Oliver - Project Manager -Industrial Control Systems Cyber Security GSK
•Why a gap between IT and OT department is leaving unseen breaches in the cyber network
•How demonstrating this gap can actively engage employees on cyber awareness
•Understanding how far the OT / IT gap be closed with technological solutions
•How best practice IT/OT approaches can be developed to close cyber security gaps

Andy Oliver

Project Manager -Industrial Control Systems Cyber Security
GSK

4:00 pm - 4:30 pm BECOMING OPTIMISTIC ABOUT ICS CYBERSECURITY: USES CASES & RECOMMENDATIONS

Tony Atkins - Regional Director Nozomi Networks
  • Learn how ICS operators are tackling escalating ICS threats
  • Understand how to gain immediate visibility and detection
  • Become an ICS Optimist!



Tony Atkins

Regional Director
Nozomi Networks

4:30 pm - 5:00 pm KEY CONTROLS FROM THE NIS DIRECTIVE; OT CYBER SECURITY ANALYTICS AND ANOMALY DETECTION

·          What impact is the NIS Directive going to have for your organisation?
·          How should you be preparing the NIS Directive?
·          Understanding your role in implementing the NIS Directive
·          Demonstrating best practice under the new NIS Directives

Andreas Neumann


German Federal Office for Information Security (BSI)

img

Dan Tofan

Network and Information Security Expert
European Union Agency for Network and Information Security (ENISA)

Senior Speaker


National Cyber Security Centre

img

Chris Johnson

Head of Computing Science and Steering Group member of the UK Govt NCSC Industrial Control System
Glasgow University

·          Understanding your responsibilities under the NIS Directive
·          Understanding how the NIS Directive will be enforced in Europe
·          What impact will the NIS Directive have on your organisation?
·          How can you be preparing for the NIS Directive?

Andreas Neumann


German Federal Office for Information Security (BSI)

5:30 pm - 6:00 pm THE NIS DIRECTIVE IN THE UK

Senior Speaker - National Cyber Security Centre
·          Understanding your responsibilities under the NIS Directive
·          Understanding how the NIS Directive will be enforced in the UK
·          What impact will the NIS Directive have on your organisation?
·          How can you be preparing for the NIS Directive?

Senior Speaker


National Cyber Security Centre

5:30 pm - 6:00 pm THE GLOBAL IMPACT OF THE NIS DIRECTIVE

·          Assessing the implication for the NIS Directive outside of Europe
·          Are similar directives now likely to be produced on a global scale?
·          Will the NIS Directive impact your organisation?
·          Will your organisation be subject to the NIS Directive if operating within Europe?

6:00 pm - 6:10 pm CHAIRMAN’S CLOSING REMARKS AND END OF MAIN CONFERENCE