24th-26th April 2018 | London Hilton Canary Wharf

Agenda Day 2

8:30 am - 9:00 am REGISTRATION & COFFEE

9:00 am - 9:10 am CHAIRMAN’S OPENING REMARKS

•How has the cyber attack threat evolved in response to advanced cyber defences?
•Demonstrating how cyber attacks can exploit and attack Industrial Control Systems weaknesses
•Understanding why ICS is increasingly targeted by Cyber Attack
•How can you develop an integrated response to the growing cyber threat?
img

Helge Janicke

Director of the Cyber Technology Institute
De Montfort University

img

Professor Chris Hankin

Director of the Institute for Security Science and Technology
Imperial College London

img

John Easton

Lecturer, School of Electronic, Electrical and Systems Engineering
University of Birmingham

9:40 am - 10:10 am Session reserved for: CYBER X

10:10 am - 10:50 am CASE-STUDY HENKEL: IT AND OT JOINING FORCES TO IMPROVE CYBER SECURITY

·          Project report from Henkel, a German chemical and FMCG company with global footprint
·          How  the project was scoped, goals were identified and the project was launched
·          How IT and OT improved their partnership
·          How Henkel’s lessons learned can be applied to your organisation, and what are their next steps?

10:40 am - 11:00 am MORNING COFFEE AND NETWORKING

11:00 am - 11:40 am IT EMPEROR’S NEW CLOTHES AND OTHER STORIES; CYBER SECURITY IN INDUSTRY

Jonni Talsi, Lead Security Consultant,Wartsila
 ·          Cyber Security in Industry - How did we get here?
·          ICS Cyber Security – a field of multiple players and complex requirements
·          Does OT Cyber Security need a strong IT department?
·          Where and how does it all fail - experiences from industrial projects

Jonni Talsi

Lead Security Consultant
Wartsila

11:30 am - 12:00 pm THE INDUSTRIAL IMMUNE SYSTEM: USING MACHINE LEARNING & AI FOR OT CYBER DEFENCE

Andrew Tsonchev, Director of Technology,Darktrace Industrial
• How new machine learning and mathematics are automating advanced threat detection
• Why 100% network visibility allows you to preempt emerging situations, in real time, across both IT and OT environments
• How smart prioritization and visualization of threats allows for better resource allocation and lower risk
• Real-world examples of detected OT threats, from non-malicious insiders to sophisticated cyber-attackers


Andrew Tsonchev

Director of Technology
Darktrace Industrial

12:00 pm - 12:30 pm HOW TO BUILD A FLEXIBLE CYBER NETWORK IN YOUR INDUSTRY

Mark Finch, General Manager Information Security & IT Risk Management EMEA,Opel Vauxhall
·          How Opel Vauxhall have built a flexible control model for cyber security in the operating environment
·          Why this model works to ensure cyber security in an operating environment
·          What lessons have been learnt from this process?
·          How can this model be applied to your organisation?
img

Mark Finch

General Manager Information Security & IT Risk Management EMEA
Opel Vauxhall

12:30 pm - 1:30 pm NETWORKING LUNCH

1:30 pm - 2:00 pm HOW REMOTE MANAGEMENT SOLUTIONS CAN ADDRESS CYBER SECURITY

Samuel Korpi, Information Security Specialist,Neste
•Understanding why organisations would look to remotely manage cyber security 
•Why budget restraints and a lack of IT professionals mean cyber security is often outsourced off-site
•Establishing how remote management options provide cyber secure alternatives to in-house teams
•How do you integrate remote risk management with on-site requirements?
img

Samuel Korpi

Information Security Specialist
Neste

2:00 pm - 2:30 pm HOW BOARDS ARE PREPARING AGAINST CYBER THREAT

·          Understanding how boards are preparing against cyber security threats
·          How do boards prioritise cyber security risk against cost
·          How understanding the board level view of cyber risk will help your cyber defence strategy
·          What actions can boards take to consolidate their cyber security risk

2:30 pm - 3:00 pm AFTERNOON TEA AND NETWORKING

3:00 pm - 3:30 pm DEMONSTRATING CYBER SECURITY AS A SAFETY CONCERN

Heinz Janiec, Sen. Consultant/ Sen Project Manager,Speciality Engineering

•Understanding the safety aspects of a cyber attack is a major barrier to incorporating the operational teams in cyber security
•How associating cyber risk with safety in operational areas can engage both OT and IT operatives 
•Examining how  you can demonstrate cyber risk as a safety concern
•Determining how cyber security can be considered on a day-to day basis amongst operations teams

Heinz Janiec

Sen. Consultant/ Sen Project Manager
Speciality Engineering

3:30 pm - 4:00 pm RESPONDING TO THE CRASH OVERRIDE / INDUSTROYER CYBER ATTACK

William Horner, Process Automation Consultant,Horner Technologies
•Industroyer, also known as CrashOverride, was a highly targeted attack that hit a single, 200-megawatt Ukrainian transmission substation in late December 2016, however the attack vector remains unknown
•Why this attack is a major turning point for cyber security in ICS systems
•Determining the implications of this attack for your organisation
•How you can defend against similar attacks with unknown vectors?

img

William Horner

Process Automation Consultant
Horner Technologies

4:00 pm - 4:10 pm CHAIRMAN’S CLOSING REMARKS AND END OF DAY TWO