Agenda


R3: Resilience, Response & Recovery Summit 2018

R3: Resilience, Response & Recovery Summit 2018 features 20 different sessions across 2 distinctive streams.
Browse our full agenda and confirmed speakers below

PLENARY – SIMULATION

Chair’s Welcome

09:00

Interactive incident response – cyber breach simulation

  • Understand the different roles and responsibilities that are required in an organisation to respond effectively to a crisis
  • Explore the threshold between an emergency and a crisis
  • Understand why emergencies can be managed but crises need leadership
  • Recognise the interplay between different emergency and crisis management capabilities an organisation has in its toolbox and the dangers of developing them in organisational silos

by Dr. Sandra Bell, Head of Resilience Consulting, Sungard Show Profile

by Ron Miller, Principal Consultant, Sungard Show Profile

by Tom Holloway, Principal Consultant, Sungard Show Profile

by Will Owen, Independent Consultant, Sungard Show Profile

09:05

The new era of cyber-threats: the shift to self-learning, self-defending networks

  • Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats
  • How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time
  • How to achieve 100% visibility of your entire business including cloud, network and IoT environments
  • Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk
  • Real-world examples of subtle, unknown threats that routinely bypass traditional controls

by John Dyer, Account Director, Darktrace Show Profile

10:35

Refreshment break & networking

11:00

Roundtable discussions

Roundtable 1
What is Network Traffic Analytics, and why is it going to rock your SOC(s off)?
Nick Willis, Regional Sales Manager, ExtraHop

 

Roundtable 2
Breach Readiness and Response
James McNab, Director, Cybersecurity Marketing; Europe, Middle-East, Africa, Asia Pacific, Cisco

 

Roundtable 3
The Evolution of Incident Response Challenges
Andy Yeates, Senior Engineer, IBM Resilient

 

Roundtable 4
TBC
One Trust

11:30

WORKSHOP: What’s the business risk of a DDoS attack that lasts less than 10 minutes?

  • Real-world insight from Corero’s newly published research that most DDoS attacks are modest in scale and short in duration. In fact, the trend is that attacks are becoming even shorter
  • With so many attacks lasting only a few minutes, the key question is are these short duration attacks anything to worry about?
  • This live demonstration will illustrate the impact that these smaller attacks can have on service availability and how to defend against them
  • What are the business risks and penalties for those who fail to invest in adequate defences

by Andrew Lloyd, President & EVP of Sales and Marketing, Corero Show Profile

11:30

Lunch & networking

12:30

Chair’s opening remarks

by Paul Watts, CISO, Domino's Pizza Show Profile

13:30

CASE STUDY: Rethinking the human factor to build a risk-aware cyber security culture

  • People-related challenges and frustrations the industry is facing (Problem)
  • Why a new approach to awareness, behaviours and culture is required
  • Innovative approaches adopted by leading organisations (Solution)

by Flavius Plesu, Head of Information Security, Bank of Ireland UK Show Profile

13:35

HOW TO: Adopt Intelligent Orchestration to maximise SOC efficiencies

  • Automation has its place in improving SOC efficiencies, human intelligence is still one of the most important aspects in effective incident response.
  • Learn how Intelligent Orchestration can leverage automation in an uncertain world to empower your SOC team.

by Andrew Yeates, Senior Engineer, IBM Resilient Show Profile

14:00

Refreshment break & networking

15:15

CASE STUDY: Why Google break critical systems on purpose

  • Google Scale – Serving a Billion users every day
  • How we built our organisation around resiliency and reliability
  • Why Google break things on purpose

by Tom Salmon, Customer Engineer for Google Cloud Platform, Google Show Profile

15:45

CASE STUDY: Reputational protection during a cyber attack – the right and the wrong way to lead crisis communication

  • Looking at communication strategies and case studies for mitigating cyber security breaches and improving recovery

by Tim Lambon, Director Crisis Response, NYA International Show Profile

16:10

BUSINESS UPDATE: Are you ready for the NIS Directive?

  • Looking at the implementation requirements and how to engage with the regulator

by Peter Gibbons, Chief Security Officer, Network Rail Show Profile

16:35

Close of Conference

17:00

HOW TO: Respond to ransomware effectively

  • What are the impacts and effects of the ransomware
  • Exploring the position of forensic readiness and investment in training
  • Possible preventative measures, and what not to do when a breach occurs
  • Practical steps to consider

by Tony Adams, Head of Investigations, Digital Forensics and Prevent Programme, National Cyber Crime Unit Show Profile

13:35

CASE STUDY: Managing the internal threat

by Jeremy Swinfen-Green, Head of Cyber Security Consulting, TEISS Show Profile

14:00

INTERACTIVE EXERCISE: How should executives respond to operational challenges during a cyber attack?

  • Join an executive simulation of a cyber-attack
  • As the simulation progresses, you must decide if, when and how to notify key stakeholders, assign resources and lead the business to recovery.
  • Is your Board Breach-Ready?
  • Does your Board have a Dashboard?
  • How do we compare with our Peers?

by Kevin Duffey, Managing Director, Cyber Rescue Show Profile

by Flavius Plesu, Head of Information Security, Bank of Ireland UK Show Profile

by Sandy Gilchrist, Data Privacy Officer, Whitbread Show Profile

by Shane Deegan, Head of Global Support for Data Incidents, Equifax Show Profile

14:25

Refreshment break & networking

15:15

CASE STUDY: Do you know what to do when cryptography breaks?

  • What makes quantum computers special compared to classical computers
  • Why they pose a threat to some of our current cryptographic systems
  • Why post-quantum security modelling can be difficult.
  • Prepare to use post-quantum cryptography

by Jens Groth, Professor of Cryptology and Director of Academic Centre of Excellence in Cyber Security Research, UCL Show Profile

15:45

PANEL DISCUSSION: Tomorrow’s problems today – how do you prepare for IoT virus pandemics?

  • Looking at future threats and mitigations around connected devices

by David Deighton, CISO, University of Birmingham Show Profile

by Carsten Maple, Professor of Cyber Systems Engineering, University of Warwick Show Profile

16:10

Close of Conference

17:00

NETWORKING

Drinks Reception

17:00
back to top

Copyright © Lyonsdown Ltd. 2016. All rights reserved.