Agenda


R3 Summit 2018

R3 Summit 2018 features over 17 sessions in 2 distinctive streams.
Discover our  agenda below.

PLENARY – SIMULATION

Chair’s Welcome

09:00

INTERACTIVE INCIDENT RESPONSE SIMULATION

Your organisation learned it has suffered a cyber breach. You need to investigate and mitigate from further damage, but will your decisions limit the damage of this breach or will your choices exacerbate the problem? See how well you do during this fast-paced cyber breach simulation.

by Dr. Sandra Bell, Head of Resiliency Consulting, Sungard Show Profile

09:05

The new era of cyber-threats: the shift to self-learning, self-defending networks

  • Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats
  • How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time
  • How to achieve 100% visibility of your entire business including cloud, network and IoT environments
  • Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk
  • Real-world examples of subtle, unknown threats that routinely bypass traditional controls

by John Dyer, Account Director, Darktrace Show Profile

10:35

Refreshment break & networking

11:00

ROUNDTABLES

11:30

WORKSHOP

11:30

Lunch & networking

12:30
CHAIR: Paul Watts, CISO, Dominos Pizza

CASE STUDY: Rethinking the human factor to build a risk-aware cyber security culture

  • Looking at innovative approaches adopted by leading organisations which result in an improved culture of awareness

by Flavius Plesu, Head of Information Security, Bank of Ireland UK Show Profile

13:35

HOW TO: Translate cyber risk into business risk

14:00

Refreshment break & networking

15:15

CASE STUDY: Why Google break critical systems on purpose

  • Looking at the lessons from the next evolution of incident response

by Tom Salmon, Customer Engineer for Google Cloud Platform, Google Show Profile

15:45

CASE STUDY: The right way to brief your crisis communications team

  • Looking at communication strategies and case studies for mitigating cyber security breaches and improving recovery

by Tim Lambon, Director Crisis Response, NYA International Show Profile

16:10

BUSINESS UPDATE: Are you ready for the NIS Directive?

  • Looking at the implementation requirements and how to engage with the regulator

by Peter Gibbons, Chief Security Officer, National Rail Show Profile

16:35

Close of Conference

17:00
CHAIR: MIKE KOSS, HEAD OF IT SECURITY & RISK, N BROWN GROUP

HOW TO: Respond to ransomware effectively

  • Looking at possible preventative measures, and what not to do when a breach occurs

by Tony Adams, Head of Investigations, Digital Forensics and Prevent Programme, National Cyber Crime Unit Show Profile

13:35

CASE STUDY: Plan for the new Cold War – combating nation state incidents

  • Looking at what companies can do to mitigate government-backed cyber attacks
14:00

INTERACTIVE EXERCISE: How should executives respond to operational challenges during a cyber attack?

  • Looking at the issues around triage, collaboration and company values whilst confronting a cascade of commercial consequences.

by Kevin Duffey, Managing Director, Cyber Rescue Show Profile

14:25

Refreshment break & networking

15:15

CASE STUDY: Do you know what to do when encryption breaks?

  • Looking at the future of connected cyber security after quantum computing renders traditional encryption obsolete

by Jens Groth, Professor of Cryptology and Director of Academic Centre of Excellence in Cyber Security Research, UCL Show Profile

15:45

Close of Conference

17:00

NETWORKING

Drinks Reception

17:00
back to top

Copyright © Lyonsdown Ltd. 2016. All rights reserved.