R3 Summit 2017

R3 Summit 2017 features over 17 sessions in 2 distinctive streams.


KEYNOTE: Predicting the next breach – keeping up with the criminals

  • Forecasting the primary types of cyber attack and high-risk targets
  • Using threat intelligence analysis to re-evaluate and adapt current incident response plans – developing playbooks for common incident types
  • Catching breaches earlier: feeding threat intelligence into threat hunting and identifying indicators of compromise

by Brian Boetig, Legal Attaché, US Embassy London, FBI Show Profile


KEYNOTE: Prepare for IoT breaches

by Rob Holmes, Vice President Products, Proofpoint Show Profile


PANEL DISCUSSION: How do we build a threat sharing network?

  • How to communicate threat trends and forensic details within sectors and across the wider market
  • Practical tips: learning from industries and regulators that have built a successful threat sharing network
  • What needs to be put in place to create a wider cooperative network?

by Simon Dukes, CEO, CIFAS Show Profile

by Andy Cobbett, CISO, FCA Show Profile

by John Unsworth, Chief Executive, London Digital Security Centre Show Profile




Announcing a new TEISS initiative

  • That InfoSec issue you are struggling with right now – someone else in the room has probably already solved it
  • That InfoSec work you completed recently – many in the room would love to know how you did it
  • How can we tap into the rich experience of the conference audience?

by Stephen Citron, Director, The Peer Awards Show Profile


Refreshment break & networking






Lunch & networking


CASE STUDY: Watching system attacks in real time

  • Watch real-time video footage of a sustained attack and how it was countered
  • Quantifying what constitutes an attack and which systems it’s worth constantly patching

by Stephen Wilkinson, CISO, Addison Lee Show Profile


PRESENTATION: Al for Cyber Security? The Machine Fights Back

  • Exploring how new machine learning and mathematics are automating advanced cyber defence
  • Understanding how automated defences augment human security teams
  • Navigating the challenges of implementing AI in a business environment
  • Examining real-world examples of unknown threats detected and defended by ‘immune system’ technology

by Andrew Tsonchev, Director of Cyber Analysis, Darktrace Show Profile


SPRINGBOARD DISCUSSION: 72 hours’ notice – from identification to notification

  • Clarifying the GDPR reporting requirements: what constitutes a breach and when does the clock start?
  • Gathering the information: what are the best processes, and what level of detail is needed initially?
  • Reporting a global incident correctly in each jurisdiction
  • Balancing between scaremongering and concealing: what do you tell your suppliers, customers and employees, and when?

by Nina Baraksai, Group Head of Data Protection and Privacy, Sky Show Profile

by Jim Steven, Head of Data Breach Services, Experian Consumer Services Show Profile

by Dr Rachel Carter, Managing Director of Carter Insurance Innovations and, Director of Security Institute (UK) Show Profile

by Giacomo Collini, Director of Information Security, Show Profile


Refreshment break & networking


HOW TO: Build a culture of reporting in order to catch incidents quicker

  • Creating an engaging training programme to improve prompt incident recognition
  • The single-funnel approach: making reporting easy and accessible
  • Making minor improvements to effect significant behavioural change within your staff

CASE STUDY: Mitigating the threat of social engineering

  • Understanding how threat actors compose intelligence profiles
  • Exploring cases where social engineering has compromised processes
  • Examining how good PR can be ideal for threat actors
  • What can you do to stop them?

by Kieren Lovell, Head of Computer Emergency Response, University of Cambridge Show Profile


Close of conference


CASE STUDY: What happened when I sprang an incident on my response team

  • Demonstrating the importance of preparation: lessons learned from a surprise simulation
  • Top Tips: the five things you must do quickly when responding to an incident

by Steve Watt, CIO, University of St Andrews Show Profile


HOW TO: Contain data post-breach to minimise loss

  • Working out what data you have, where, whether it’s encrypted, how it’s accessed, what’s been taken, and how serious the loss is
  • Quarantining data in breached applications
  • How much does BYOD expose your data?

by Rogelio Aguilar, Management Consultant - Cyber Resilience, Privacy and IT Security, SunGard Show Profile


SPRINGBOARD DISCUSSION: Managing business continuity and disaster recovery in the extended enterprise

  • Resourcing your disaster recovery plan: who needs to do what, from where?
  • Incident response beyond the perimeter: how do you ensure business continuity when the incident is within the supply chain? Do you know your suppliers’ recovery plans?
  • Calculating the risk of business with customers that have poor security hygiene
  • Planning for disaster recovery at different times of the year, for both the short and long term

by Richard Bridgford, Chair, The Business Continuance Group Show Profile

by Furqan Hashmi, Head of IT Security and Operations, Emirates Investment Authority Show Profile

by Jamie Watters, Business Continuity Manager, HSBC Global Banking & Markets, Americas, HSBC Show Profile


Refreshment break & networking


CASE STUDY: Making the media work for you to minimise brand impact

  • Providing press training to your PR representative and coordinating a consistent, coherent message
  • Understanding the potential global impact of incident PR on brand and share price
  • Strenghtening your brand on the back of a breach

by Nick Samuels, Executive Director, Strategy, Communications and Policy, Royal College of Physicians Show Profile


HOW TO: Budget beyond the fines – limiting the cost of a breach

  • Managing the impact on brand and reputation
  • Budgeting for customer remediation: what’s proportional and what’s necessary?
  • Preparing for GDPR-enabled customer class actions in the aftermath of a breach

by John Pomeroy, Head of Risk Management, Cyber Security & Compliance, City of Toronto Show Profile


Close of conference



Drinks reception

back to top
Distributed with

Copyright © Lyonsdown Ltd. 2016. All rights reserved.