Agenda


R3 Summit 2017

R3 Summit 2017 features over 17 sessions in 2 distinctive streams.

BUILDING A COMPREHENSIVE THREAT LANDSCAPE

KEYNOTE: Predicting the next breach – keeping up with the criminals

  • Forecasting the primary types of cyber attack and high-risk targets
  • Using threat intelligence analysis to re-evaluate and adapt current incident response plans – developing playbooks for common incident types
  • Catching breaches earlier: feeding threat intelligence into threat hunting and identifying indicators of compromise

by Brian Boetig, Legal Attaché, US Embassy London, FBI Show Profile

09:10

KEYNOTE: Prepare for IoT breaches

by Rob Holmes, Vice President Products, Proofpoint Show Profile

09:35

PANEL DISCUSSION: How do we build a threat sharing network?

  • How to communicate threat trends and forensic details within sectors and across the wider market
  • Practical tips: learning from industries and regulators that have built a successful threat sharing network
  • What needs to be put in place to create a wider cooperative network?

by Simon Dukes, CEO, CIFAS Show Profile

by Andy Cobbett, CISO, FCA Show Profile

by John Unsworth, Chief Executive, London Digital Security Centre Show Profile

10:00

KEYNOTE: Topic TBC

10:45

Announcing a new TEISS initiative

  • That InfoSec issue you are struggling with right now – someone else in the room has probably already solved it
  • That InfoSec work you completed recently – many in the room would love to know how you did it
  • How can we tap into the rich experience of the conference audience?

by Stephen Citron, Director, The Peer Awards Show Profile

11:10

Refreshment break & networking

11:15

ROUNDTABLES

11:45

WORKSHOP

11:45

Lunch & networking

12:45

CASE STUDY: Watching system attacks in real time

  • Watch real-time video footage of a sustained attack and how it was countered
  • Quantifying what constitutes an attack and which systems it’s worth constantly patching

by Stephen Wilkinson, CISO, Addison Lee Show Profile

13:45

PRESENTATION: Al for Cyber Security? The Machine Fights Back

  • Moving from detection to automated response
  • Minimising disruption to business activity
14:10

SPRINGBOARD DISCUSSION: 72 hours’ notice – from identification to notification

  • Clarifying the GDPR reporting requirements: what constitutes a breach and when does the clock start?
  • Gathering the information: what are the best processes, and what level of detail is needed initially?
  • Reporting a global incident correctly in each jurisdiction
  • Balancing between scaremongering and concealing: what do you tell your suppliers, customers and employees, and when?

by Nina Baraksai, Group Head of Data Protection and Privacy, Sky Show Profile

by Jim Steven, Head of Data Breach Services, Experian Consumer Services Show Profile

by Dr Rachel Carter

14:35

Refreshment break & networking

15:25

HOW TO: Build a culture of reporting in order to catch incidents quicker

  • Creating an engaging training programme to improve prompt incident recognition
  • The single-funnel approach: making reporting easy and accessible
  • Making minor improvements to effect significant behavioural change within your staff
15:55

CASE STUDY: Mitigating the threat of social engineering

  • Understanding how threat actors compose intelligence profiles
  • Exploring cases where social engineering has compromised processes
  • Examining how good PR can be ideal for threat actors
  • What can you do to stop them?

by Kieren Nicolas Lovell, Head of Computer Emergency Response, University of Cambridge Show Profile

16:20

Close of Conference

16:50

CASE STUDY: What happened when I sprang an incident on my response team

  • Demonstrating the importance of preparation: lessons learned from a surprise simulation
  • Top Tips: the five things you must do quickly when responding to an incident

by Steve Watt, CIO, University of St Andrews Show Profile

13:45

HOW TO: Contain data post-breach to minimise loss

  • Working out what data you have, where, whether it’s encrypted, how it’s accessed, what’s been taken, and how serious the loss is
  • Quarantining data in breached applications
  • How much does BYOD expose your data?
14:10

PANEL DISCUSSION: Managing business continuity and disaster recovery in the extended enterprise

  • Resourcing your disaster recovery plan: who needs to do what, from where?
  • Incident response beyond the perimeter: how do you ensure business continuity when the incident is within the supply chain? Do you know your suppliers’ recovery plans?
  • Calculating the risk of business with customers that have poor security hygiene
  • Planning for disaster recovery at different times of the year, for both the short and long term

by Richard Bridgford, Chair, The Business Continuance Group Show Profile

14:35

Refreshment break & networking

15:25

CASE STUDY: Making the media work for you to minimise brand impact

  • Providing press training to your PR representative and coordinating a consistent, coherent message
  • Understanding the potential global impact of incident PR on brand and share price
  • Strenghtening your brand on the back of a breach

by Nick Samuels

15:55

HOW TO: Budget beyond the fines – limiting the cost of a breach

  • Managing the impact on brand and reputation
  • Budgeting for customer remediation: what’s proportional and what’s necessary?
  • Preparing for GDPR-enabled customer class actions in the aftermath of a breach
16:20

Close of Conference

17:05

NETWORKING

Drinks reception

17:15
back to top
Distributed with

Copyright © Lyonsdown Ltd. 2016. All rights reserved.