Agenda


R3 Summit 2018

R3 Summit 2018 features over 17 sessions in 2 distinctive streams.
Discover our  agenda below.

PLENARY – SIMULATION

Chair’s Welcome

09:00

INTERACTIVE INCIDENT RESPONSE SIMULATION

Your organisation learned it has suffered a cyber breach. You need to investigate and mitigate from further damage, but will your decisions limit the damage of this breach or will your choices exacerbate the problem? See how well you do during this fast-paced cyber breach simulation.

by Dr. Sandra Bell, Head of Resiliency Consulting, Sungard Show Profile

09:05

KEYNOTE: TBC

by a speaker from Darktrace

10:35

Refreshment break & networking

11:15

ROUNDTABLES

11:30

WORKSHOP

11:30

Lunch & networking

12:30

CASE STUDY: Rethinking the human factor to build a risk-aware cyber security culture

  • Looking at innovative approaches adopted by leading organisations which result in an improved culture of awareness

by Flavius Plesu, Head of Information Security, Bank of Ireland Show Profile

13:35

HOW TO: Translate cyber risk into business risk

14:00

Refreshment break & networking

15:15

CASE STUDY: The right way to brief your crisis communications team

  • Looking at communication strategies and case studies for mitigating cyber security breaches and improving recovery

by Tim Lambon, Director Crisis Response, NYA International Show Profile

15:45

BUSINESS UPDATE: Are you ready for the NIS Directive?

16:10

CASE STUDY: Why Google take down critical systems for a day

  • Looking at the lessons from the next evolution of incident response simulations

by Tom Salmon, Customer Engineer for Google Cloud Platform, Google Show Profile

16:35

CASE STUDY: Do you know what to do when encryption breaks?

  • Looking at the future of connected cyber security after quantum computing renders traditional encryption obsolete

by Jens Groth, Professor of Cryptology and Director of Academic Centre of Excellence in Cyber Security Research, UCL Show Profile

17:00

Close of Conference

17:25

HOW TO: Plan for the new Cold War – combatting nation state incidents

  • Looking at what companies can do to mitigate government-backed cyber attacks

by Tony Adams, Head of Investigations, Digital Forensics and Prevent Programme, National Cyber Crime Unit Show Profile

13:35

CASE STUDY: Responding to ransomware effectively

14:00

INTERACTIVE EXERCISE: How should executives respond to operational challenges during a cyber attack?

  • Looking at the issues around triage, collaboration and company values whilst confronting a cascade of commercial consequences.

by Kevin Duffey, Managing Director, Cyber Rescue Show Profile

14:25

Refreshment break & networking

15:15

CASE STUDY: When AIs attack – quarantining a machine learning breach

15:45

HOW TO: Manage third party breaches for minimal impact

16:10

Close of Conference

17:25

NETWORKING

Drinks Reception

17:30
back to top

Copyright © Lyonsdown Ltd. 2016. All rights reserved.