2017 Expo Agenda

GDPR Conference
Seminar Theatre 1
Seminar Theatre 2
Seminar Theatre 3
Hackchat
GDPR Conference
Seminar Theatre 1
Seminar Theatre 2
Seminar Theatre 3
Hackchat

9:40 am - 9:45 am

Opening Remarks from the Chair

Scott Sammons
Chair
Information and Records Management Society (IRMS)

9:45 am - 10:05 am

GDPR Preparedness – Frameworks and Guidance from the ICO

  • Preparing for the May 2018 deadline: Avoiding the risk of 20,000,000 EUR fines, or up to 4% of the total worldwide annual turnover for serious breaches to GDPR
  • Understanding the key principles of the regulation – including the right to erasure, the right to access, data portability and how to respond to data requests
  • Exploring the role of the Data Protection Officer, reporting data breaches and GDPR enforcement
  • Identifying the appropriate supervisory authority in cases of complex cross-board data processing
  • Global Implications: How GDPR will affect organisations outside of the EU
  • How does GDPR link with other data policies including the EU-US Privacy Shield and the Network and Infrastructure Directive?
Peter Brown
Senior Technology Officer
Information Commissioners Office (ICO)

10:05 am - 10:25 am

GDPR in the Boardroom – Leadership for Compliance

  • Getting data protection right to help deliver real business benefits and competitive advantage
  • Managing the implications of GDPR for your business in terms of data strategy and usage within the organisation
  • Exploring the key elements of a good information strategy
  • Examining new rights and status of Data Protection Officers
  • Creating a culture of GDPR data compliance and measuring compliance
Simon Wright
Group Data Protection Officer
Badoo

10:25 am - 10:45 am

Data Governance Requirements for GDPR

  • Meeting Data Governance regulatory requirements for GDPR – the clock is ticking, how are you protecting your data and content
  • Securing your applications and securely share files on premises and in the cloud, encrypt content, data and files
  • Cloud storage and file sharing – challenges and security threats
  • Data Governance solutions to help IT and business leaders gain greater control and transparency over visibility of data assets, who has access to files and data, data retention, reporting and auditing
  • Challenges of managing and classifying data in a digital workplace, what does best practice data governance look like
Kris Lahiri
Data Privacy Officer and Co-founder
Egnyte

10:45 am - 11:00 am

The Role of Technology in Keeping Data Private and Secure

  • Where organisations are on their technology journey to GDPR
  • A security and privacy framework to help you review your technology gaps
  • Why deploying targeted risk assessments and data discovery audits provide critical focus
  • How to find ‘hidden’ data and protect it with an information-centric security approach
  • How bringing data protection and security technology together is better at addressing GDPR requirements
Sunil Choudrie
Information Protection Strategist
Symantec

11:00 am - 12:00 pm

Coffee and Expo

11:45 am - 12:05 pm

Developing an Organisational Roadmap for the Introduction of GDPR in May 2018

  • Dealing with the multiple challenges and opportunities that the GDPR brings
  • Taking a proactive approach to preparing for its implementation, developing project milestones and plan of action to meet the deadline
  • Managing the impact on your company’s data strategy and ability to use data
  • Taking a cross-function approach to GDPR – Security, IT, Data and Legal teams working together
Jonathan Baines
Data Protection Officer, GDPR Readiness
Network Rail

12:05 pm - 12:20 pm

GDPR Compliance is Good for Business

  • Your GDPR compliance documentation can be leveraged to provide huge secondary benefits to your organization’s digital transformation and data security projects
  • Reduce total cost of ownership and risk by automating data input and compliance gap analysis
  • Compliance is a continuous—not periodic—process
  • Building a consistent documentation strategy upfront will help you reduce risk and increase insight
Ian Stendera
Head of Customer Success
Ardoq

12:20 pm - 12:40 pm

New Considerations for Sensitive Data, Regulated data, Personal Data and Child Data

  • Best practice in processing personal sensitive data: Understand what personal data is, what lawful processing looks like and how to gain and record consent
  • Detecting data breaches and utilising breach procedures to ensure you take the appropriate steps to inform relevant parties
  • Communicating the correct data privacy notice and that they are undertaking the appropriate consent retrieval methods
  • New measures for data retention and data disposal – how to prove state of data?
  • Managing data on children, what additional controls do you need?
Nina Barakzai
Group Head of Data Protection and Privacy
Sky

12:40 pm - 1:00 pm

eBay – Reviewing Process, Procedure and Reporting for GDPR

Case Study

  • Reforming the way personal data is stored, used, shared, maintained and recorded
  • Technological solutions to help meet GDPR challenges
  • Developing processes to manage individual data rights
  • Implementing record keeping and reporting to demonstrate compliance and accountability
  • Developing and enhancing a culture of privacy compliance
  • Operational and technical challenges
Ben Westwood
Senior Privacy Manager & Data Protection Officer
eBay UK

1:00 pm - 2:00 pm

Lunch and Expo

2:00 pm - 2:20 pm

Risk and Readiness: Common Challenges of GDPR Implementation

Dominic Johnstone
Head of Information Management Services
Crown Records Management

2:20 pm - 2:40 pm

GDPR – Being Ready for May 2018

  • Mandatory grounds for appointing a DPO under the GDPR
  • Latest Guidance by Art.29 Data Protection Working Party on the DPO
  • What the DPO is expected to do in their first 100 days?
  • How easy or difficult is it to hire a DPO?
  • How to identify a senior manager internally who could become the DPO?
  • Will ‘Team DPO’ as an outsourced solution become the de facto way to comply with the requirement for a DPO?
Ardi Kolah
Executive Fellow and Co-Director
GDPR Transition Programme - Henley Business School (UK)

2:40 pm - 3:00 pm

Data Mapping – On the Journey to Accountability

  • Exploring the key task of data mapping; what the GDPR requires us to do and why.
  • The benefits – how mapping flows can lead to an enhanced understanding of privacy risks.
  • Data Mapping as a foundational activity to accede to individual rights and breach response.
  • Tool based vs manual mapping approaches and how to maintain mapping projects.
  • Latest guidance from IAPP on preparedness and mapping.
  • Paving the way for privacy impact assessments and risk remediation.
Rebecca Turner
Head of Compliance and Privacy
Trainline

3:00 pm - 3:30 pm

Coffee and Expo

3:30 pm - 4:15 pm

Creating a Culture of Data Compliance in your Organisation

Panel Discussion

  • Exploring the role of Data Protections Officers in preparing for GDPR
  • How to engage staff and the board in the responsibilities of the regulation
  • Considerations beyond the organisation: Where do you need to consider GDPR in outsourcing relationships and the supply chain?
  • Measuring GDPR compliance
  • Investing in a programme of staff training
Brian Shorten
Chairman
Charities Security Forum
Ardi Kolah
Executive Fellow and Co-Director
GDPR Transition Programme - Henley Business School (UK)
Nina Barakzai
Group Head of Data Protection and Privacy
Sky

9:45 am - 10:05 am

Live Stream of GDPR Conference Stage: GDPR Preparedness – Frameworks and Guidance from the ICO

  • Preparing for the May 2018 deadline: Avoiding the risk of 20,000,000 EUR fines, or up to 4% of the total worldwide annual turnover for serious breaches to GDPR
  • Understanding the key principles of the regulation – including the right to erasure, the right to access, data portability and how to respond to data requests
  • Exploring the role of the Data Protection Officer, reporting data breaches and GDPR enforcement
  • Identifying the appropriate supervisory authority in cases of complex cross-board data processing
  • Global Implications: How GDPR will affect organisations outside of the EU
  • How does GDPR link with other data policies including the EU-US Privacy Shield and the Network and Infrastructure Directive?
Peter Brown
Senior Technology Officer
Information Commissioners Office (ICO)

10:10 am - 10:30 am

The Evolving Cyber Threat Landscape – Looking Ahead for the Next 12 Months

Expert Insight

  • Horizon scanning for emerging and future threat vectors
  • Exploring new areas of vulnerability and new opportunities for exploitation
  • Examining the changing nature of the threat: Large scale state-level vs. personal and reputational attacks
Ewan Lawson
Senior Research Fellow
Royal United Services Institute (RUSI)

10:40 am - 11:10 am

Dealing with the Increased Sophistication of Phishing Attacks

Best Practice Panel Discussion

  • Reducing vulnerability and managing risk – updating security policies and solutions to eliminate threats as they evolve
  • Educating employees and conducting training sessions with mock phishing scenarios
  • Implementing the use of anti-virus on mobiles to combat the effect of smishing damaging organisations smart working and mobile security
  • Applying log in activity software to halt fake email interfaces stealing log-in details
  • Exposing the dangers of URLS as websites built by criminals that gain access to identities and systems
Piers Wilson
Director
Institute of Information Security Professionals (IISP)
DCSupt Glenn Maleary
Detective Chief Superintendent
City of London Police - Economic Crime Directorate
Chris Rivinus
Head of Business Systems
Tullow Oil

11:20 am - 12:05 pm

NIS Directive: Next Steps in Critical Infrastructure and Essential Services Protection

The Directive on security of network and information systems (the NIS Directive). What happens when your organisation experiences a massive cyber incident?

  • How will the C-Suite react to a cyber breach?
  • Is a cyber crisis time for collaboration or command and control?
  • Should you call in cyber security experts, and if so, at what point?
  • What are the strengths and weaknesses of your communications and cyber readiness?

Cyber threat hunting and war gaming can help you to mitigate risks and secure your reputation.

Justin Lowe
Cyber Security Expert
PA Consulting Group
Ian Howard
Cyber Security Expert
7 Safe

12:15 pm - 1:00 pm

Shared Lessons: Preparing for Ransomware Attacks and Disaster Recovery

Best Practice Panel Discussion

  • Understanding the increase in ransomware variant: More common, more cost and more damaging
  • Optimising defence: Deploying monitoring tools to detect, respond and neutralize suspicious activity for DDOS and website protection
  • Factoring ransomware into business continuity planning to enable quick and efficient response in the event of a breach
  • Paying the ransom: Discussing practicality, organisational reputation and principles
  • Preparedness best practice: Regular backups of mission critical data, defined access control and system compartmentalisation

 

Talal Rajab
Head of Programme – Cyber and National Security
Tech Uk
Bridget Kenyon
Head of Information Security
University College London
Stephen Baker
Chief Executive & Spokesperson on Civil Resilience and Community Safety
Suffolk Coastal and Waveney Councils & SOLACE
Matt Argyle
Head of IT and Information Governance Lead
Children's Hospice South West

1:20 pm - 1:40 pm

The Dangers and Opportunities of AI-Based Security Systems

Expert Insight

  • The need for smart, adaptive security systems
  • AI and machine learning in new deterrence and defence technologies
  • Exploring the risks and rewards posed by smart security systems
Prof. Tim Watson
Director
Cyber Security Centre at WMG (Warwick University)

1:40 pm - 2:00 pm

Emerging Cyber Tech for Evolving Cyber Threats

Expert Insight

  • Matching the changing threat with the right solutions, strategy and approach
  • Working with the private cyber security industry to accelerate the development of next-gen technology
  • Developing the potential of automation, artificial intelligence and machine learning in new deterrence and defence technologies
  • Exploring the risks and rewards posed by a future of quantum computing
  • Realising the potential of Blockchain based security solutions and advanced cryptography
Prof Chris Hankin
Director
Institute for Security Science and Technology, Imperial College London

2:10 pm - 2:30 pm

Taking a Proactive Approach to Cyber Defence

Case Study

  • Revisiting strategies to map and test vulnerabilities within your organisation
  • Developing a Red Team cyber approach
  • Simulating attacks with advanced threat intelligence to secure critical IT
  • Shifting mindsets from incident response to continuous response
Ian Glover
President
CREST

2:40 pm - 3:00 pm

Adopting cloud Services – A Risk Aware Approach

  • Exploring operational and security benefits presented by Cloud based SaaS, PaaS and IaaS
  • End-to-end security responsibilities – who is the weakest link in the chain
  • What are the inherent cloud risks and how do we mitigate them
  • The importance of classifying risk of data and compliance frameworks when considering multi-tier cloud options
Steve Williamson
Director of IT Governance, Risk & Compliance
GlaxoSmithKline

3:05 pm - 3:25 pm

Cyber Security Considerations for the UK’s Cloud Journey

  • Operational security benefits presented by Cloud based SaaS, PaaS and IaaS
  • Demystifying the trust and security concerns, and misconceptions that arise as the cloud evolves
  • How to build greater trust and confidence in the security of the cloud
  • The need for leadership and important role of cloud security champions
Sue Daley
Head of Programme for Cloud, Data Analytics and AI
TechUK

3:30 pm - 3:50 pm

Implementing Verify for Identity Management across Government

Case Study

  • Using a ubiquitous system to ensure widespread demographic coverage using multiple types of evidence and methods of verification
  • Keeping pace with security challenges, products and best practice
  • Ensuring strong authentication including 2nd Factor Authentication for bolstered security
  • Increasing scope to service local government, health and social care, and the private sector
  • Working with D5 nations, the United Nations, and the World Bank, to promote international standards and platforms for identification and verification
Adam Cooper
Lead Technical Architect
Verify-Government Digital Service (GDS)

3:55 pm - 4:15 pm

Reframing Security Strategies for Secure Mobile Working

Case Study

  • Reviewing the layers of security risk connected to mobile cyber-security: Network, device, application, and back-end system
  • Implementing cyber security policies and processes to manage remote working risks
  • Creating a culture of security through clear responsibilities and accountability
  • Taking a proactive and protective approach to mobile security for next-generation productive working
  • Using encryption and preventative software to manage risks
  • Identity, Access Management and 2-Factor Authentication to protect against data breaches
  • Cloud and BYOD security
Giacomo Collini
Director of Information Security
King.com

9:45 am - 10:05 am

Live Stream of GDPR Conference Stage: GDPR Preparedness – Frameworks and Guidance from the ICO

  • Preparing for the May 2018 deadline: Avoiding the risk of 20,000,000 EUR fines, or up to 4% of the total worldwide annual turnover for serious breaches to GDPR
  • Understanding the key principles of the regulation – including the right to erasure, the right to access, data portability and how to respond to data requests
  • Exploring the role of the Data Protection Officer, reporting data breaches and GDPR enforcement
  • Identifying the appropriate supervisory authority in cases of complex cross-board data processing
  • Global Implications: How GDPR will affect organisations outside of the EU
  • How does GDPR link with other data policies including the EU-US Privacy Shield and the Network and Infrastructure Directive?
Peter Brown
Senior Technology Officer
Information Commissioners Office (ICO)

10:10 am - 10:55 am

Securely Unlocking the Value of Digital Business in the Internet of Things

  • What is the internet of things?
  • What use cases are there for the internet of things?
  • What are the challenges inherent in the internet of things?
  • How can Entrust Datacard help you prepare for the internet of things?

 

Luke Niemiec
Sales Associate
Entrust Datacard

11:05 am - 11:35 am

Data Breach Detection – What’s Outside Your Firewall?

  • Dark Web monitoring – has your data already left the building?
  • Watermarking and Fingerprinting – how to recognize your data when it leaks
  • Detecting Data Breaches on the Deep Dark Web
  • Beyond Google – the role of TOR, IRC and Paste sites in data breaches
  • Real-time detection and alerting as part of a GDPR compliance strategy
Jeremy Hendy
Chief Commercial Officer
RepKnight

11:45 am - 12:15 pm

12 Steps the ICO recommend you take

  • If you are complying with the Data Protection Act already then you have a great head start to build upon to be able to comply with the GDPR.
  • However, there are significant changes that businesses will need to cater for.  The ICO has published the 12 steps that businesses need to be aware of, in relation to the main differences between the regulations.
  • This presentation will discuss the practical aspects of these 12 steps and where you should focus your efforts in order to comply
Steve Marshall
Chief Operating Officer
Risk X

12:40 pm - 1:10 pm

Cyber Security Against a Backdrop of Increased Threat of Hacking

  • Understand how Cybercriminals are exploiting business vulnerabilities around storing data in multiple locations
  • Why Cyber-Immunity features must be considered as part of any specifier’s product selection criteria as boundaries between specialist security systems and IT continue to blur
  • Stay ahead of the game by proactively mitigating the risk of cyber threats on your CCTV network and understanding what impact the new GDPR regulations will have on your data storage
Jim Perkins
Business Development Manager
Panasonic

1:20 pm - 1:50 pm

Cyber Exposure in the Critical Infrastructure

  • Exploring how Public Sector digital transformation has resulted in an explosion of new platforms, devices and approaches including cloud, SaaS, mobile, IoT and DevOps
  • Recognizing that the modern cyberattack surface is no longer just a laptop or server, but is now a complex mix of connected devices, services and computing platforms which is constantly expanding and contracting.

With the increased reliance on these systems for frontline services, and an ever present threat of attack to the critical infrastructure impacting the masses, it’s more important than ever to understand the cyber exposure gap. Join Tenable, the pioneers of Cyber Exposure, as they discuss the modern attack surface and the necessary controls to help manage it.

Gavin Millard
EMEA Technical Director
Tenable

1:55 pm - 2:15 pm

The Psychology Behind Cyber Attacks and How to Manage the Insider Threat

Expert Insight

  • Implementing safeguards to administrative, procedural and technical components to decrease human error
  • Using holistic approaches to develop training for staff and reduce insider attacks
  • Reducing physical data breaches such as; lost paperwork, faxing or emails to wrong recipients
  • Monitoring technology to spot threats within the organisation
Simon Parkin
Senior Research Associate
University College London

2:25 pm - 3:10 pm

24 Hours in a Cyber Attack

  • Exposing how quickly multiple technical defences can be efficiently defeated
  • Protecting organisations from well-resourced, well-motivated attackers who use a wide range of advanced techniques to compromise  your security
  • Understanding the vulnerabilities of traditional systems and implementing advanced core security functions
Noel Hannan
Cyber and Digital Innovation Lead
GoSecure

3:20 pm - 3:40 pm

Ensuring Cyber Security Culture in Complex Environments of Regular Change

Case Study

  • Reviewing the layers of security risk connected to mobile cyber-security: Network, device, application, and back-end system
  • Implementing cyber security policies and processes to manage remote working risks
  • Creating a culture of security through clear responsibilities and accountability
  • Taking a proactive and protective approach to mobile security for next-generation productive working
  • Using encryption and preventative software to manage risks
Jasvinder Pham
Information & Cyber Security Manager
High Speed Two (HS2)

3:55 pm - 4:15 pm

Communicating Cyber Security with the Board –Authentication & Access Rights

Expert Insight

  • How to communicate cyber security with the board effectively.
  • Embedding Cyber Security within organisational culture starts at the board.
  • Making sure C-level staff understand that they are a cyber target.
  • Ensuring good authentication and access rights practice and procedures.
Matt Argyle
Head of IT and Information Governance Lead
Children's Hospice South West

9:45 am - 10:05 am

Live Stream of GDPR Conference Stage: GDPR Preparedness – Frameworks and Guidance from the ICO

  • Preparing for the May 2018 deadline: Avoiding the risk of 20,000,000 EUR fines, or up to 4% of the total worldwide annual turnover for serious breaches to GDPR
  • Understanding the key principles of the regulation – including the right to erasure, the right to access, data portability and how to respond to data requests
  • Exploring the role of the Data Protection Officer, reporting data breaches and GDPR enforcement
  • Identifying the appropriate supervisory authority in cases of complex cross-board data processing
  • Global Implications: How GDPR will affect organisations outside of the EU
  • How does GDPR link with other data policies including the EU-US Privacy Shield and the Network and Infrastructure Directive?
Peter Brown
Senior Technology Officer
Information Commissioners Office (ICO)

10:05 am - 10:35 am

Engaging with Partners: How to maximise risk mitigation after GDPR

  • Understanding Data Controller/Processor/Sub-Processor responsibilities
  • Partner Contract construction to best protect your business
  • Understanding Down-stream processing of equipment to avoid the 10% of data breaches caused by improper disposal
  • How to select the right partners for your business and avoid reputational damage
Daniel Smith
Managing Director
EOL IT Services

10:45 am - 11:15 am

The Cybernetics of Society

  • Understanding cyber as a complex, self-adaptive, socio-technical phenomenon operating at societal scale
  • Exploring the implications of this for cyber security and society
  • Projecting the possible future developments of cyber as a societal construct
Colin Williams
Director
Software Box (SBL)

11:25 am - 11:55 am

“Smashing The Bots”: Your Guide to Bot Defense

  • With most data breach reports commonly reporting on a large increase in bot traffic it is important to understand that bots are everywhere. Some of them are nice, desirable bots; but many of them are not
  • By definition, a bot is software that runs automated tasks (scripts) over the Internet
  • Many bots are controlled by a central bot controller, they form a “botnet” and can be used to send massive amounts of DDoS traffic at a single target
  • Many organizations have no idea that they have a bot problem at all
  • We discuss how to setup effect bot mitigation to protect your data
Keiron Shepherd
Senior Security Systems Engineer
F5 Networks

12:05 pm - 12:35 pm

A Dummies Guide to GDPR – Getting Down to Business with European Privacy

  • Ensuring business buy in to your GDPR project
  • A methodology for implementing a GDPR compliant business environment
  •  Incorporating GDPR as the keystone of your Digital Transformation strategy
  • Aligning your Cyber Security and Data Protection objectives
Robert O’Brien
CEO
MetaCompliance Limited

12:45 pm - 1:15 pm

The Dark Side of Bitcoin: Understanding and Addressing the Threat

  • Understanding the risks: how bitcoin is used to monetise cyber criminal activities including money laundering, drug trafficking, and ransomware
  • Protecting your organisation: tools and approaches to help financial institutions and CISOs identify and assess their exposure
  • Responding to the threat: what law enforcement is doing to investigate the criminal use of cryptocurrencies

 

Dr. James Smith
CEO
Elliptic
Dr. Shane Shook
Cyber-Crime and InfoSec Consultant
DS Scott Johnston
Detective Sergeant
Metropolitan Police Service

1:25 pm - 1:55 pm

Safeguarding Data in the Digital Economy

  • Safeguarding data in applications – inside and outside organisations
  • Reducing the need for role-based access through attribute-based access control
  • Security measures for sharing data outside the organisation
  • Exploring data safeguards for GDPR
Peter Fitzpatrick
Head of Information Security
BAE Systems

2:05 pm - 2:35 pm

Mobile Security and Mobile Threat Defence

Digital transformation immersed us into a mobile-first world where smartphones and smart devices are the communications media. This session aims to present the challenges to mobile security and the solutions designed to protect devices, applications and sensitive data.

  • GDPR: what are the key requirements for compliance with the regulation from a mobile stand point?
  • How to protect Applications from inside flaws?
  • Mobile endpoint security: What are the threats lurking in your corporate devices?
  • How to set up effective protection integrated within your existing infrastructure?
  • Sensitive Apps: How to detect on-device threats and adjust your App’s behavior in real time?
Dejan Draguljevic
Sales Director Europe
Pradeo

2:45 pm - 3:05 pm

Building Resilience Together: National Cyber Security Programme – Local

DCLG update on the work of the National Cyber Security Programme – Local:

  • Focussing on collaborative working with the National Cyber Security Centre and Cyber Resilience Government initiative via the Building Resilience Together project
  • How to link-up with the international award winning Think Cyber Think Resilience mentoring resources to support corporate awareness
  • Looking at how cyber impacts the big issues of devolution, growth, public services, local democracy and civic resilience

 

William Barker
Head of National Cyber Security Programme – Local
Department for Communities and Local Government (DCLG)

3:15 pm - 3:35 pm

Top Tips for Good Cyber Hygiene

Expert Insight

  • Helping organisations prepare, protect, prevent, respond and recover from salient cyber threats
  • Engaging with local enterprise partnerships to create a shared awareness culture
  • Encouraging organisations to help prevent attacks from spreading through the Cyber Security Information Sharing Partnership (CiSP)
  • Working with national partners across government, crime sector and industry to provide regular updates on attack trends
Jennie Williams
Cyber Protection Officer
TITAN - North West Regional Organised Crime Unit

3:55 pm - 4:15 pm

Joining Records Management and Cyber Security

  • The role of Records Management and Cyber Security Experts in handling information.
  • How do Records Management and Cyber Security Expertise integrate?
  • How can good practice be communicated across a business?
  • Industry knowledge from organisations across the public and private sector in the area of boosting security through communication.
Martin Fletcher
Government Liaison and Training Manager
The National Archives

The Hackchat Stage showcases leading figures in the UK cyber security as they discuss cyber from a more holistic perspective. A hot seat stage moderated by BBC Journalist and Presenter Babita Sharma, Hackchat draws attention to developments in the fields of cyber criminology, education and skills, diversity and much more.

10:15 am - 10:45 am

Fostering Diversity in the Cyber Security Industry

Babita Sharma
Journalist & Presenter
BBC World News
Jasvinder Pham
Information & Cyber Security Manager
High Speed Two (HS2)
Bridget Kenyon
Head of Information Security
University College London

11:05 am - 11:25 am

Understanding Cyber as a Reimagining of Trust Models

Arshid Bashir
Principal Consultant, Cyber Resilience
ITC Global Security

12:00 pm - 12:30 pm

Understanding and Combatting Cybercrime

Babita Sharma
Journalist & Presenter
BBC World News
Cal Leeming
Founder, CEO, Security Advisor
Oliver Gower
Deputy Director/Head
National Crime Agency (NCA)/National Cyber Crime Unit

1:10 pm - 1:30 pm

Agile Cyber Security: Insights from Digital and Gaming Industries

Babita Sharma
Journalist & Presenter
BBC World News
Giacomo Collini
Director of Information Security
King.com

2:05 pm - 2:25 pm

How Cyber Effects Front-Line Staff in Local Government

Babita Sharma
Journalist & Presenter
BBC World News
Sarah Pickup
Deputy Chief Executive
Local Government Association

3:00 pm - 3:30 pm

Developing the UK’s Cyber Skills for the Future

Babita Sharma
Journalist & Presenter
BBC World News
Oscar O’Connor
Chief Competition Assessor
Cyber Security Challenge UK