Agenda

 

8:00

Conference Registration Open

scf-brk1.jpg

Join us for arrival coffee, registration and visit our exhibition area for live demos and have your questions answered.


9:00

Opening of Secure Computing Forum 2019

scf-c-flanagan.jpg

Charlie Flanagan

Minister for Justice & Equality


9:10

MC - Welcome Address: A Look into the 2019 Cyber Security Landscape. 

David-and-Adrian.jpg

David Keating

Group Security Director, DataSolutions

Adrian Weckler

Technology Editor at Independent News & Media


9:20

Opening Keynote: Dawn of the Code War – The Rising Global Cyber Threat

John P. Carlin takes us to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies. Today, as economies go digital, from banking to manufacturing to transportation, the potential targets multiply.

John P. Carlin

Former Assistant Attorney General for the US Department of Justice’s National Security Division


9:50

Threat Hunting Like A Criminal.

Urban legend purports that humans only use 10% of their brains. Artificial Intelligence does not have this limitation but is restricted by the human ability to learn. What if we could overcome this constraint by providing a human fueled feedback loop to the A.I.

In cyber security, we’re like law enforcement constantly chasing new malware, metaphorically speaking, across the information highways of the internet, through the defenses of corporations & into classified locations storing sensitive data. Imagine that instead of pursuing malware, machines instantly learned from all the world’s human threat analysts, gathering an infinite intelligence to prevent cyber-crime & instead of the police car pursuing the bank robbers, we started looking for banks to rob & stood in waiting for the criminals!

e-doyle.jpg

Eddie Doyle

Global Security Strategist for Check Point Research


10:15

What Can We Learn From The Dark Net?

Jamie Bartlett will take you on a tour of the hidden 'dark web' revealing how criminals, hackers and journalists all benefit from encrypted technology. He will show some of the latest developments in how people's personal information is stolen, and how it is likely to evolve in the next 5 to 10 years.

SCF2019-Jamie-Barlett.jpg

Jamie Bartlett

Journalist and tech blogger for The Telegraph, author of “The Dark Net”


10:40

Panel Discussion - Rethinking Cyber Defence to Combat Complex Risks, Threats & Vulnerabilities

As organisations continue to digitise and transform, the attack landscape grows ever more complex. Cybercriminals are using increasingly sophisticated tactics, so it’s critical that information security professionals are equipped with the knowledge and tools to defend their organisation against digital threats. This panel session will discuss current threats and take a look at emerging threats on the horizon and how to defend against them.

Featuring Panelists:

David Kennefick, Product Architect, Edgescan

Francis O’Haire, Director of Technology, DataSolutions

Eddie Doyle, Global Security Strategist, Check Point Research

e-doyle.jpg
 

Moderated by Adrian Weckler

Technology Editor at Independent News & Media


10:55

Networking Break

Visit the exhibition hall, attend live demos and have your questions answered.


11:20

Unconsidered Cyber Realities for Business

Former UK Government Resilience and Cyber lead Paddy McGuinness will explore some too often unconsidered higher impact cyber risks which businesses should plan for and offer some practical responses.

Paddy McGuinness

CMG OBE, Recent Deputy National Security Adviser in the UK's Cabinet


11:50

Bolster Your Incident Response Plan Across Privacy & Security Teams

In the event of a breach, privacy and security professionals often approach incident response from two different outlooks. Whereas security teams are focused on threat vectors, privacy teams are concerned with personal data leaks and adhering to various global privacy laws. In this session, we’ll discuss how to build a harmonized response plan that addresses both the security team’s technical needs and privacy team’s regulatory requirements across the patchwork of US privacy laws, the GDPR and other global privacy regulations. We’ll also provide tips to help you map out a 72-hour personal data breach action plan and share practical advice to improve your privacy program

Conor-McCaffrey.jpg

Conor McCaffrey

Privacy Consultant for OneTrust


12:15

Fireside with Helen Dixon, Data Protection Commissioner for Ireland

Moderated by Adrian Weckler: Technology Editor, Independent News & Media

Topics to Be Discussed:

  • Tackling the power and reach of the big tech companies in our society.

  • How to protect people’s privacy and personal security in an era when everything is online.

  • Making sure that individuals know and exercise their rights.

  • Navigating international law and geopolitics when legislatures, courts and cultures clash.

  • Companies’ rights and responsibilities when it comes to data breaches and making mistakes.

SCF2019-Helen-Dixon.jpg

Helen Dixon

Data Protection Commissioner


12:35

Emerging Threats: When Tech Collides with the Real World

In 2018, for the first time ever, the majority of crime committed in western countries was committed using some form of digital communication or influence. We need to remove the word 'cyber' from the word 'cybercrime' and focus on the second part and accept that digital is just how crime happens in the age of automation. In this talk, Greg will look at the key emerging trends in the ways that criminals, hackers and state actors are impacting the world and how they have taken on some of the attributes of startups.

Greg Williams

Editor-in-Chief, Wired Magazine


13:05

Lunch

Visit the exhibition hall, attend live demos and have your questions answered.


14:15

The Changing Face of Cyber-Security

Europe's leading ethical hacker Jamie Woodruff will take you through the evolution of cyber-security, hacking and social engineering. He will explore the often-overlooked areas of weaknesses in many organisations, providing applicable insights into cyber security frameworks, human behavior and tech policy. Jamie will hold live on-stage demonstrations and this eye-opening session will also provide ideas for remedies that individuals and businesses can implement, in order to immediately ensure greater security and safety.

Jamie Woodruff

Europe’s Leading Ethical Hacker


14:45

Balancing Enterprise Security and Employee Experience

As enterprise security needs evolve, how do we maintain a balance between the enforcement of security policy in the enterprise and the desire to deliver a productive and engaging employee experience. In his talk, PJ will explore emerging techniques and strategies that are improving our ability to preserve this critical balance.

PJ Hough

Executive Vice President & Chief Product Officer for Citrix


15:15

Privacy 2.0, Privacy Beyond Compliance

Why leading organisations are adopting privacy as a Corporate Social Responsibility.

Data Protection requirements, such as those defined in GDPR, have been well absorbed into both cyber security and governance frameworks, however most organisations are implementing these requirements as the ‘objective’ rather than the ‘baseline’, with little emphasis on engaging with more sustainable values such as consumer trust. This presentation outlines why compliance is no longer enough, the role of digital ethics in making privacy more effective and outlines how a number of leading organisations are leveraging privacy as a key differentiator in their respective markets and industries.

Valerie Lyons

COO and Senior Consultant, BH Consulting


15:40

Closing Keynote Address: Introduction to Hacktivism

The reasons that people hack spans the range of human motivation - whether it be for profit, for revenge, for fun, or for political reasons. In this talk Mustafa will explore hacktivism - hacking for (political) activism - and he will discuss his experiences within LulzSec in 2011, the high-profile hacking group which made headlines for its hacks on Sony, Fox and the FBI. He will also share useful case studies.

Mustafa Al Bassam

Former Hacker and Co-founder of LulzSec & Security Advisor at Secure Trading


16:15

Q&A Session Followed By Closing Remarks

Conference Closes at 16:30

David Keating

Group Security Director, DataSolutions

Adrian Weckler

Technology Editor at Independent News & Media