– Robert McArdle
Forward Looking Threat Research Team
- – Dr J.R. Reagan
– Darren Argyle
Global Chief Information Security Officer
– Michael Wignall
National Technology Officer
– Troels Oerting
– Rik Ferguson
VP Security Research
Businesses are increasingly dealing with highly targeted and personallised cyberattacks; whether it’s spam delivering Ransomware or a one-off email to a CEO asking for a wire transfer, these attacks are tailored to succeed; and they do at an alarming rate.
So, at a time of increasing regulation, more risk from cybercriminals, organisations are still full steam ahead with their digital journey and investment into new technologies. The fabric of corporate IT is transforming dramatically with digital investments in web, mobile and social, as well as new shared responsibility models from Cloud providers. Are businesses and security teams really prepared and able to sturdy their organisation through an attack on their people, systems and data?
This panel discussion will look at the enterprise digital transformation and the risks that surface along this journey. Speakers will take questions on what drives the numbers game in terms of what causes the most losses and how to prevent them, what contributes to the success of security, and what is the cost of good security versus a poor one.
National Security Officer
Partner – Cyber Advisory
Deloitte AustraliaCloud and IoT is now in mainstream adoption phase, often being referred to as the fourth revolution. The presentation will share experiences from early adopters and focus on challenges that vendors will not share when selling cloud enablement services. The effort and areas of focus that are often overlooked when initiating and securing cloud capability within an organisation.
The session will commence with a snapshot of how the cloud security market has transformed and advanced over the past few years.
The session will then share the learnings from implementation of multiple cloud enablement services, more specifically the challenges from an information security domain. Walk through of experiences of what works and what does not work, learnings and pitfalls that organisations need to be aware of when investing and enabling cloud services.
The presentation will explain the typical lifecycle of a cloud ecosystem from contract sign to consumption and reporting. It will then discuss methods on how depending on the service being invoked distinct architectural and operational activities are required to enable success.
The presentation will end with a model on how to evaluate and govern cloud services within an organisation which will be more than an audit of the cloud service provider for contractual clauses.
Senior Sales Engineer
VP Sales Europe
Cohesive NetworksPerimeter-based security approaches have not evolved to meet the modern application-focused enterprise. The weaknesses of the perimeter-based approach are on display in the east/west attacks on Sony, Target, and Home Depot exploits where hackers gained access to the perimeter, then ransacked the internal networks with minimal resistance.
What can modern enterprises do? A “defense in depth” approach to security at the network layer.
Enterprises must strengthen existing core networking hardware and virtualization layer security with added application security.
In data centres, physical network isolation is not practical, and logical segmentation can be very difficult without using evolved networking approaches. As data centers became wholly virtualized and blur the line between data center and private cloud, we can finally add and control logical segmentation at the virtualization layer.
This “Application Segmentation” provides the most comprehensive security model available today.
You can apply application segmentation defense in depth using Cohesive Networks’ VNS3:turret. VNS3:turret creates a cryptographically unique micro-perimeter around each application topology. This presentation will examine how an defense in depth at the application layer can stop the next Sony attack.
– Ghaleb Zekri
NSX Senior Systems Engineer EMEA
– Conor Ward
Consulting Partner, Hogans Lovell, Chair of Legal Forum, Cloud Industry Forum (CIF)– Steven Wilson
Head of Cyber Crime Centre EC3
– Bob Flores
Cognitio (ex CTO, CIA)
– Timothy Wallach
Supervisory Special Agent – Cyber Task Force
– Charlie McMurdie
Senior Cyber Crime Advisor
– Raimund Genes
– Robert Carolina
Institute for Cyber Security Innovation Royal Holloway University of London
Often described as an ‘arms race’ the fight to overcome cybercrime is often a thankless task and like many preventative initiatives it’s only discussed when things go wrong. “911” for example, wouldn’t have happened had someone locked the door and no one who have had been acclaimed for stopping this disaster. In the online world of cybercrime syndicates, aggressive nation state hackers and disgruntled activists, when it does go wrong, everyone gets to hear about it.
How do we as cyber security custodians cut through the media onslaught to better understand the lay of the land, the risks we’re really facing and the global initiatives that are doing good. How do we shift our focus to better learn from security events and share intelligence amongst our community?
This panel discussion will address the current approaches from governments, law enforcement, industry and academia, and the micro and macro initiatives we can take to further develop the ‘good-guys’ capability in overthrowing the ‘bad-guys’.
– Geoff White
– Rik Ferguson
VP Security Research