Information Security and Risk Day 2
08:30 - 08:50 Registration & Coffee
08:50 - 09:00 Chair's Welcome
09:00 - 09:40 Keynote Panel: The Intersection of Privacy, Security and E-Discovery
09:40 - 10:20 Developing a Risk Based Approach to Cyber Security
- Cyber security as a key operational risk
- Overcoming the stigma of a technological knowledge deficiency
- Cyber risk management as an essential component of a robust risk management framework
- Key Industry trends
- Board engagement
- Impact on regulatory capital
- Cost benefits of cyber security risk management? Use of Insurance?
10:20 - 11:00 Reporting Requirements in Light of a Cyber Breach
This session will give examples of how companies have in the past communicated cyber breaches to regulators and to their customers, and how more changes in EU regulations on reporting requirements increase the business impact and reputational risk following a cyber-security incident.
11:00 - 11:30 Tech Demo & Networking Break
11:30 - 12:10 Cyber Fraud Threat Landscape- How Are Traditional Cyber Attacks Being Used to Perpetrate Fraud?
- Is it possible to predict patterns in cyber fraud?
- How should this be categorised from a risk perspective?
- How can better data protection mitigate financial fraud risk?
12:10 - 12:50 Using Threat Intelligence to Stay a Step Ahead
The combination of rapidly advancing technology and an ever-changing demographic, political and economic landscape, creates huge new challenges for cyber security professionals. Attackers leverage highly tailored malware, advanced persistent threats, massive DDoS attacks and a plethora of other tools to compromise organisations of all types on a daily basis. To overcome these challenges, cyber defenders must create innovative new models for protecting their organizations from increasingly advanced threats. Here we look at the various advancements in cyber intelligence and how this understanding can help you protect your systems and processes.
12:50 - 13:30 The Insider Threat – Culture Oversight and Internal Fraud Prevention
• How can you overcome the pitfalls of ethical decision making- the key signs of employee misconduct and how to respond
• How can you implement monitoring, enforcement and reviewing employees as an integral part of a quality management system?
13:30 - 14:30 Tech Demo & Networking Lunch
14:30 - 15:10 NATO and Cyber Defence: What Have we Learned Over the Last Ten Years?
This talk will look at the key lessons learned from NATO’s growing involvement in cyber issues over the last decade. We will examine how NATO sees the threat and what we have done to counter that threat, both in the defence of NATO‘s own networks and the increasing level of technical assistance that we are able today to provide to our 28 Allies. We will also review the existing gaps and profile where NATO is likely to go in the future as cyber increasingly becomes a domain in its own right for military operation activity.
15:10 - 15:50 Enterprise Risk Management – The Cyber Blackhole?
Here we look at the various implications of enterprise and BYOD, and how to mitigate that risk from a strategic perspective.
15:50 - 16:30 Tech Demo & Networking Break
16:30 - 17:10 Open Source Software - The New Frontier for Cyber Risk Assessment
• What guidelines should you be following to ensure these risks can be mitigated?
• How can you thoroughly evaluate open source software before they are considered for enterprise use?
• What effect does using OSS have on your insurance coverage?