Loading…
Attending this event?

Log in to bookmark your favorites and sync them to your phone or calendar.

Tuesday, October 29
 

08:45

09:00

Keynote Panel: The Current state of ICS Maturity and Awareness
  • How mature is cybersecurity in ICS? 
  • Are we articulating cyber risk appropriately?
  • Are we seeing a shift in C Level awareness? 
  • NIS- ramping up across Europe, how is this helping or hindering organisations, are positive impacts regional presently?
  • Are investments in cyberinfrastructure ramping up?
  • How are we collectively meeting the challenges of the aging workforce and terminology barriers?
  • Is security still seen as a hindrance? How can we move past this perception?

Speakers
avatar for Cavus Batki

Cavus Batki

Design Authority, EDF Nuclear New Build
Cavus is the Design Authority cyber security specialist for EDF Nuclear New Build, responsible for ensuring that the cyber security risks to OT systems are understood, managed and accepted. Cavus previously worked as a security consultant for BAE Systems. His experience includes OT... Read More →
avatar for Tahir Saleem

Tahir Saleem

Senior Specialist OT Security, DEWA
Extensive experience in the development, management and execution of cyber security strategy and assurance engagements within large organisations across several industry verticals: critical infrastructure (energy & water), mining, transport, banking & finance, hospitality and Government.ICS... Read More →
avatar for Stuart Aston

Stuart Aston

National Security Officer, Microsoft
Stuart has been with Microsoft in the UK since 1998 and is the National Security Officer for Microsoft in the UK. Prior to that he has worked as strategy consultant to a variety of UK Government customers, mostly within the defence arena and run a number of Government Programs with... Read More →
avatar for Richard Meal

Richard Meal

Chief Information Security Officer, Sellafield
A senior cyber and information security practitioner with over 20 years of experience in thefield, Richard is currently employed as Chief Information Security Officer at Europe’s largest nuclear facility at Sellafield, a role he has undertaken since December 2013. Richard’s areas... Read More →
avatar for Philip Tonkin

Philip Tonkin

Global Head of Cyber Operational Technology, National Grid
Philip has worked in the energy business for over 20 years, working in a wide range of disciplines.  From field engineering to senior leadership positions, he has always been passionate about solving the challenges of digitising the energy supply industry.   Using an understanding... Read More →
avatar for Nick Lloyd

Nick Lloyd

Deputy CISO, Maersk
Nick Lloyd joined Maersk in February 2019 as the Deputy Chief Information Security Officer, and Head of Cyber Security Plans & Engagement, and is accountable to the CISO for planning and engagement across all brands that form part of A P Moller-Maersk. Prior to joining Maersk, Nick... Read More →


Tuesday October 29, 2019 09:00 - 09:45
Copthorne Tara London Kensington

09:45

Responding to a Major Cyber Incident
  • How Maersk responded to mitigate damage and recover from the NotPetya attack
  • How has the attack changed our cybersecurity posture and shaped the ongoing strategy?
  • What lessons can be taken forward by the wider logistics sector to increase resilience?

Speakers
avatar for Nick Lloyd

Nick Lloyd

Deputy CISO, Maersk
Nick Lloyd joined Maersk in February 2019 as the Deputy Chief Information Security Officer, and Head of Cyber Security Plans & Engagement, and is accountable to the CISO for planning and engagement across all brands that form part of A P Moller-Maersk. Prior to joining Maersk, Nick... Read More →


Tuesday October 29, 2019 09:45 - 10:15
Copthorne Tara London Kensington

10:15

10:45

Panel: Cybersecurity Preparedness; Design and Architecture
  • How can we adopt a secure by design approach, given the challenges of new technology being introduced?
  • What tools can show us the entire network including the lower layers of ICS?
  • Is there a culture of "Leave well enough alone?" How can we overcome this?
  • Is enough attention being given to configuration control?
  • Are we patching regularly?
  • Are we getting better at locking down remote access to ICS environments?




Speakers
avatar for Thomas Murtagh

Thomas Murtagh

Technical Information Security Officer, Welsh Water
Thomas is currently part of Welsh Waters InfoSec team with a focus on enhancing and improving security for the Operational Technology area. Prior to his current role, he has held positions of Senior Systems Security Engineer at a defence company delivering tactical communications... Read More →
avatar for Dr Kimberly Tam

Dr Kimberly Tam

Research Fellow, University of Plymouth, UK
Dr Kimberly Tam is a research fellow at the University of Plymouth, UK. Bridging the gap between the university's maritime navigation department and cyber-security research groups, she has been researching maritime cyber-security for two years. During those two years she has published... Read More →
avatar for Mike Firstenberg

Mike Firstenberg

Director of Industrial Security, Waterfall Security
Mike Firstenberg is the Director of Industrial Security for Waterfall Security. Mike brings almost two decades of experience in Control System Security, specializing in Control System Cyber Security. With a proven track record as a hands-on engineer - researching, designing, and implementing... Read More →
avatar for Cavus Batki

Cavus Batki

Design Authority, EDF Nuclear New Build
Cavus is the Design Authority cyber security specialist for EDF Nuclear New Build, responsible for ensuring that the cyber security risks to OT systems are understood, managed and accepted. Cavus previously worked as a security consultant for BAE Systems. His experience includes OT... Read More →


Tuesday October 29, 2019 10:45 - 11:15
Copthorne Tara London Kensington

11:15

Implementing Security in Industry 4.0
  • Driving efficiency, trust and confidence with new connectivity
  • How do we facilitate this connectivity in a secure way?
  • The need for new technologies to drive business
  • Technology benefits and the necessity to drive risk decision making
  • Driving efficiencies through new connectivity; How do we do this in a secure way?
  • Establishing trust and confidence in new technologies to drive the business forward


Speakers
avatar for Philip Tonkin

Philip Tonkin

Global Head of Cyber Operational Technology, National Grid
Philip has worked in the energy business for over 20 years, working in a wide range of disciplines.  From field engineering to senior leadership positions, he has always been passionate about solving the challenges of digitising the energy supply industry.   Using an understanding... Read More →


Tuesday October 29, 2019 11:15 - 11:45
Copthorne Tara London Kensington

11:45

How to Implement Zoning, Security Monitoring and Honeypots for ICS
Speakers
avatar for Tahir Saleem

Tahir Saleem

Senior Specialist OT Security, DEWA
Extensive experience in the development, management and execution of cyber security strategy and assurance engagements within large organisations across several industry verticals: critical infrastructure (energy & water), mining, transport, banking & finance, hospitality and Government.ICS... Read More →


Tuesday October 29, 2019 11:45 - 12:15
Copthorne Tara London Kensington

12:30

USB Security - Myths vs. Reality
Much of the fiction surrounding cyber-attacks and espionage features hoodie-wearing teenage hackers fuelled by caffeinated sodas and pounding away at their keyboards. In reality, the most successful cyber-attacks target people and their behaviour rather than directly hacking of systems.
Why? Because it’s far easier and much more lucrative to exploit risky behaviours inside of a company than it is to hack past numerous firewalls and security systems from outside of a company, without arousing suspicion.
Recently, researchers from the Ben-Gurion University of the Negev in Israel have discovered 29 ways someone can insert malware into your computer or smartphone via a USB port.
In this presentation, we will be looking at some of the myths vs reality regarding USB security and what makes USBs such a successful attack vehicle.



Speakers
avatar for Dr Naz Khaleque

Dr Naz Khaleque

Senior Security Professional, Industrial Cybersecurity, Honeywell
Naz Khaleque is a senior security professional with 20+ years’ background in the security and defence Industry across the EMEA region. He has extensive knowledge of electronic, physical and cyber security solutions as applied to critical infrastructure protection.He is a committee... Read More →


Tuesday October 29, 2019 12:30 - 13:00
Copthorne Tara London Kensington

13:00

14:00

Panel: System Maintenance from a Security Aspect
  • How can we improve the Cyber- Safety case and increase focus on cyber security across historically safety driven business?
  • Do we patch?
  • Do we maintain certificates?
  • Building for Failure
More Panellists to be announced

Speakers
avatar for Syed Peer

Syed Peer

Information Technology Manager, Qatar Fertiliser Company (QAFCO)
IT Executive with extensive experience managing Software Development and Engineering Teams both in US Fortune 400 organizations and internationally. Speaker, writer and C-Suite Evangelist for Digital Transformation, Web Technologies, Big Data,  Mobile and Cyber Security. Professional... Read More →
avatar for Tim Canning

Tim Canning

Director, GTE Ltd
Tim is currently contracting to a number of  End-User and System Integrator Organisations, including several UK Upstream Operators and one of the largest upstream gas field Operators in the Middle East .  He is GISCP, CEH and FS-Eng. Certified, with a 30 year career in the Control... Read More →
avatar for Stuart Aston

Stuart Aston

National Security Officer, Microsoft
Stuart has been with Microsoft in the UK since 1998 and is the National Security Officer for Microsoft in the UK. Prior to that he has worked as strategy consultant to a variety of UK Government customers, mostly within the defence arena and run a number of Government Programs with... Read More →


Tuesday October 29, 2019 14:00 - 14:30
Copthorne Tara London Kensington

14:30

Intelligence Led Life Cycle
SOC Journey and Challenges
-Regulation
-Planning
-Tech challenges
-Intelligence Led Lifecycle, Attack Matrix and Threat Hunting
-Detection
-Response
-Recovery
-Counter Adversarial Perspective

Richard will further elaborate with a end of day Roundtable discussion

Speakers
avatar for Richard Meal

Richard Meal

Chief Information Security Officer, Sellafield
A senior cyber and information security practitioner with over 20 years of experience in thefield, Richard is currently employed as Chief Information Security Officer at Europe’s largest nuclear facility at Sellafield, a role he has undertaken since December 2013. Richard’s areas... Read More →


Tuesday October 29, 2019 14:30 - 15:00
Copthorne Tara London Kensington

15:00

15:30

Panel: Current State of Threat Detection
  • What stage of maturity has the threat detection market reached and how can we make wise investment decisions? 
  • Threat detection market lacks maturity, fragmentation 
  • Comparative evaluations are difficult 
  • Cost and investment versus risk in OT (OT Sensor market - should we establish ownership and accountability before deploying)
  • The capability of products, many built for IT when they need to focus on OT.
  • Are threat detection solutions taking a holistic approach to assessing risk?
    • Orchestration to facilitate the process 
    • High quality feeds
    • Non-Traditional IDS
    • Make it simple to see risk
Further considerations -
  • Can we define our requirements for threat detection?
  • Do we have an assured process that generates such a requirements specification?

Speakers
avatar for Dr Naz Khaleque

Dr Naz Khaleque

Senior Security Professional, Industrial Cybersecurity, Honeywell
Naz Khaleque is a senior security professional with 20+ years’ background in the security and defence Industry across the EMEA region. He has extensive knowledge of electronic, physical and cyber security solutions as applied to critical infrastructure protection.He is a committee... Read More →
avatar for Cavus Batki

Cavus Batki

Design Authority, EDF Nuclear New Build
Cavus is the Design Authority cyber security specialist for EDF Nuclear New Build, responsible for ensuring that the cyber security risks to OT systems are understood, managed and accepted. Cavus previously worked as a security consultant for BAE Systems. His experience includes OT... Read More →
avatar for Matthew Bancroft

Matthew Bancroft

OT Cyber Security EMEA, Forescout


Tuesday October 29, 2019 15:30 - 16:00
Copthorne Tara London Kensington

16:00

Securing IOT
Seuring IoT
  • What is Internet of Things and Industrial Internet of Things?
  • Security and privacy issues in IoT
    • What are the threats to IoT and its vulnerabilities?
      • Threats to owners, users and third parties
      • Vulnerabilities of devices and networks
  • How can we manage IoT security?
    • Physical and logical perspectives
  • Future challenges
  • Questions

Speakers
avatar for Geir Arild Engh-Hellesvik

Geir Arild Engh-Hellesvik

Chief Information Security Officer, VY Group
Geir Engh-Hellesvik is Chief Information Security Officer at Vy group, a Norwegian mobility groupproviding rail and passenger service on rail and road in the Nordic region. Vy is the largest provider ofrail and bus passenger transport in Norway and with significant operations in Sweden.Vy’s... Read More →


Tuesday October 29, 2019 16:00 - 16:30
Copthorne Tara London Kensington

16:30

Roundtable Sessions with DEWA, Sellafield and Vy Group
We will run three end of day Roundtables:
Sellafield Ltd will address the SOC journey and their challenges
DEWA will discuss "Organisational models for effective tactical and strategic ICS security management
Vy Group will elaborate further on "Edge computing (fog and mist concepts)"

Speakers
avatar for Tahir Saleem

Tahir Saleem

Senior Specialist OT Security, DEWA
Extensive experience in the development, management and execution of cyber security strategy and assurance engagements within large organisations across several industry verticals: critical infrastructure (energy & water), mining, transport, banking & finance, hospitality and Government.ICS... Read More →
avatar for Richard Meal

Richard Meal

Chief Information Security Officer, Sellafield
A senior cyber and information security practitioner with over 20 years of experience in thefield, Richard is currently employed as Chief Information Security Officer at Europe’s largest nuclear facility at Sellafield, a role he has undertaken since December 2013. Richard’s areas... Read More →
avatar for Geir Arild Engh-Hellesvik

Geir Arild Engh-Hellesvik

Chief Information Security Officer, VY Group
Geir Engh-Hellesvik is Chief Information Security Officer at Vy group, a Norwegian mobility groupproviding rail and passenger service on rail and road in the Nordic region. Vy is the largest provider ofrail and bus passenger transport in Norway and with significant operations in Sweden.Vy’s... Read More →


Tuesday October 29, 2019 16:30 - 17:30
Copthorne Tara London Kensington

18:15

Invitation Only Dinner sponsored by Nozomi Networks
Interested parties contact marketing@cybersenate.com

Tuesday October 29, 2019 18:15 - 20:45
 
Wednesday, October 30
 

08:45

09:00

Industry 4.0 Adoption as a Key Business Driver
More information to follow

Speakers
avatar for Chris Blask

Chris Blask

Global Director Industrial and IoT Security, Unisys
Mr. Blask’s career spans the breadth of the cybersecurity spectrum for more than 25 years. He invented one of the first commercial firewall products, built a multi-billion dollar firewall business at Cisco System, co-founded an early SIEM vendor, and authored the first book on SIEM... Read More →


Wednesday October 30, 2019 09:00 - 09:30
Copthorne Tara London Kensington

09:30

Cyber Security in Factory of the Future & Industry 4.0
The digital transformation of industrial manufacturing environments introduces increased connectivity, IoT devices, and data-driven automation, however, this transformation also requires increased considerations for cybersecurity.  In this talk, Kevin will present security considerations, challenges, and innovations required to protect the factory of the future.

Speakers
avatar for Dr Kevin Jones

Dr Kevin Jones

Acting Global CISO, Airbus
Dr Kevin Jones is Acting Global CISO at Airbus, leading a global network of; teams, projects and collaborations including; design architecture, research & innovation, state of the art solutions development, and technology scouting for cyber security across; IT, ICS and Product security... Read More →


Wednesday October 30, 2019 09:30 - 10:00
Copthorne Tara London Kensington

10:30

11:00

ICS Operational Rules
  • Why ICS Important for SUEZ
  • History of ICS Attacks into the Middle East
  • Cyber-attacks and Critical infrastructure breakdown Risk
  • 10 Operational Rules (slide on each rule)
  • Risks & Challenge


Speakers
avatar for Malek Abutayeh

Malek Abutayeh

Middle East IT/OT Manager, SUEZ Middle East LLC
SUEZ Middle East IT/OT Manager, 15+ years’ experience in IT operations and security covering both IT & OT. Focusing on developing and guiding the implementation of the company's Industrial Control Systems (ICS) security architecture, ensuring compliance with SUEZ cyber security... Read More →


Wednesday October 30, 2019 11:00 - 11:30
Copthorne Tara London Kensington

11:30

Panel: Asset Inventory - Determining our critical Assets and the essential functions of those Critical Assets
  • How effectively are we tracking our assets?
  • What can we do with this? 
  • Are we getting any better at identifying cyber assets associated with a critical asset
    Where we are in relation to Inventory and Control of Hardware Assets 
  • Where we are in relation to Inventory and Control of Software Assets 
  • Cloud Asset Management
  • End-User Mobile Device Management
  • Why ITAM is Crucial for Effective Cybersecurity

Speakers
avatar for Mike Firstenberg

Mike Firstenberg

Director of Industrial Security, Waterfall Security
Mike Firstenberg is the Director of Industrial Security for Waterfall Security. Mike brings almost two decades of experience in Control System Security, specializing in Control System Cyber Security. With a proven track record as a hands-on engineer - researching, designing, and implementing... Read More →
avatar for Malek Abutayeh

Malek Abutayeh

Middle East IT/OT Manager, SUEZ Middle East LLC
SUEZ Middle East IT/OT Manager, 15+ years’ experience in IT operations and security covering both IT & OT. Focusing on developing and guiding the implementation of the company's Industrial Control Systems (ICS) security architecture, ensuring compliance with SUEZ cyber security... Read More →
avatar for Dr Kevin Jones

Dr Kevin Jones

Acting Global CISO, Airbus
Dr Kevin Jones is Acting Global CISO at Airbus, leading a global network of; teams, projects and collaborations including; design architecture, research & innovation, state of the art solutions development, and technology scouting for cyber security across; IT, ICS and Product security... Read More →
avatar for Tim Canning

Tim Canning

Director, GTE Ltd
Tim is currently contracting to a number of  End-User and System Integrator Organisations, including several UK Upstream Operators and one of the largest upstream gas field Operators in the Middle East .  He is GISCP, CEH and FS-Eng. Certified, with a 30 year career in the Control... Read More →


Wednesday October 30, 2019 11:30 - 12:00
Copthorne Tara London Kensington

12:00

Panel: Supply Chain Cyber Security: Do we understand the risk?
  • What resources are required to for us to maintain a clear picture of our supply chain?
  • Do we know what needs to be protected and why? How do we protect these assets?
  • Do we know the value of the information and assets our suppliers hold?
  • Do we have an understanding of who our suppliers are and how do we establish confidence in their cybersecurity maturity levels?
  • Are we contracting appropriately to ensure third parties are secure and that their contractors are also secure? How can we best implement these measures?
  • Are we getting any better at communicating our security needs?
  • What security measures and mitigations are proportionate, effective and responsive?

Speakers
avatar for Thomas Murtagh

Thomas Murtagh

Technical Information Security Officer, Welsh Water
Thomas is currently part of Welsh Waters InfoSec team with a focus on enhancing and improving security for the Operational Technology area. Prior to his current role, he has held positions of Senior Systems Security Engineer at a defence company delivering tactical communications... Read More →
avatar for Andre Ristaino

Andre Ristaino

Managing Director, Automation Standards Compliance Institute
Andre Ristaino is managing director of the ISA Automation Standards Compliance Institute (ASCI) based in Research Triangle Park, N.C. He provides staff leadership for ISA’s conformance certification programs, including the ISASecure IACS certification program managed under the ISCI... Read More →
avatar for Dr Naz Khaleque

Dr Naz Khaleque

Senior Security Professional, Industrial Cybersecurity, Honeywell
Naz Khaleque is a senior security professional with 20+ years’ background in the security and defence Industry across the EMEA region. He has extensive knowledge of electronic, physical and cyber security solutions as applied to critical infrastructure protection.He is a committee... Read More →


Wednesday October 30, 2019 12:00 - 12:30
Copthorne Tara London Kensington

12:30

Panel: Cybersecurity and Safety -Evolving Cyber Risk to Safety Critical Systems
Understanding and Mitigating dependencies between cybersecurity vulnerabilities and system safety

  • Traditional methods to assess the safety of critical infrastructure are insufficient in relation to understanding system failures in complex interconnected systems
  • Implications of increased connectivity
  • Managing complexity of cyber-physical systems
  • Developing dedicated safety and security analysis techniques
  • Identification and mitigation strategies
  • What physical process can be used to mitigate cyber-attacks?
  • Can control algorithms mitigate safety limitations of the physical processes or devices?
  • Evaluation of system design, ensuring safety requirements are identified and addressed.
  • How do we integrate cyber security and safety into a risk management methodology?
  • How do we integrate cyber security and safety functions effectively?


Speakers
avatar for Syed Peer

Syed Peer

Information Technology Manager, Qatar Fertiliser Company (QAFCO)
IT Executive with extensive experience managing Software Development and Engineering Teams both in US Fortune 400 organizations and internationally. Speaker, writer and C-Suite Evangelist for Digital Transformation, Web Technologies, Big Data,  Mobile and Cyber Security. Professional... Read More →
avatar for Nigel Stanley

Nigel Stanley

Chief Technology Officer - Global OT and Industrial Cyber Security CoE, TÜV Rheinland Group
I am Chief Technology Officer for the TÜV Rheinland Global OT Cyber Security Center of Excellence, part of the $2bn technical services company that operates across multiple industrial and operational technology sectors including oil, gas, nuclear, transportation and autonomous systems.I... Read More →
avatar for Dr Kimberly Tam

Dr Kimberly Tam

Research Fellow, University of Plymouth, UK
Dr Kimberly Tam is a research fellow at the University of Plymouth, UK. Bridging the gap between the university's maritime navigation department and cyber-security research groups, she has been researching maritime cyber-security for two years. During those two years she has published... Read More →


Wednesday October 30, 2019 12:30 - 13:00
Copthorne Tara London Kensington

13:00

14:00

How to Secure your Project during a Build -EPC Considerations
Data Breaches
No surprises, please!
Vulnerability management
Cybersecurity from a maintenance perspective



Speakers
avatar for Lyzia Iterson

Lyzia Iterson

Information Security Leader, Fluor Corporation
Lyzia is a Strategic Business Consultant with extensive management experience in transition, migration, integration, turnaround project management and leading technology teams within large international organizations. Due to his highly developed empathic and analytical skills, he... Read More →


Wednesday October 30, 2019 14:00 - 14:30
Copthorne Tara London Kensington

14:30

Encroachment of Law into the Field of Cyber Security
  • EU Data Protection Regulation where did it start and where did it lead us
  • Similarities to other new compliance requirements aiming at critical infrastructures   
  • “Spreading” of internal compliance specifications and effects on suppliers
  • NIS implementation, effects

Speakers
avatar for Dr Felix Greve

Dr Felix Greve

Chief Information Security Officer, Hamburg Sud
Felix Greve is a German lawyer primarily specialised on the intersection of IT and law. Felix has assumed the position of Chief Information Security Officer at the German shipping company Hamburg Südamerikanische Dampfschifffahrts-Gesellschaft A/S & Co KG (“Hamburg Süd”) in... Read More →


Wednesday October 30, 2019 14:30 - 15:00
Copthorne Tara London Kensington

15:00

Networking Coffee
Wednesday October 30, 2019 15:00 - 15:30
Copthorne Tara London Kensington

15:30

Panel: NIS Implementation and Compliance - The Journey so far
Is NIS Directive positive or not?
An examination and discussion between industry sectors and subject matter experts. We will dive deeper into questions such as; 
What lessons have we learned?
Setting out objectives
How can they be achieved?
What are our interpretations and what concrete examples of implementation are we seeing?
How can we define "Readiness" for our organisation, we operate across the EU and each member state has its own interpretation of compliance?
How will this impact my business?

Speakers
avatar for Kevin Borley

Kevin Borley

Senior Technology Practitioner, KJB-ASSOCIATES LTD
Significant C Level experience and able to work 'hands on’ across organisations of all sizes and at a technical level. Kevin’s research and advisory work supports stakeholders looking to embrace change, as well to assist incumbent CTO’s, CIO’s and CISO's. Kevin has been at... Read More →
avatar for Dr Felix Greve

Dr Felix Greve

Chief Information Security Officer, Hamburg Sud
Felix Greve is a German lawyer primarily specialised on the intersection of IT and law. Felix has assumed the position of Chief Information Security Officer at the German shipping company Hamburg Südamerikanische Dampfschifffahrts-Gesellschaft A/S & Co KG (“Hamburg Süd”) in... Read More →
avatar for Craig Dunn

Craig Dunn

Head of Cyber Services, Hiscox
Craig is the Head of Cyber Services at Hiscox, an insurance company providing cyber insurance to thousands of companies in Europe and the United States. In his role Craig works to provide Hiscox’s cyber insureds with effective risk management solutions to help them better manage... Read More →
avatar for Nigel Stanley

Nigel Stanley

Chief Technology Officer - Global OT and Industrial Cyber Security CoE, TÜV Rheinland Group
I am Chief Technology Officer for the TÜV Rheinland Global OT Cyber Security Center of Excellence, part of the $2bn technical services company that operates across multiple industrial and operational technology sectors including oil, gas, nuclear, transportation and autonomous systems.I... Read More →


Wednesday October 30, 2019 15:30 - 16:00
Copthorne Tara London Kensington

16:00

Q&A with all participants: Information Sharing - How can we improve trust and motivation to cooperate?
 • Does your organisation, and the industry, have reliable central points for better information integration?
• Are we receiving usable threat information?
• Has NIS facilitated investment and motivation in cybersecurity procedures? 
• How can we improve trust and motivation to cooperate? Examples
• Does the private sector understand how the lack of information sharing is directly related to national security?


Wednesday October 30, 2019 16:00 - 16:30
Copthorne Tara London Kensington
 

Twitter Feed