Attending this event?

Log in to bookmark your favorites and sync them to your phone or calendar.

Presentation [clear filter]
Tuesday, October 29


Responding to a Major Cyber Incident
  • How Maersk responded to mitigate damage and recover from the NotPetya attack
  • How has the attack changed our cybersecurity posture and shaped the ongoing strategy?
  • What lessons can be taken forward by the wider logistics sector to increase resilience?

avatar for Nick Lloyd

Nick Lloyd

Deputy CISO, Maersk
Nick Lloyd joined Maersk in February 2019 as the Deputy Chief Information Security Officer, and Head of Cyber Security Plans & Engagement, and is accountable to the CISO for planning and engagement across all brands that form part of A P Moller-Maersk. Prior to joining Maersk, Nick... Read More →

Tuesday October 29, 2019 09:45 - 10:15
Copthorne Tara London Kensington


Implementing Security in Industry 4.0
  • Driving efficiency, trust and confidence with new connectivity
  • How do we facilitate this connectivity in a secure way?
  • The need for new technologies to drive business
  • Technology benefits and the necessity to drive risk decision making
  • Driving efficiencies through new connectivity; How do we do this in a secure way?
  • Establishing trust and confidence in new technologies to drive the business forward

avatar for Philip Tonkin

Philip Tonkin

Global Head of Cyber Operational Technology, National Grid
Philip has worked in the energy business for over 20 years, working in a wide range of disciplines.  From field engineering to senior leadership positions, he has always been passionate about solving the challenges of digitising the energy supply industry.   Using an understanding... Read More →

Tuesday October 29, 2019 11:15 - 11:45
Copthorne Tara London Kensington


USB Security - Myths vs. Reality
Much of the fiction surrounding cyber-attacks and espionage features hoodie-wearing teenage hackers fuelled by caffeinated sodas and pounding away at their keyboards. In reality, the most successful cyber-attacks target people and their behaviour rather than directly hacking of systems.
Why? Because it’s far easier and much more lucrative to exploit risky behaviours inside of a company than it is to hack past numerous firewalls and security systems from outside of a company, without arousing suspicion.
Recently, researchers from the Ben-Gurion University of the Negev in Israel have discovered 29 ways someone can insert malware into your computer or smartphone via a USB port.
In this presentation, we will be looking at some of the myths vs reality regarding USB security and what makes USBs such a successful attack vehicle.

avatar for Dr Naz Khaleque

Dr Naz Khaleque

Senior Security Professional, Industrial Cybersecurity, Honeywell
Naz Khaleque is a senior security professional with 20+ years’ background in the security and defence Industry across the EMEA region. He has extensive knowledge of electronic, physical and cyber security solutions as applied to critical infrastructure protection.He is a committee... Read More →

Tuesday October 29, 2019 13:45 - 14:15
Copthorne Tara London Kensington


Intelligence Led Life Cycle
SOC Journey and Challenges
-Tech challenges
-Intelligence-Led Lifecycle, Attack Matrix and Threat Hunting
-Counter Adversarial Perspective

avatar for Richard Meal

Richard Meal

Chief Information Security Officer, Sellafield
A senior cyber and information security practitioner with over 20 years of experience in thefield, Richard is currently employed as Chief Information Security Officer at Europe’s largest nuclear facility at Sellafield, a role he has undertaken since December 2013. Richard’s areas... Read More →

Tuesday October 29, 2019 15:45 - 16:15
Copthorne Tara London Kensington


Securing IOT
Securing IoT
  • What is Internet of Things and Industrial Internet of Things?
  • Security and privacy issues in IoT
    • What are the threats to IoT and its vulnerabilities?
      • Threats to owners, users and third parties
      • Vulnerabilities of devices and networks
  • How can we manage IoT security?
    • Physical and logical perspectives
  • Future challenges
  • Questions

avatar for Geir Arild Engh-Hellesvik

Geir Arild Engh-Hellesvik

Chief Information Security Officer, VY Group
Geir Engh-Hellesvik is Chief Information Security Officer at Vy group, a Norwegian mobility groupproviding rail and passenger service on rail and road in the Nordic region. Vy is the largest provider ofrail and bus passenger transport in Norway and with significant operations in Sweden.Vy’s... Read More →

Tuesday October 29, 2019 16:45 - 17:15
Copthorne Tara London Kensington
Wednesday, October 30


Industry 4.0 Adoption as a Key Business Driver
More information to follow

avatar for Chris Blask

Chris Blask

Global Director Industrial and IoT Security, Unisys
Mr. Blask’s career spans the breadth of the cybersecurity spectrum for more than 25 years. He invented one of the first commercial firewall products, built a multi-billion dollar firewall business at Cisco System, co-founded an early SIEM vendor, and authored the first book on SIEM... Read More →

Wednesday October 30, 2019 09:00 - 09:30
Copthorne Tara London Kensington


Cyber Security in Factory of the Future & Industry 4.0
The digital transformation of industrial manufacturing environments introduces increased connectivity, IoT devices, and data-driven automation, however, this transformation also requires increased considerations for cybersecurity.  In this talk, Kevin will present security considerations, challenges, and innovations required to protect the factory of the future.

avatar for Dr Kevin Jones

Dr Kevin Jones

Acting Global CISO, Airbus
Dr Kevin Jones is Acting Global CISO at Airbus, leading a global network of; teams, projects and collaborations including; design architecture, research & innovation, state of the art solutions development, and technology scouting for cyber security across; IT, ICS and Product security... Read More →

Wednesday October 30, 2019 09:30 - 10:00
Copthorne Tara London Kensington


How to Secure your Project during a Build -EPC Considerations
Data Breaches
No surprises, please!
Vulnerability management
Cybersecurity from a maintenance perspective

avatar for Lyzia Iterson

Lyzia Iterson

Information Security Leader, Fluor Corporation
Lyzia is a Strategic Business Consultant with extensive management experience in transition, migration, integration, turnaround project management and leading technology teams within large international organizations. Due to his highly developed empathic and analytical skills, he... Read More →

Wednesday October 30, 2019 14:00 - 14:30
Copthorne Tara London Kensington

Twitter Feed