|9.15 - 9.45||The Geopolitical Aspects of Cyber Warfare|
|9.50 - 10.10|
Economist, broadcaster, and best selling author
Recognised as the most influential economist in the UK and Ireland, David will be one of the keynote speakers as this years CTS2017.
|The Brexit Opportunity with Cyber|
|10.15 - 10.35|
Director of the Centre for the Analysis of Social Media at the think-tank Demos
Jamie Bartlett is the Director of the Centre for the Analysis of Social Media at the think-tank Demos, where he specialises in online social movements and the impact of technology on society. He is also author of the best selling book The Dark Net and a regular commentator on national and international media outlets.
Demos is a think tank based in the United Kingdom with a cross-party political viewpoint. It was founded in 1993 and specialises in social policy, developing evidence-based solutions in a range of areas - from education and skills to health and housing.
|The Future of the Dark Web|
|10.40 - 11.00|
Head of European Cybercrime Centre (EC3) EUROPOL
Steven originates from Ayrshire, Scotland. He was a Police Officer in Scotland from 1985-2015.
During this time, he served with Strathclyde Police, Scottish Crime and Drug Enforcement Agency,
Her Majesty’s Inspectorate of Constabulary and, since 2013, with the reorganisation of policing in
Scotland into a national force, Police Scotland.
Headquartered in The Hague, the Netherlands, we assist the 28 EU Member States in their fight against serious international crime and terrorism. We also work with many non-EU partner states and international organisations.
But new dangers are also growing, such as online radicalisation and trafficking in human beings. The networks behind the crimes in each of these areas are quick to seize new opportunities, and they are resilient in the face of traditional law enforcement measures.
|Europol Tackling Cybercrime|
|11.05 - 11.25|
Co-founder of the CoderDojo
Australian entrepreneur, venture capital investor, diplomat, author and speaker with a distinguished record in the areas of business, development and community activism, Bill is co-founder of the CoderDojo movement, a free global network formed to assist young people to learn how to computer program and Founder of Weforest, a global movement dedicated to planting trees and which now has seen €14.5 million planted around the world. He is a general partner with SOSV a $3.00 international accelerator venture capital fund and runs a life sciences Accelerator Program, Rebelbio, in Cork, focusing on entrepreneurs building technologies in or around the field of living things.
CoderDojo is a global volunteer-led community of free programming clubs for young people between 7 and 17. The movement is a grassroots organisation with individual clubs (called 'Dojos') acting independently. A charity called the CoderDojo Foundation operates out of Dublin and supports the various clubs by providing a central website and some other support services. Supporters of CoderDojo believe it is part of the solution to addressing the global shortage of programmers by exposing young people to ICT at a young age. The movement has seen significant growth since its founding. The CoderDojo Foundation estimates 1,250 Dojos spread across 69 countries, with a growth rate of several new Dojos every week.
|Inspiring The Future|
|11.30 - 11.50|
President of Secure Mentem, author of Advanced Persistent Security
|Spies Among Us|
|11.55 - 12.15||Can You Transfer Cyber Risk?|
|12.20 - 12.40|
Cyber Strategist at NoWhereToHide.org
For more than thirty years, Chuck Georgo has served as a public safety strategist, business analyst, systems engineer, and project manager supporting national and homeland security missions of federal, state, local, and tribal government agencies, and corporate security and intellectual property protection objectives of private sector organizations.
NOWHERETOHIDE.ORG helps government agencies and private sector organizations to better achieve our their public safety, homeland security, and national security objectives.
|Applying Privacy by Design as a Strategy to Reduce Your Attack Surface|
|12.45 - 13.05|
We Fight Fraud
Tony Sales is probably the only man in the world to have ever worked at both the summit of organisedcrime and the pinnacle of retail and banking fraud and loss prevention. His cross-over from elite criminal to top level consultant, trusted by the inner sanctum of banking, retail and insurance businesses with their most sensitive information, has been remarkable...
We Fight Fraud
We Fight Fraud is a new approach to combatting the ever rising epidemic of UK frauds. We bring together leading corporate consultancies in a super tag team fight to the end. It’s Fraudsters, Cyber Crime, Social Engineering, Public outreach and leading consultants wrapped up in the cinematographic works of it’s own film production.
|How I Stole £30m|
|13.10 - 14.10||Lunch||Lunch|
|14.15 - 14.35||Panel Discussion||Is Ireland Ready for EU Cyber Legislation?|
|14.40 - 15.00||Panel Discussion||Cyber Skills Gap - What About Women in Cyber Security?|
|15.05 - 15.25||Panel Discussion||Is Cyber Security More Important Than Physical Security?|
|15.30 - 15.50||Panel Discussion||Fake News - How Do You Handle The Challenge of Perception is Reality?|
|15.55 - 16.15||Panel Discussion||Todays Economy is Interconnected - How Do We Establish Cyber Trust and Assurance?|
|16.20 - 16.40||Panel Discussion||Do Directors of Irish companies understand their Cyber responsibilities?|
|16.45 - 17.00||Paul C Dwyer||Closing Speech - Why Bono would make a great CISO!|
Understanding the requirements of the new data privacy regulation and developing a strategy.
Breach notification, substantial fines based on global turnover.
New responsibilities for processors and massive potential exposure to litigation.
Understanding your responsibilities, the business impact, how to control the risk within your vendor supply chain and how to ensure you are operating legally from May 2018.
Understanding the benefits and aspects of cover.
Cyber attacks, insider threats, the cost of breaches and how to recover.
The various kinds of cyber related policies available and the various actors involved when an attack occurs, how to deal and insure against cyber risks in a holistic way.
Breaches are inevitable but would you know if you are already breached? Updates in regulatory compliance mandate the implementation of sufficient detective and responsive controls. What does appropriate incident response look like? How do you test? How do you leverage expertise? How do you integrate with existing capabilities including cyber threat intelligence.
Thousands of open cyber security roles, how do you develop in house talent and how do you recruit. Understanding the specialist aspects to cyber team building and the related challenges to closing the cyber skills gap.
Cyber Intelligence is now an essential part of every security teams arsenal. How do you utilise and develop upon implementing intelligence. Learn how to adopt the latest innovations in machine learning to protect your organisation.
Are you an operator of essential services in support of the national digital infrastructure? Mandatory breach notification, fines, reputational damage, intelligence sharing and a boost to the economy are all potential aspects.
When the bad guys are unable to defeat your technical defences, their last approach often involves your last line of defence – the human. Your staff are the most valuable and efficient weapon against cyber threat actors. How do you go beyond compliance training and education. How to you invoke loyalty and weaponise your staff to deal with the 24/7 threat they are exposed to from cyber malefactors.
Part of many cyber attacks includes misinformation and distraction techniques. Consequential reputational damage and collateral damage for cyber attacks on a vendor supply chain are PR challenges. How do you leverage the power of effective PR and integrate the capabilities in order to be prepared for and be able to deal with the fall out of a cyber attack.
Physical access to a premises, people or equipment is a component of many cyber attacks. Social engineering techniques are often employed as part of various attacks. How to you ensure your investment in physical security is adequate and integrated with your overall cyber security strategy so that their capabilities can be leveraged.
Business continuity, disaster recovery and IT safeguards are all components of cyber resilience. How do you strategically aligned and measure these efforts within an organisation and leverage existing investment and resources. International standards, regulatory mandated levels of maturity and developing a cyber resilience strategy. Reduce the likelihood of an incident and increase the ability to detect and recover are key principles.
What is mandated for Directors in relation to cyber risk and governance. Understanding your requirements in relation to due diligence. Fines, litigation and other exposure related to cyber risk will be outlined and how a board can prepare themselves and their organisation to deal with the legal and compliance aspects.
“Bake In – Don’t Bolt On” is often the mantra in relation to the security aspects of the development lifecycle. How do you go about developing secure code that is compliant with regulations in respect to privacy and security. How do you test and gain assurance from third party developers. Strategically dealing with secure application development and understanding the challenges.
Responsibility in relation to security and privacy lies with your organisation when they contract to an OSP Outsourced Service Provider. Increased controls within regulations magnifies the consequences of any failings in this area. What does an OSP that takes your security and privacy look like? What kind if controls and SLA’s are appropriate. With cloud based services what should understand.
The CISO (Chief Information Security Officer) in an ideal world should report to the CEO and is the ultimate business protection offer. They have responsibility for protecting your organisation in relation to risk, security and privacy. What is the role of a CISO? How should they integrate and align strategically with the business. How can they develop a cyber strategy (CISO Framework) for your organisation which includes and leverages all stakeholders.
Understanding the Dark Web and the risk aspects it brings in relation to cyber. How to protect your organisation and monitor the deepest recesses of the underworld communities.
A chain is only as strong as its weakest link. Recent changes in the cyber related legislation has put a renewed emphasis on the importance of understanding and gaining assurance from all third parties you deal with and reply on. How can you do that? What are the tools and techniques you can utilise in order to evaluate and secure your supply chain.
Miriam O'Callaghan will chair several strategic cyber debates in the Mahony Hall to over 1,000 delegates with all the acumen broadcast to over 100 countries around the world. These debates will discuss the hottest topics related to cyber security with expert panellists, showcasing their expertise in each subject matter. Some of the topics include.
"Financial markets can expect further criminal examples of attempts to spook the market with false rumours spread through social media. Remember when the Syrian Electronic Army hacked a Twitter feed and reported explosions at the White House that injured US President Obama. Again this is old scams in a new way, criminals could “short” stock trades in anticipation of such rumours. In that case, the Dow lost more than 140 points in 6 minutes, with the S&P 500 alone losing market cap of $136.5 billion. Now imagine what a hacked or unhacked tweet from Donald Trump could do!"
Paul C Dwyer - President of the ICTTF
New European Cyber legislation includes the Network Information Security (NIS) Directive and the GDPR General Data Protection Regulation. These regulations include mandatory breach notification and potential fines of up to €20m or 4% of Global turnover.
Is Ireland ready?
The GDPR, NIS Directive and all EU cyber related legislation still applies to the UK. What is the reality of BREXIT in relation to Cyber? Law enforcement intelligence exchange, arrest warrants. What about data flows and regulatory concerns over privacy and compliance. The opportunities that exist for Ireland and other today to help organisations deal with these challenges and more will be discussed.
Following on from reports of hacks on the recent US elections and in the context that the FBI have referred to Trump as an "unwitting agent" of Putin. We need to explore the geopolitical nature of cyber attacks. We explore the evidence of state sponsored attacks and the “conscious collusion” between organised cyber criminals and nations
Grainia Long CEO of ISPCC and recipient of the ICTTF Cyber Safety Award 2016 will be amongst those involved in the debate on how to protect our children online. Cyber Safety from all aspects relating to all ages of children will be discussed. The objective of the debate to discover what we, the industry and government can do to help with this challenge.