Agenda CTS2018

CTS2018 Agenda

Full Agendas for All Streams Will Be Published Closer to the Event Date.

Doors Open: 07:00

Breakfast For VIP Ticket Holders from: 07:30

Opening Ceremony: 08:30

Event Close: 17:30

Post Event Networking Reception: 18:00 – 20:00
(For VIP Ticket Holders, Speakers and Sponsors)

TOPICS & FIELDS


Enterprise Security

Security, risk, privacy and compliance are all aspects for the CISO of today. We will look how the innovative CISO’s meets the challenge. Learn from world leading “Business Protection Officers”.

Legal & Compliance

Maintaining a cyber security program compliant with all legal and regulatory aspects is an imperative. The NIS Directive, GDPR, PSD II and many more “Compliance Challenges” will be discussed.

Cyber Threats

We will be discussing and showing you the details of all the main cyber threats of 2018 and forecasting what to look out for in 2019 and beyond.

Web Security

Web based vulnerabilities continue to be a main vector of attack. We will discuss best practices, tools and techniques that can be employed to protect your organisation.

Mobile & Apps

Leveraging the opportunities from embracing mobile and apps brings with it a specific set of security and compliance challenges.

Security Operations

Threat intelligence, detection and response. Develop SOC capabilities in house, out source as a managed service or hybrid model.

Security Tools

Learn about the latest innovations and tools that can help you. Machine learning, AI and Open Source can help you with the cyber challenge.

IoT

The Internet of Things, especially the Industrial IoT (SCADA) has a unique set of challenges that need to be addressed.

Physical Security

Physical security is the cousin of cyber security. A converged security model is essential to protect an enterprise.

Cyber Insurance

Transferring risk is an option for all business risks. We explore the pros and cons of cyber insurance offerings.

Network Security

Securing the perimeter is a baseline for organisations, learn how to adopt the most appropriate strategy and tools.

Cyber Education

Users are the last line of defence, learn how to create a cyber security culture with measurable effective tools to support your program.

Cloud Security

Transitioning to the cloud, dealing with security, privacy and GRC issues. Learn from real life case studies and examples.

Dark Web

Understanding the dark web, crypto currencies and the underground market places. How your business may be effected and what you should know.

FinTech and RegTech

Learn about and how to embrace the most innovative FinTech and RegTech solutions to deal with the cyber challenge.

Cyber Espionage

The world of industrial espionage has embraced cyber tools and techniques. Learn how to protect executives, your staff and your intellectual property from the spies.

KEYNOTE SPEAKERS


John McAfee
John McAfee
I am a simple, free, soldier. Founder McAfee Anti Virus
John McAfee
I am a simple, free, soldier. Founder McAfee Anti Virus
"I am a simple, free, soldier." John McAfee According to Wikipedia: John David McAfee (born September 18, 1945) is a British-American computer programmer and businessman. He
Edward Snowden
Edward Snowden
PRESIDENT OF FREEDOM OF THE PRESS FOUNDATION
Edward Snowden
PRESIDENT OF FREEDOM OF THE PRESS FOUNDATION
Edward Joseph Snowden is an American computer professional, former Central Intelligence Agency (CIA) employee, and former contractor for the United States government who copied and
Paul C Dwyer
Paul C Dwyer
President of the ICTTF, CEO of Cyber Risk International
Paul C Dwyer
President of the ICTTF, CEO of Cyber Risk International
Paul C Dwyer is an Internationally recognised information security expert with over two decades experience and serves as President of ICTTF and Co Chairman of
Michelle Dewberry
Michelle Dewberry
Chairperson
Michelle Dewberry
Chairperson
Michelle is a broadcaster and businesswoman who is fast becoming known for her frank, passionate and down-to-earth attitude. A regular TV commentator, Michelle also presents
Jamie Bartlett
Jamie Bartlett
Author, Broadcaster and Director at Demos
Jamie Bartlett
Author, Broadcaster and Director at Demos
Jamie Bartlett is the Director of the Centre for the Analysis of Social Media at the think-tank Demos, where he specialises in online social movements
Rhonda Reihill
Rhonda Reihill
Chief Operating Officer at Cyber Risk International
Rhonda Reihill
Chief Operating Officer at Cyber Risk International
Established entrepreneur with a successful track record in building businesses. Rhonda applies her organisational and business development skills with her drive, acumen and ability to
Chuck Georgo
Chuck Georgo
Cyber Strategist at NoWhereToHide.org
Chuck Georgo
Cyber Strategist at NoWhereToHide.org
For more than thirty years, Chuck Georgo has served as a public safety strategist, business analyst, systems engineer, and project manager supporting national and homeland
Pierluigi Paganini
Pierluigi Paganini
CTO at CSE Cybsec Enterprise and Member ENISA ETL
Pierluigi Paganini
CTO at CSE Cybsec Enterprise and Member ENISA ETL
Pierluigi Paganini is Chief Technology Officer at CSE Cybsec Enterprise, member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder