Day 1 - 25 April 2019

Enterprise Security – IoT & Digital Transformation

Cyber security is key concern for all businesses in 2018, and protecting enterprises large and small from cyber attacks is big business.  During this track we will hear examples from across enterprise, including IoT, industrial control systems, energy and automotive industries as to how to implement effective enterprise cyber security plus address the challenges faced and current and potential solutions.

09:30PM

Enterprise Security – IoT & Digital Transformation: Chair’s welcome and opening comments

Hide Details

09:50AM

Risks and threats for the digitally transforming enterprise

Examining how cyber security can tackle the exponential growth in data from business systems that are incorporating more and more digital technology into their day to day business activities.  Covering cloud, big data, AI, IOT and mobile devices and the security sensors meant to protect them from bad agents.

Hide Details
More Details

10:20AM

Keynote: Common cyber security mistakes made by enterprises and how to avoid them

Hide Details

10:50AM

Panel: The importance of collaboration for enterprise cybersecurity

  • Understanding the unique challenges of cyber security across industry, and that every party in the supply chain needs to understand these risks from chip vendors, cloud providers and software developers to OEM’s and customers.
  • How can companies across the ecosystem collaborate to ensure stronger security? 
  • What influence can different verticals have here – from securing smart cities to connected vehicles, and what are the different considerations for each? 
  • Analysing the role and efficacy of standards and regulatory organisations in helping manage enterprise cyber security. 
Hide Details
More Details

11:30AM

Networking Break

12:00PM

Case Study: Consumer IoT attacks using DDoS

Hide Details

12:20PM

Panel: An E2E approach to tackling data security challenges of the IoT

  • Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information
  • Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
  • What are the different considerations for consumer owned connected device vs. those owned by legal entities?
  • Importance of other aspects of IoT security; testing, education of staff and physical security.
  • What influence will the incoming GDPR have on the IoT sector?
Hide Details
More Details

01:00PM

Anthony Sabella

Lead Cyber Security Architect – Enterprise Chief Technology Office Cisco

Cisco

Associated Talks:

01:00PM - Day 1

View Security Automation & Orchestration for IoT/Enterprise Delivered Through “Intent-Based Networking”

View Full Info

Security Automation & Orchestration for IoT/Enterprise Delivered Through “Intent-Based Networking”

  • The “Intent-Based Networking” concept
  • Leveraging an open standard-based platform approach that consists of generic compute, NFV, and orchestration concepts
  • Automating and orchestrating security by using the platform to create reusable templates that maximize accuracy, efficiency, and repeatability (significantly improving OPEX).
  • Using this platform approach to address both Enterprise and IoT based use cases
. Anthony Sabella, Lead Cyber Security Architect – Enterprise Chief Technology Office Cisco, Cisco
Hide Details
More Details

01:30PM

Networking Lunch

02:30PM

Marilise De Villiers

Director of Security Skills & Culture

Centrica

Associated Talks:

02:30PM - Day 1

View Training and education for staff -the first line of defence

View Full Info

Training and education for staff -the first line of defence

. Marilise De Villiers, Director of Security Skills & Culture, Centrica
Hide Details
More Details

03:00PM

Threats to infrastructure: cyber security for energy

As energy systems in the US become increasingly connected and digitized, the need for adequate security threat planning is growing.  In response to this, the US Department of Energy has recently announced the creation of ‘The Office of Cybersecurity, Energy Security, and Emergency Response’ (CESER).  The offices’ goals will include:

  • Strengthen energy sector cybersecurity preparedness.
  • Coordinate cyber incident response and recovery.
  • Accelerate game-changing research, development & deployment of resilient energy delivery systems

 

Hide Details
More Details

03:30PM

Cyber security for the automotive industry

This talk will cover a specific case study from the automotive industry around how cyber security affects all parts of the supply chain – from the factory floor, through to connected cars and vehicles themselves. Issues such as addressing customer fears around hacking, upgrading legacy equipment and working with third party providers will be covered.

Hide Details
More Details

04:00PM

Case Study: IoT security – what lessons can we learn from BYOD initiatives?

Enterprises have long since been getting their heads around bring your own device (BYOD) – but with smartphones and tablets being superseded by wearables, sensors and more, what will this mean for the enterprise network – and the enterprise network manager? 

  • How can the performance of IoT devices on the network be securely managed without disrupting performance?
  • The ownership of security from the manufacturer and the enterprise perspective
  • What lessons can be learned from BYOD rollouts?
Hide Details
More Details

04:20PM

Session Close