Summary

Cyber Security is a significant concern for companies of all sizes trying to protect their bottom line. This regional event will focus on helping you develop ways in which your business will be able to flourish and protect itself in online digital commerce.

Industry and academic experts will present the issues and solutions to cyber security problems which affect a variety of industries. This event is being hosted by InfoLab21 in partnership with the ICT KTN and is aimed at all small to medium sized businesss who would like to know more about cyber threats and how to protect your company from various attacks.

By attending this event you can meet with Security experts from Industry and Academia and learn how Cyber Security relates to your business.

 

Agenda

  • 09:00 - Registration, refreshments and exhibitions
  • 10:00 - Professor Awais Rashid - Opening Speech: Security Lancaster
  • In his opening address Professor Awais Rashid will be providing a welcome to the event and talking about his work as co-director of the Security-Lancaster research centre and head of the EPSRC-GCHQ Academic Centre of Excellence in Cyber Security Research at Lancaster University.

     

  • 10:15 - Tony Dyhouse - Evolving Cyber Challenges: Cyber Security Director at ICT KTN
  • LOIC, HOIC, social networking risks, jammers, blockers and lasers! We hear about the importance of Cyber Security to business all the time but do the terms used and the technical nature of the issues concerned leave you struggling to see how such matters ACTUALLY relate to you and your business? In this talk we'll hear from Tony about areas like these and look at some of the new and forthcoming tools, techniques and threats that we may have to face in our every evolving Cyber World.
  • 10:45 - David Cook - How Data Losses May Arise and the Subsequent Effect on a Business:Solicitor Advocate, Pannone LLP
  • They are now so pervasive that it is almost unthinkable for a business not to use computers. While the benefits are there for all to see, there are also inherent weaknesses which expose the users to a risk of data loss. Whether it is their own data, or those of their customers, the repercussions can be far reaching. This presentation considers the law regarding such losses, how they can occur, and ways to minimise the risks.

     

  • 11:15 - Break, Refreshments and exhibitions
  • 11:30 - Steve Carr - Securing Ever-Expanding Enterprise Networks: Dell SonicWALL
  • Corporations, academic institutions, and government entities alike are embracing Web 2.0 and social networking to empower their workforce and increase their business agility. However, with all these benefits come a significant number of risks, as first-generation security solutions are failing to stop the invasion of new and sophisticated threats. Also The 'Bring Your Own Device' (BYOD) movement that is becoming increasingly common within the workplace has been fuelled by the dramatic growth and adoption of mobile platforms such as Apple iOS and Google Android, which have become a critical component of business infrastructure. With this in mind, this presentation will provide expert advice for IT security professionals on solving the challenge of rebuilding security into the network's DNA.
  • 12:00 - Tony Wilson - "Comply or Die!": Indelible Data
  • Every business must understand the level of information security required in order to select controls that are proportionate to the risk. Getting the balance wrong means overspending on areas that are not required and under spending on those that are most vital. This may lead to a breach of data protection laws, contractual agreements and PCI requirements. With information security still in its infancy, smaller companies are struggling to assess their place in the threat landscape. This talk will describe the processes required to establish and maintain a focused Information Security Management System to give assurances to regulators, stakeholders, partners and customers that your company is doing all it can to ensure the security of their information.

     

  • 12:25 - David Guest - Enhancing Security through Identity Management: Salford Software Ltd
  • Many businesses have problems with IT Governance and Security, moving to the cloud only exacerbates the problem with access to systems located somewhere from a location that is somewhere else. Timely and accurate provisioning and, more importantly, de-provisioning can be a real challenge. Users are unproductive if they are waiting around for accounts; ex-employees or those suspended from duties can pose a real security risk if they are not managed quickly and effectively. By making the most of the available IT services many of these issues can be alleviated. Both Internal and External users can be correctly managed, provisioned, de-provisioned and controlled ensuring that only the right people have access to the data they need at the right time.

     

  • 12:50 - Lunch – networking/exhibitions/one2ones
  • 13:50 - Professor Awais Rashid - Cyber Security Challenges in a Digitally Connected World: Security Lancaster
  • As the Internet becomes increasingly pervasive in our daily lives, we are seeing the rise of the Digital World Phenomenon, where the former notions of cyberspace and physical world merge together. The large number of devices connected to the Internet and large-scale infrastructures such as the Cloud bring new challenges for Cyber Security in this digital world. In this talk I will highlight the kind of risks that arise for both individuals and organisations and the challenges they pose for software systems and their developers. I will then focus on the fundamental role that the fluid nature of identity plays in exacerbating these challenges and discuss some recent research that aims to tackle these problems.

     

  • 14:20 - Dr Mark Lacy - Cyber Security and Uncertain Futures: risk, technology and design fictions: Security Lancaster
  • One of the key challenges in the area of Cyber Security and digital politics is planning for a world that is undergoing accelerated geopolitical and technological change. As many leading thinkers on risk have argued, institutions often create cultures that limit how we think about risk and uncertainty, often narrowing the disciplinary focus of inquiry: one of the key challenges is to develop ways to open up broader inter-disciplinary conversations and speculations on security futures. The presentation will introduce some alternative processes - the development of 'design fiction' - to generate critical discussion and insight on economic and Cyber Security challenges.

     

  • 14:45 - Comfort Break
  • 15:00 - Simon Smith: IBM Security Systems
  • The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. They are intended to help customers, fellow researchers, and the public at large understand the changing nature of the threat landscape and what might be done to mitigate it.
  • 15:30 - Dr Daniel Prince - Closing speech: Security Lancaster
  • To round of the day, Dr Dan Prince, Associate Director at Security Lancaster, will be giving his thoughts on presentations seen throughout the day and also on the discussions heard regarding how small business owners can identify their own security risks and exposures and then plot a course through the Cyber Security landscape to find support, expert advice and solutions to help them avoid issues and gain benefits from this growing area of technology.

     

  • 15:50 - Opportunity for networking and visiting exhibitions
  • 16:30 - Close