Summary

The Cyber Security Conference this year is exploring the business opportunities that relate the cyber security market with a focus on the Internet of Things (IoT) and Smart Cities. The increasing use of "Smart Technologies" to augment our daily lives, from smart metering to intelligent cars, exposes individuals and new organisations to new and diverse threats. Therefore we must ensure that our businesses are ready to defend against these threats, but also be able to take advantage of the gaps in the market place for new products and solutions to help protect others.

 

Agenda

  • 9:00 - Arrival, Coffee and Networking
  • 9:50 - Welcome by Mr Tony Dyhouse
  • 10:00 - Session 1: Defend
  • This is the current focus of much of the cyber security work. It is about how to prevent your business suffering from loses due to working in a digital business arena. As such session focuses on how to protect your business from loses due to digital attacks (Intellectual property), or from fines (DPA).
  • Speakers:
    • Geoff Conway National Crime Agency - National Cyber Crime Unit
    • 'We can only defend what we know we have' by Mr Tony Wilson Indelible Data

      It seems that any household device can now be online and consumers are becoming more aware of the threats to their privacy. So how do we convince users that the products being developed are secure?

      This talk will examine the need to systematically maintain inventories of all the third party components used and will also explore the increased due diligence required throughout the entire supply network. We must ensure that no "backdoors" make their way into our online products from malicious third parties and, should an alleged vulnerability emerge, then we must know immediately if it impacts upon our products in order to act quickly and defend our credibility and reputation.

    • 'Defend Your Home! Jamming Unsolicited Messages in the Smart Home' by Ibrahim Ethem BagciLancaster University

      A plethora of communication protocols for home automation are currently in use. These protocols generally lack essential security features such as message authentication. Thus, smart homes are not protected against accidental or malicious message injection. In this paper we describe how jamming can be used to prevent processing of unsolicited messages in smart homes. We describe how jamming based protection can be added to a home automation system without impairing legitimate transmissions in neighbouring houses.

    • 'Beyond Breaches - Detecting and Preventing Data Extraction' by Prof Awais Rashid Security Lancaster

      Data is a key motivator for a number of cyber attacks, be it personal data, financial information or intellectual property. In the modern digital society, data is one of the biggest and most valuable commodities. The complexity arising from modern business settings, new technologies and resulting modes of work lead to an increase in the cyber attack surface of an organisation. At the same time, attackers motivated by industrial espionage are persistent and return again and again in order to achieve their objective. If we accept that there is no perfect cyber security, then the principle of resilience becomes a key driver for any security measures: If we assume that at some point a breach in the security measures will take place, what mechanisms can enable cyber security personnel and systems in an organisation to detect, stop or at least disrupt data leakage from the organisation's system following such a breach? This talk will discuss typical data exfiltration means, counter measures and their effectiveness as well as the impact of emerging business practices and technological innovations in this regard and highlight good practice guidelines to reduce the threat of data exfiltration.

       

  • 10:55 - Comfort Break
  • 11:20 - Session 2: Differentiate
  • This is the process by which a product or service you offer can distinguish itself in a crowded market place. This approach is turning cyber security to into a digital business advantage by making you more competitive and able to win more business by getting your products and services to stand out.
  • Speakers:
    • 'Being Competitive in UK Cyber Security' by Duncan Brown Pierre Audoin Consultants (PAC) Ltd

      In 2013, PAC was commissioned by the Department for Business, Innovation & Skills (BIS) to conduct a study into the competitiveness and structure of the cyber security sector in the UK. The resultant report was released in October, and Duncan will present its key findings and recommendations. The report included market sizing and forecasts for cyber security in the UK, as full as market structure analysis and competitive positioning. It offers important guidance to any vendor in, or seeking to enter, the UK cyber security market.

    • 'Superfast Lancashire Business Support Programme' by Tony Morgan Superfast Lancashire

      One of the most innovative aspects of the whole Superfast Lancashire programme is its accompanying Business Support programme, with funding from The European Union Regional Development Fund. The Business Support programme is designed to help show Lancashire's SMEs (businesses with up to 250 employees) how to get the very best out from superfast broadband. It's all about helping your business to use fibre broadband to develop, grow or improve its effectiveness.

      The programme is run as a combination of one to one consultations, professional workshops and business master classes and features experts from a variety of fields, including online security. Eligible businesses will get access to a variety of valuable resources, an insight into how similar businesses are making superfast broadband really work for them, and all manner of advice and support. With expert sessions on Cloud, web, security, digital marketing and much more, all of it free of charge.

    • 'Cyber Security and our strategy for growth' by Paul Astle TNP Ltd

      Committing to Cyber Security and formal certification is a massive step for SME. The Networking People (TNP) provides networking connectivity, infrastructure and consultancy for several councils in the UK.

      Paul will be discussing TNP's strategy for growth in this sector and how formal Cyber Security compliance is crucial for the company's growth and gaining a share of the billions the UK government spends on IT every year. TNP has spent the last few months transforming the companies Cyber Security processes in preparation of their first ISO27001 audit in December on the road to PSN accreditation. Paul will offer a 'real world' candid insight into the process of implementing formal Cyber Security accreditation within an SME.

       

  • 12:15 - Lunch
  • 13:00 - Networking and Exhibitions
  • 14:00 - Session 3: Diversify
  • This is where a business can branch out into cyber security to taking advantage of its sector experience and knowledge to supply custom security solutions for that particular sector.
  • Speakers:
    • 'Understanding the Role of Trusted Services' by Prof Nigel Davies School of Computing and Communications Lancster University

      Trusted services are normally associated with the technical problems of securing computing systems. In this talk Nigel will focus on a different notion of trusted services, i.e. how digital services can be used to build trust between organisations and individuals. Nigel will discuss the importance of trust and present a case study based on work conducted as part of the TSB funded Faith Project that has been exploring the establishment of trust between councils, citizens and contractors.

    • 'Diversifying in the digital industry' by Mr Steve Robinson XyOne Cyber Security

      The Xyone group was founded in 2000, originally as an online marketing agency, taking advantage of the digital revolution and the .com boom to build a successful business within search engine marketing. Over the past 14 years, Stephen has witnessed the speed at which the landscape within the digital industry changes and how diversification and adaptability is essential for survival.

      Stephen will be discussing how his knowledge of the industry coupled with the advances in the sophistication of cybercrime and the pressures of legislation and compliance led to the launch of Xyone Cyber Security in 2012. Stephen will be discussing where Xyone Cyber Security is now and what their objectives are for the coming year, including launching a Cyber Advisory Service in collaboration with Security Lancaster, aimed to provide support and information for businesses who have been victims of a breach or whom are looking for advice on how to implement cyber security to protect their assets.

    • 'UKTI and Support to Help Access the iNternational Cyber Security Market' by Mr Charles Jacobson UKTI

      The presentation will highlight the opportunities for UK companies to exploit business opportunities in the growing global cyber security market and will discuss the range of help and support available from UKTI - both for companies with existing export experience and for those looking to diversify into international markets - to access those opportunities.

  • 14:55 - Networking and Exhibitions and Refreshments
  • 15:30 - Session 4: Develop
  • There are numerous opportunities for new businesses and start up companies. This session will explore these opportunities and the potential cyber security issues a new business might solve.
  • Speakers:
    • 'In search of new value' by Prof Rashik Parmar IBM

      Everyone is trying to find the next big thing that will capture the imagination of nations globally. However, most organisations struggle to return their current market position. In this talk Rashik will explore the patterns of business model innovation that are made possible through technology advances. The resulting innovation requires collaboration across multiple organisations, including the city leadership. Rashik will explore how programmes to transform a city to a smarter city can become the catalyst for capturing this new value.

    • 'Enterprise meets Citzenship - A Focus on Cybercrime' by Clare McDonald & Michael Pollock The LionHeart Challenge, Field Lockheart Associates

      The LionHeart Challenge, a Citizenship and Enterprise Programme for Young People, was used as a VEHICLE to provide the Young People of the UK with an ideal way of engaging and consulting with CYBERCRIME EXPERTS from Security Lancaster at our 2012 National Finals.

      The Programme provides our country's Young People with a 'Voice' via providing AN EMPOWERING PLATFORM and Forum for the Young People to express and share their knowledge, experience, perceptions and understanding of social issues (in this instance Cybercrime), with the specific aim of empowering them to participate in informed, creative approaches and solutions within their own local communities in partnership with organisations such as the Police. In doing this, we are enabling our Young People to directly contribute via GAINING THEIR VIEWPOINT on how the Police and associated organisations could progress in the creation of robust solutions to tackle Cybercrime, and especially the aspects of Cybercrime directly affecting them as Young Citizens, going forward.

    • 'Securing the Extended Human' by Mr Tom Cheesewright Book of the Future

      We are all bionic. Forget about super strength and chips in our heads. Our mental faculties are extended by smart software on our devices and in the cloud. As wearable technology takes off we will become more reliant on technology to ameliorate our weaknesses and enhance our skills to superhuman levels. But what happens when we are stripped of our prosthetics? How do we secure the extended human?

    • Austen Okonweze Department of Business Innovation and Skills

      The presentation will provide an overview of the BIS cyber security agenda. It will highlight what BIS is doing to promote cyber security and also touch on some of the ways BIS is helping to support cyber security SMEs.

  • 16:30 - Closing Thoughts by Dr Daniel Prince
  • 16:40 - Event Close