http://www.scot-secure.com/Scottish Security will be attending this years Scot-Secure conferecne.
Scot-Secure 2016 will be a one day event focussed on promoting knowledge, awareness and best-practice of cyber security. The conference will discuss the changing threat trends and explore effective measures that people can take to protect their organisations.
The agenda will draw upon practical expertise from across the business landscape, bolstered by involvement from experts in law enforcement, policy and academia. The conference will also create a unique forum for business leaders and IT personnel to come together for knowledge exchange, networking and discussion.
08:30 Registration Opens
Session 1.
09:20 Welcome from the conference Chair
Mark Stephen, Journalist & Broadcaster, BBC Scotland
09:30 Be the Hunter!
DI Eamonn Keane, Detective Inspector, Specialist Crime Division, Police Scotland
09:50 The Evolving Complexity of the Hacker
Cyber Security Specialist, Darktrace
10:10 I See No Ships!
Colin Keltie, Senior Security Specialist, Global Cyber Response Unit, Standard Life
10:30 Questions & Discussion
10:55 Refreshments & Networking
Session 2.
Industry Insights: Breakout Sessions
The session will feature insight from leading security companies and explore key aspects of cyber security in a smaller group environment. Four breakout sessions will be run in unison and then repeated providing delegates an opportunity to select two of the breakout options.
Breakout contributors:
11:20 Breakout 1
11:50 Transition
12:00 Breakout 2
A: Moving from Detection to Prevention without disrupting the End User experience
-Threat intelligence update
-How to switch from detection to prevention without impacting the business
-How to respond to incidents without investing in significant SOC head count
Aatish Pattni, Head of Threat Prevention – Northern Europe, Check Point
B: Protecting your business, brand, and customer experience from modern malware
- How can organisations protect themselves with the continued development and innovation of mobile and web based applications?
- Why the evolution of Modern malware reduces the efficacy of current controls.
- Implementing a proactive security posture with frictionless user experience.
Martin Budd, Security Sales Manager UK and Ireland, F5 Networks
C: "Gardening Leave - will it really help you weed out the bad guys?"
- Are you relying on HR policies alone to protect your critical data and Intellectual Property?
- Find out whether policies such as Gardening Leave can protect you and where they leave you vulnerable
- Learn how to protect your data even if you have high turnover rates, contractors or temporary staff
- Find out if you are at risk of a breach and what it might cost
Matt Little, Chief Technical Officer, Seric Systems
D: Hacking the feedback loop
- Hacking industrial control systems that aren’t connected to the internet
- How to deliver a malware payload to a PLC
- Lessons from Natanz and Buncefield
- How do you protect yourselves and your feedback loops
Paul Boam, Chartered Engineer, Net-Defence
12:30 Lunch, Exhibition & Networking
Session 3 (Part 1)
This section of the conference will be run as a parallel session with two conference streams. Delegates will select one of the below streams to attend.
13:30 Stream 1. Live Demo: Breaking The Internet
Dell estimates that 99% of all the traffic on the Internet will be encrypted within the next five years. This will cause massive problems for IT Security Professionals, Law Enforcement and, in fact, any business who are faced with risks around IP Theft, Data Loss, and Fraud. In this presentation we will outline the operation of secure tunnels and the encryption involved, along with the range of challenges that businesses face with the setup of their security infrastructure. The presentation includes a range of new (and shocking) live demonstrations on the breaking of secure tunnels, including within popular software packages that are used with both Microsoft Windows and Mac OS. It will provide a range of conclusions on how the next generation security architecture will look, including with the usage of smart firewalls, and in management of encryption keys. The presentation will show, that as long as we have digital certificates, SSL and TLS, that PKI is broken, and will never be fixed.
Prof. Bill Buchanan, Professor of Computer Science, Edinburgh Napier University
13:30 Stream 2: No one will hack me! really? Would you bet your business on it?
The presentation will cover areas of cyber security to help you protect yourself and your business from hackers. Don't worry if you're not a whizz kid with tech, it will be in an easy to understand format and there's time for plenty of questions. Learn how to secure your business with us today, to avoid getting hacked tomorrow.
Michael Jack, Ethical Hacker, SBRC
Kyle ****** Ethical Hacker, SBRC
14:10 Transition to main hall
Session 3 (Part 2)
14:15 Cyber Security and the Law: Exploring the EU Data Protection Regulations
Per Johansson, Head of the Edinburgh Information Office, European Parliament
14:35 Cyber Security Training: You Get What You Give
Wendy Goucher, Information Security Specialist, Goucher Consulting
14:55 Threat Intelligence and Information Sharing
Scott Barnett, Cyber & Fraud Intelligence Lead, RBS
15:15 Questions & Discussion
15:35 Closing Remarks from the conference Chair
15:40 Networking Drinks Reception - sponsored by Seric Systems & ZoneFox
17:00 Close of Conference
Anyone wanting to attend should contact
http://www.scot-secure.com/ for more information.