Information security - on the agenda this week at Olympia, London

07 Jun 2016

Information security - on the agenda this week at Olympia, London

Intelligent Security: Securing the Connected Organisation  


News for release, London, 7 June 2016: Infosecurity Europe, Europe’s largest information security event opened today, with some of the industry’s most senior experts, thought-leaders, policy-makers and commentators sharing their expertise across a broad spectrum of information security issues.

Session highlights today included: 

Mikko Hypponen, Chief Research Officer, F-Secure, who shared his insight into cybercriminal motivations, behaviours, tactics and how organisations can defend themselves against cyber-attack in his keynote speech ‘Profiling the Connected Cybercriminal’.   Please see here for an interview with Mikko Hypponen


Renowned explorer Levison Wood’s Opening Keynote on Perceptions of Risk, Resilience and Operational Security, drawing on his experiences walking the Nile and the Himalayas and during deployments across Africa and Asia as a Captain in the Parachute Regiment.  Levison Wood said: “Resilience is about recovering rapidly, it’s born out of experience and training.” Please see here for an interview with Levison Wood

Cory Scott, CISO, LinkedIn, shared insight into how LinkedIn finds and cultivates the best talent, motivates technologists to pursue a path in security and structures a security team to meet business goals in ‘How to Build an Effective Security Team’.


Neil Thacker, Information Security & Strategy Officer, Forcepoint, discussed the lack of resources most security operations teams face today and explored Artificial Intelligence (AI) as the future of fast decision making in ‘Ready Player Two - The Role of AI in Security Operations’.

Additional videos of today’s highlights can be found on the Infosecurity Website homepage here.

COMING TOMORROW…OPENING KEYNOTE - The Right Honourable Lord Hague of Richmond


10:00 - 11:00: (Keynote Stage) Opening Keynote – The Right Honourable Lord Hague of Richmond

Privacy vs Security: Reducing the Tension Between National Security, Privacy & Information Security: In an environment where increasing regulation is being developed to protect personal privacy alongside a growing ask on our intelligence agencies, how do we achieve information security, national security and personal privacy, and to what extent should intelligence agencies and government have the right to access personal data in the interests of national security?  A prominent political leader for over 20 years, who during his career has served as Foreign Secretary, Leader of the House of Commons and First Secretary of State, Lord Hague shares his perspective. 


13.35–14.25: (Keynote Stage) UK’s Most Innovative Small Cyber Security Company of the Year: Competition Final

Expert judges from C5 Capital, IBM and Microsoft announce which of the 11 challengers exhibiting in the UK Cyber Innovation Zone will take the coveted prize of the UK’s Most Innovative Small Cyber Security Company of the Year.


15:30-16:30: (Information Security Exchange) The Impact of EU Legislation on Cyber Security in the UK

As cyber threats increasingly impact society and economies, government regulation is evolving to reflect this risk and drive confidence in digital space. The EU recently took a huge step forward in strengthening its digital space. This legislation will have significant influence on EU Member States and businesses as they grapple with new requirements on data protection, cybersecurity and resilience capabilities to align with these mandates. Join our panel of experts, including Greg Day, VP and Chief Security Officer, EMEA at Palo Alto Networks, as we discuss the impact of this upcoming EU legislation on UK organisations.


17:00: (Pillar Hall) The European Security Blogger Awards

Join us to hear which blogs, podcasts and tweeters will take the crown in the 2016 EU Security Blogger Awards. This year’s ceremony will be conducted by Infosecurity Europe Hall of Fame inductee, Brian Honan.

CONFERENCE PROGRAMME HIGHLIGHTS - 8 JUNE


10.00-10.25: (Strategy Talks) Advanced Incident Investigation: Lessons Learned from APT Victims 

Lee Lawson, Counter Threat Unit Special Operations, Dell SecureWorks will discuss the rise of advanced persistent threats, how the security threat landscape is evolving and what you can do to keep pace. 


10.30-11.30: (Intelligent Defense) KEYNOTE PRESENTATION - Towards Better Security Engineering 

Last year Sergey Bratus said “Defence is offence’s child” in his memorable keynote. If we assume this to be true, how can we turn the plethora of vulnerabilities that are thrown at us through scan reports, penetration tests, code reviews, and bug bounties into lessons to improve the development of better software and hardware? Wim Remes, Manager Global Services EMEA, Rapid7, will explore the mechanisms that turn offensive data into actions that yield the outcomes we need and desire.


10.40-11.05: (Strategy Talks) Fostering an Enterprise-Wide Security Culture

John Skipper, Digital Trust expert at PA Consulting, provides expert insight into how the C-Suite should identify, assess and mitigate cyber risks to data assets and reputation, and provides real-life examples taken from PA Consulting's client case studies.


11.45-12.45: (Information Security Exchange) State of Vulnerabilities, Exploits and the Best Practices for Prioritising Remediation 

When it comes to vulnerability remediation, many organisations are behind the eight ball due to a constant deluge of cyberthreats and acute shortage of Infosec professionals. To weather this perfect

storm, IT departments must prioritise remediation. Qualys CTO Wolfgang Kandek and a panel of industry experts will discuss a year-long study of exploits and share best practices to improve remediation and reduce risk.


13.20-13.45: (Tech Talks) Defending Against Phishing Attacks: Case Studies and Human Defences 

Jim Hansen, Chief Operating Officer, PhishMe discusses how most organisations struggle to improve their defences against phishing attacks and advises that, when addressing the phishing threat, we can’t solely depend on security technologies, we must condition end users to identity and report suspected phishing emails.


14:40-15:20: (Keynote Stage) Privacy, Trust and the Internet of Things

Information security technologist Bruce Schneier will discuss the privacy implications of the Internet of Things and what role the information security community has in tackling this challenge.


16:40-17:30: (Keynote Stage) Next-Gen CISO: How to be a Successful Security Leader of the Future

Join panellists Lee Barney, Head of Information Security, Marks & Spencer, Mark Hughes, CEO BT Security, BT, Mieke Kooij, Security Director, Trainline, Troels Oerting, Group CISO, Barclays, Cory Scott, CSIO, LinkedIn in a discussion on the critical skills and qualities of an effective, next-generation CISO, and their insights into how to become a successful security leader of the future. 

 MEDIA ENQUIRIES: Louise Gilbert │Tracey Jennings │ Leanne Coombes │ Vas Panagiotopoulos Midas PR │ Tel: 020 7598 6514 │ Email:  infosecuritygrouppr@midaspr.co.uk


Notes to editors

About Infosecurity Europe

Strategically held annually in London, Europe's centre for technology start-up businesses, Infosecurity Europe is Europe’s largest and most comprehensive Information Security event. Featuring numerous analysts, policy experts, journalists and over 345 exhibitors, Infosecurity Europe presents an invaluable business platform, as well as staging the world’s largest complimentary conference programme containing eight specialist seminar streams, which have been accredited by leading industry associations (ISC)² and ISACA since 2012. The event attracts over 15,000 unique information security industry professionals attending from every segment of the industry from over 70 countries and presents the most important date in the calendar for information security professionals across Europe. www.infosecurityeurope.com

Media Partners

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.