lead sponsors: cyberuk 2017: a safer digital britain · the national cyber security strategy,...
TRANSCRIPT
1 2
CYBERUK 2017 Contact Details:E: [email protected] E: [email protected] T: +44 (0)117 906 4554www.ncsc/gov.uk/cyberuk
14-16 March 2017Arena and Convention CentreKings Dock, Liverpool L3 4FP
UK Government’s biggest ever cyber security event will break down barriers and prepare you for the step change in UK cyber resilience
CYBERUK 2017: A SAFER DIGITAL BRITAIN
LEAD SPONSORS:
@CYBERUKevents #CYBERUK17
LEAD SPONSORS:
3 4WWW.NCSC.GOV.UK/CYBERUK 4
ONE COMMUNITY TWO EVENTS THREE DAYSHeld five months following the launch of the NCSC and the National Cyber Security Strategy, CYBERUK 2017 will explain the Government’s strategy for achieving a step change in UK cyber resilience. This three-day event will be attended by two audiences:
CYBERUK STRATEGY 14 March 2017 The cyber security Flagship event for seniors, this will be the Government’s primary briefing for the leadership community – SIROs, CEOs, CTOs, CIOs, Team Leaders, Heads of Department.
CYBERUK Strategy replaces the IA and Cyber Security series of flagship events (IA06 – IA15).
CYBERUK In Practice 15 – 16 March 2017The event for technology and cyber security professionals at all levels, providing an invaluable opportunity for networking and exchanging experience and technical insights.
INTERACTIVE BY DEFAULTCYBERUK 2017 will be informal. From beginning to end all content will reflect the commitment to be collaborative, to listen, to be open, to share insights and to hear great ideas, wherever they come from. Both events will be interactive and participative.
CYBERUK 2017 IN NUMBERSLed personally by Ministers, Director GCHQ, NCSC Chief Executive, NCSC Technical Director and NCSC Director Engagement, CYBERUK 2017 will comprise:
02events
01Spotlight Stage for lightning talks
03days
35stream sessions
1800delegates
12workshops
80exhibitors
+
100speakers
+SPEAKERSCYBERUK 2017 Chairs
CYBERUK Strategy: Ciaran Martin, CEO, NCSC
CYBERUK In Practice: Alex Dewdney, Director Engagement, NCSC
Plenary Speakers
Director GCHQ
Rt. Hon. Ben Gummer MP, Minister for the Cabinet Office
Dr Ian Levy, Technical Director, NCSC
Dr Claudia Natanson, Chief Security Officer, DWP
Ollie Whitehouse, Technical Director, NCC Group
5 6
For 10 years the IA and Cyber Security flagship events (IA06 to IA15) provided the once in a year opportunity for the leadership community to come together and address the challenges facing the UK’s networks and information security. CYBERUK 2017 replaces this forum with a bigger, bolder event for IA and cyber security leaders.
CYBERUK Strategy will set the agenda for UK cyber security. Held five months following the launch of the NCSC and the National Cyber Security Strategy, this event will explain the purpose and strategy of the NCSC to its priority audiences, providing an update covering its vision, strategy and delivery plans.
It will give the leadership community the chance to debate priorities, challenges and opportunities.
CYBERUK STRATEGY FEATURES:
• Networking Dinner: This will be held at the spectacular St George’s Hall, Liverpool on the evening of Monday 13 March. This will be an inspiring start to the conference, featuring a keynote from a leader in UK intelligence and security. This will be a chance to network with NCSC leaders and colleagues from across Government, the CNI, Academia and Industry.
• Speaker Line Up: Chaired by Ciaran Martin, CEO, NCSC, the speaker line-up is led by the Rt Hon Ben Gummer MP, Minister for the Cabinet Office and Paymaster General, Director GCHQ and Ian Levy, Technical Director, NCSC. An additional 40 Plenary and Stream speakers from Government, CNI, Academia and Industry will share a wealth of experience developing and implementing solutions to increase cyber resilience.
• Streams: Careful planning is going into the design of four Streams, offering the leadership community opportunities for interaction and feedback. They will provide insights into the NCSC’s strategy, resources and the support its teams can offer you and your organisation. Each will be chaired by NCSC seniors entrusted with shaping and leading the Team’s delivery.
• Spotlight Stage: A captivating networking and exhibition area will feature opportunities for sharing your ideas and providing feedback. A highlight of this area will be a Spotlight Stage, featuring thought provoking lightning talks during the lunchtime break.
• Exhibition: The CYBERUK 2017 exhibition will comprise a wealth of leading national and international cyber network defence and IA specialists. Last few stands remaining – contact the sponsorship team at [email protected].
• ‘Dragon’s Den’: The NCSC is working with DCMS in finding 10 outstanding small and micro- businesses to feature their new products in the CYBERUK Innovation Zone. These businesses will be given the opportunity to pitch their products and services to NCSC Technical Directors.
• Book Early: CYBERUK Strategy will be free of charge for public sector delegates. Event passes are allocated to each department and priority organisations. Delegates are recommended to book early to secure their place.
WHO WILL ATTEND?
CYBERUK Strategy will be attended by the leadership community, including SIROs, CIOs, CTOs, CEOs, Board Members, Heads of Department, Business Managers and Team Leaders.
6
THE NCSC LEADERSHIP EVENT
14 MARCH 2017
PUBLIC SECTOR DELEGATES
The good news is we’ve made CYBERUK free for
you to attend – but places are filling fast. To secure yours you need to book
ASAP at:
www.ncsc.gov.uk/cyberuk
WWW.NCSC.GOV.UK/CYBERUK
7 88
We are placing great emphasis on Stream sessions, which have been designed to allow for greater interaction and the opportunity to have your voice heard. Led by committed NCSC Stream Owners, we have some excellent content and an inspiring speaker line-up.
STREAM ONE: ECONOMY & SOCIETYThe NCSC’s ambition to make the UK the safest place to live and work online cannot be achieved by engaging only with the cyber security community. Success depends on our reaching out to the wider economy, mainstream business, Academia and the citizen. This Stream will feature thought leaders from the information economy and key business segments in considering how the NCSC can best transform the overall resilience of the UK.
STREAM TWO: GOVERNMENT AND PUBLIC SECTOR Citizens expect the personal information they share with the public sector to be properly safeguarded. More and more they expect to access public services digitally. This Stream examines how the NCSC Digital Team is making it easier for the public sector to secure digital services. How is risk management decision making evolving? How can security be baked into enterprise IT and online services? How is support for local Government, the health sector and emergency services evolving? This Stream will be reinforced by case studies and provide the opportunity for debate.
STREAM THREE: CRITICAL NATIONAL INFRASTRUCTUREThe coming together of CESG, CERT-UK and the cyber elements of CPNI brings support for the Critical National Infrastructure (CNI) right into the heart of the NCSC’s service delivery. This fascinating Stream will bring together case studies and commentators from across the CNI and those who own and operate Industrial Control Systems connected to the internet. This Stream will have broad appeal, examining the most crucial issues involved in securing against cyber attack, key industries including Energy, Civil Nuclear, Finance, Transport, Communications, Water, Food, Broadcast Media, Space and Chemicals.
STREAM FOUR: DEFENCE AND NATIONAL SECURITY Establishing security solutions to meet the needs of the information owners in this sector continues to stretch the most capable minds in the UK, both in HMG and industry. This Stream invites you to engage with the NCSC, its stakeholders and partners to explore how these challenges are being addressed collaboratively by this normally hidden mission area. Whilst this Stream won’t be exposing very sensitive aspects of work in this forum, it will use real life cases to showcase the solutions and approaches that enable businesses and operations to deliver the impact they seek in a risk balanced and practical way. It will dispel myths and demonstrate that the UK remains a world leader in this space.
CYBERUK STRATEGY STREAMS
14 MARCH 2017
WWW.NCSC.GOV.UK/CYBERUK
9 10
CYBERUK 2016 was a radical departure from previous Government information and cyber security events. It broke down barriers and opened a serious dialogue between delegates from different sectors and backgrounds, sharing insights and experiences.
CYBERUK In Practice will build on this success. It will bring together the professional community responsible for implementing IA and Cyber Security across Government, Industry, Academia and the Critical National Infrastructure. It will showcase what we can do together as teams, as departments and as organisations to implement digital data and technology as safely and securely as we can.
This event will be about sharing plans for moving beyond seeing security simply as a goal in itself, to working out how we can embed it into everything we do.
CYBERUK IN PRACTICE FEATURES:
• Plenary Speakers: You will know what a huge year this is for strengthening the UK’s cyber defences. Experts from Government and Industry will focus minds on what must be done. Panel sessions will present the chance for an exchange of views and testing perspectives.
• Streams: There will be five Streams, comprising a total of 23 sessions over the two-days. Led by expert NCSC Stream owners, we have some excellent content and an inspiring speaker line-up.
• Interaction: We are determined to give you a chance to have your say throughout the event. We are building in many different ways for you to do this – from posting feedback cards on the interactive wall … to chatting to our graphic artist, who will find visual ways to capture your insights.
• Networking Evening: Informality and great networking were the trademarks of CYBERUK 2016 – and they will be again in 2017. For this event there will be a relaxed Networking Evening in place of a more formal gala dinner.
• Spotlight Stage: A highlight for the Networking Evening will be our Spotlight Stage, which will again feature compelling lightning talks.
• Exhibition: The CYBERUK 2017 exhibition will comprise a wealth of national and international cyber network defence and IA specialists.
• Mini Cyber Challenges: The NCSC is designing a series of entertaining cyber challenges for delegates. They will be based on an internet café – Mallory’s Coffee Shop – where the finest barista coffee will be served. Graded at different levels of technical complexity, they will be found across the networking areas. You will be able to pit your wits against your peers and see how well you do!
10
AWARD WINNING EVENT FOR THE PROFESSIONAL COMMUNITY
15 & 16 MARCH 2017
DRIVEN WITH PASSION
CYBERUK In Practice is driven by NCSC Technical Directors, Jon Lawrence
and Ian McCormack. They have mobilised their
NCSC colleagues, GDS, departmental partners,
industry experts and academia to stage an event that is packed with insight,
opportunities for interaction and fun!
“I’m looking to create an event I would want to attend
myself – with sessions and speakers that we can
genuinely learn from. It must be inspiring, informal, offering serious insight... It is going to be memorable!”
JON LAWRENCE, TECHNICAL DIRECTOR ASSURANCE, NCSC
WWW.NCSC.GOV.UK/CYBERUK
11 1212
Compelling and interactive, the Streams at CYBERUK In Practice 2016, were assessed to be outstanding by delegates. The NCSC Technical Directors are determined to achieve the same results at the event in March.
STREAM ONE: MANAGING THE THREAT This Stream will focus on developing a deeper understanding of the threat landscape. It will examine new approaches to managing the evolving threat, handling incidents effectively to limit harm and preventing recurrence. It will draw on some of the Active Cyber Defence (ACD) themes.
STREAM TWO: PEOPLE ARE THE STRONGEST LINK We need to recognise and treat people as an organisation’s biggest asset, not a security ‘weak link’. This stream will identify how we can better support users to work effectively and securely. What are the real barriers for users working securely? It will draw on research and innovative approaches that seek to solve security problems hand-in-hand with the user. It will examine approaches to ensuring that everybody has appropriate security related skills to keep themselves and their organisation secure.
STREAM THREE: PROACTIVE DEFENCE Our approach to cyber security must evolve to keep pace with new user requirements, technologies and threats. This stream will provide in-depth technical exploration of Active Cyber Defence measures. We will provide case studies and worked examples of how innovative approaches to security have had a major impact on risk, harm or increased business utility. There will be an update on the Secure by Default programme that seeks to address this aim.
STREAM FOUR: SECURING AGILE DELIVERYDelivered by the NCSC in collaboration with GDS, this Stream examines how security and resilience can be built into systems and services using a variety of development models, including Agile. The Stream will set out the different approaches to security as we transition from a traditional waterfall to agile development approach. It will consider the approach to risk management and security decision making in agile / continuous integration cycles.
STREAM FIVE: CYBER THOUGHTS There will be an additional one-day Stream on Wednesday 15 March. This will provide an update on some key topics, including GDPR. There will be a session devoted to skills. Finally, we will review the NCA Prevent initiative.
CYBERUK IN PRACTICE STREAMS
15 & 16 MARCH 2017
WWW.NCSC.GOV.UK/CYBERUK
13 14
CYBERUK STRATEGY: NETWORKING DINNER SPONSORED BY ATKINS, ST GEORGE’S HALL MONDAY 13 MARCH 2017
TIME ACTIVITY
19:00 Pre-Dinner Networking DrinksAtkins: Networking Dinner Sponsor
19:45 Welcome Networking Dinner Sponsor (5 – 10 mins) + Chair (10 mins)
20:05 Dinner served
21:45 After Dinner Speaker
22:30 Further Coff ee and Networking
23:00 Close
DAY 1: CYBERUK STRATEGY TUESDAY 14 MARCH 2017
TIME ACTIVITY
09:15 Delegate Registration – Exhibition Opens
10:15 Plenary Session, 1A Upper LevelCYBERUK Strategy Chair’s WelcomeCiaran Martin, CEO National Cyber Security Centre
10:25 Plenary Session, 1A Upper LevelGovernment Keynote Address
10:40 Plenary Session, 1A Upper LevelIndustry Keynote Address
10:50 Plenary Conversation, 1A Upper LevelPanel Discussion Chaired by a Senior Journalist
11:15 – 11:50 Coff ee Break and ExhibitionSANS Institute: Networking Sponsor
11:50 – 12.50 SESSION ONE
STREAMSSESSION ONE
STREAM 13A Upper Level
STREAM 23B, Upper Level
STREAM 311B&C, Upper Level
STREAM 412, Upper Level
ECONOMY AND SOCIETY
GOVERNMENT AND PUBLIC SECTOR
CRITICAL NATIONAL INFRASTRUCTURE
DEFENCE AND NATIONAL SECURITY
Understanding NCSC Purpose and DeliveryLed by NCSC DD, Sarah Lyons, this session will review the role and remit of the NCSC in the ‘Economy and Society’ context. Looking at specifi c delivery solutions, including:
• CISP update• Cyber Essentials• SME Website Portal
Active Cyber Defence (ACD)Following an opening address by Dr Ian Levy, CTO, NCSC, this session includes lighting pitches by individuals driving seven NCSC ACD projects. It will provide a fascinating insight into NCSC in this area.
Cyber IncidentsA review of real world cyber incidents, examining what went wrong and lessons learnt. There will then be a presentation from an energy company, examining how they are responding to the changing security environment.
FoxhoundExploring FOXHOUND, the cross sector Government ICT solution for use at SECRET.
This project is an exemplar for programme design and delivery.
13:00 – 14:15 Networking Lunch & Exhibition SANS Institute: Networking Sponsor
13:15 – 14:00 CYBERUK STRATEGY WORKSHOPS
WORKSHOP 13A Upper Level
WORKSHOP 23B, Upper Level
WORKSHOP 311B&C, Upper Level
WORKSHOP 412, Upper Level
WORKSHOP 54 A&B, Upper Level
AIRBUS PALO ALTO IBM MWR INFO SECURITY NCSC (TBC)
14:15 – 15:15 SESSION TWO
STREAMSSESSION TWO
STREAM 13A Upper Level
STREAM 23B, Upper Level
STREAM 311B&C, Upper Level
STREAM 412, Upper Level
ECONOMY AND SOCIETY
GOVERNMENT AND PUBLIC SECTOR
CRITICAL NATIONAL INFRASTRUCTURE
DEFENCE AND NATIONAL SECURITY
This session will highlight the work of the British Retail Consortium (BRC) are doing to improve the cyber security of their members. An opportunity to showcase BRCs new Cyber Toolkit and show the work that the BRC & NCSC are doing with big retail to pass knowledge /services to this area of NCSC’s new remit.
Cloud Services Myth Busters – Asking the Right QuestionsAn Industry expert will provide a perspective on cloud security. This will be followed by a Government speaker sharing fi rst-hand experience/ lessons learnt moving services to the cloud. The NCSC will provide cloud guidance.
Assessment / NCSC
Content to be confi rmed.
Working with IndustryDeveloping an understanding of how HMG can work with Industry to continue to provide cutting edge cyber security solutions and keep the UK ahead of threat actors.
15:15 – 15:50 Sponsored Seminars in Stream Rooms
15:50 – 16:35 Coff ee Break and ExhibitionSANS Institute: Networking Sponsor
16:35 – 17:35 SESSION THREE
STREAMSSESSION TWO
STREAM 13A Upper Level
STREAM 23B, Upper Level
STREAM 311B&C, Upper Level
STREAM 412, Upper Level
ECONOMY AND SOCIETY
GOVERNMENT AND PUBLIC SECTOR
CRITICAL NATIONAL INFRASTRUCTURE
DEFENCE AND NATIONAL SECURITY
Case Study – Proactive Cyber SecurityBritish Pregnancy Advice Service talking on their experience of a previous cyber incident that went through to law enforcement and ICO judgment. To include lessons learnt, and moving on from the incident.
Speaker: BPAS Senior
Clusters Model – ‘New Ways of Doing Security in Central Government’This session will be chaired by Jon Ashton, Director Cyber Security and Information Risk, HMRC, who will describe progress achieved in the cluster trial HMRC is leading. Ben Aung, CGSD, will provide a Cabinet Offi ce perspective on the cluster initiative and roll out plan.
NCSC Risk Engagement with CNI – Key FindingsThis session will focus on a major NCSC Risk Engagement survey, exploring perspectives from CNI organisations.
This will review attitudes, learnings and how the NCSC is responding as a result of this engagement.
Demonstrate how military interoperability can be enabled and sustained – through collaborative design approaches, implementation and operation. US colleagues from the NSA and US Dept. of Defence will join the NCSC and MOD in exploring this topic.
17:40 – 18:10 Closing Plenary Session, 1A Upper LevelMinisterial Keynote Rt Hon Ben Gummer MP, Minister for the Cabinet Offi ce
18:10 – 20:15 Drinks Reception SANS Institute: Networking Sponsor
A special networking drinks reception will be held in the Exhibition Hall for CYBERUK Strategy and CYBERUK In Practice delegates
20:15 CLOSE OF CYBERUK STRATEGY
AGENDA
14WWW.NCSC.GOV.UK/CYBERUK
*programme subject to change
15 16
DAY 2: CYBERUK IN PRACTICE WEDNESDAY 15 MARCH 2017
TIME ACTIVITY
09:15 – 10:30 Delegate Registration – Exhibition Opens
10:35 – 10:40 Plenary Session, 1A Upper LevelCYBERUK In Practice Chair’s WelcomeAlex Dewdney, Director for Engagement, NCSC
10:40 – 10:55 Plenary Session, 1A Upper LevelDr Claudia Natanson, Chief Security Offi cer, DWP
10:55 – 11:05 Plenary Session, 1A Upper LevelPeople: The Strongest LinkEmma W, NCSC
11:10 – 12:10 SESSION ONE
STREAMSSESSION ONE
STREAM 13A Upper Level
STREAM 23B, Upper Level
STREAM 311B&C, Upper Level
STREAM 412, Upper Level
STREAM 54 A&B, Upper Level
MANAGING THREAT
PEOPLE ARE THE STRONGEST LINK
PROACTIVE DEFENCE
SECURING AGILE DELIVERY
CYBER THOUGHTS
Threat Briefi ngAn industry partner will present a threat briefi ng, providing context on the emerging threats they see impacting the public sector.
Eff ective Security Case Studies (Part 1)To kick off the track on a positive note, we’ll look at success security stories from across industry and government.
Speakers: Angela Sasse, UCL, plus others (TBC)
Securing the EcosystemAn SBD talk, covering progress made using case studies.
Speakers: Andy Pace, NCSC, plus others (TBC)
Introduction to AgileAs well as introducing the stream topic, this session aims to demystify the term and explore its roots.
DPR
12:10 – 13:25 Networking Lunch & Exhibition SANS Institute: Networking Sponsor
Lightning Talks on the Spotlight Stage
13:30 – 14:30 SESSION TWO
STREAMSSESSION TWO
STREAM 13A Upper Level
STREAM 23B, Upper Level
STREAM 311B&C, Upper Level
STREAM 412, Upper Level
STREAM 54 A&B, Upper Level
MANAGING THREAT
PEOPLE ARE THE STRONGEST LINK
PROACTIVE DEFENCE
SECURING AGILE DELIVERY
CYBER THOUGHTS
Vulnerability Disclosure and ManagementAn insight into the NCSC’s new Vulnerability Disclosure Programme.
Eff ective Security Case Studies (Part 2)A further look at success security stories from across industry and government.
Speakers: Adam Joinson, University of Bath, plus others (TBC)
Taking Down PhishersA deep dive into the story of how NCSC are making a diff erence to phishing emails.Including DMARC overview, case studies, Netcraft stats, Netcraft walkthrough.
Panel Debate: Does Agile Make Security Stronger or Weaker?A panel session designed to provoke debate about how security and agile work together.
Panellists: Helen. L (NCSC), Karen Jackson Morris (Student Loans Company)
Skills
14:35 – 15:35 SESSION THREE
STREAMSSESSION THREE
STREAM 13A Upper Level
STREAM 23B, Upper Level
STREAM 311B&C, Upper Level
STREAM 412, Upper Level
STREAM 54 A&B, Upper Level
MANAGING THREAT
PEOPLE ARE THE STRONGEST LINK
PROACTIVE DEFENCE
SECURING AGILE DELIVERY
CYBER THOUGHTS
STIX AND TAXIILed by the NCSC, there will be a discussion and case study on STIX and TAXII, discussing what these protocols off er, when to use them, their strengths and limitations.
Supportive TechnologiesHelping users to behave securely is an important part of developing an eff ective security posture. This session will cover technologies that make it easy for users to do the right thing.
Industry speakers (TBC)
O/S security: The 3rd line of Defence OK, so your user has downloaded malware… This deep technical dive explains how some of the latest operating system mitigations can save the day. Expect assembly. O/S Mitigations Shielded VMs.
Speaker: Ollie Whitehouse, CTO NCC Group
State of the Art: Sharing good practice For this session, we have chosen four speakers from across Government and Industry to describe their successful Agile projects. This slot will be comprised of 4 x 10 min slots and a Q&A.
NCA Prevent
15:35 – 16:10 Sponsored Seminars in Stream Rooms
16:10 – 16:55 Coff ee Break & ExhibitionSANS Institute: Networking Sponsor
17:00 – 17:30 Plenary Session, 1A Upper LevelTBC
17:35 – 18:20 CYBERUK IN PRACTICE WORKSHOPS
WORKSHOP 13A Upper Level
WORKSHOP 23B, Upper Level
WORKSHOP 311B&C, Upper Level
WORKSHOP 412, Upper Level
PWC TITANIA NCSC (TBC) NCSC (TBC)
18:25 – 21:30 Informal Networking Evening SANS Institute: Networking Sponsor
This day culminates with activities centred around the spotlight stage. Delegates will hear specially selected thought provoking talks. This will be a prime time for networking within the exhibition and a chance to get involved in the conversations whilst enjoying food and refreshments.
21:30 CLOSE OF DAY ONE
AGENDA
16WWW.NCSC.GOV.UK/CYBERUK
*programme subject to change
17 18
DAY 3: CYBERUK IN PRACTICE THURSDAY 16 MARCH 2017
TIME ACTIVITY
09:15 – 09:55 Day 2 Delegate Registration – Exhibition & Refreshments
10:00 – 10:05 Plenary Session, 1A Upper LevelChair Opens Day TwoAlex Dewdney, Director for Engagement, NCSC
10:05 – 10:20 Plenary Session, 1A Upper LevelNCSC: 6 Months InFelicity, NCSC
10:20– 10:45 Plenary Session, 1A Upper LevelPanel SessionTo be facilitated by Alex Dewdney.
10:50 – 11.50 SESSION FOUR
STREAMSSESSION FOUR
STREAM 13A Upper Level
STREAM 23B, Upper Level
STREAM 311B&C, Upper Level
STREAM 412, Upper Level
MANAGING THREAT
PEOPLE ARE THE STRONGEST LINK
PROACTIVE DEFENCE SECURING AGILE DELIVERY
Cyber EssentialsThe NCSC will provide an update on the Cyber Essentials initiative.
Illustrated by a participant in the scheme, this session will describe changes to the standard. We will consider what it can be used for – and what it doesn’t do.
Focus On Methodology In this session, three leading academics will outline three diff erent,practical approaches for collecting data within organisations, and for having intelligent conversations about security.
Speakers: Lizzie Coles-Kemp, Royal Holloway University
David Snowden, Cognitive Edge
+1 additional speaker (TBC)
Detecting malicious behaviour in your organisationSo you’ve been compromised. How do we aggregate logging sources to detect strange behaviour and what can we derive from DNS information? Will include a case study of a real world example.
In Depth TalkThis is our off ering of 1 hour long slots that might appeal to the developer/ technical community, including those managing that community.
Speaker TBC
11.55 – 12:40 CYBERUK IN PRACTICE WORKSHOPS
WORKSHOP 13A Upper Level
WORKSHOP 23B, Upper Level
WORKSHOP 311B&C, Upper Level
WORKSHOP 412, Upper Level
FORESCOUT PALO ALTO NCSC (TBC) NCSC: ATTACK TREE WORKSHOP
12:40 – 14:10 Networking Lunch & Exhibition SANS Institute: Networking Sponsor
Lightning Talks on the Spotlight Stage
14:15 – 15:15 SESSION FIVE
STREAMSSESSION FIVE
STREAM 13A Upper Level
STREAM 23B, Upper Level
STREAM 311B&C, Upper Level
STREAM 412, Upper Level
MANAGING THREAT
PEOPLE ARE THE STRONGEST LINK
PROACTIVE DEFENCE SECURING AGILE DELIVERY
PSN Assurance ChangesMark Smith from the Cabinet Offi ce will discuss how PSN is changing and what users need to do diff erently.
CBEST / TBEST Speakers from the fi nance sector provide insights into these schemes and how they can help address complex threats.
Methodology Debate: “Help! What Should I Do Next?”This session will feature a lively debate on the pros and cons of diff erent techniques for engaging with staff , and when to use diff erent approaches.
Panellists: Lizzie Coles-Kemp, Royal Holloway
David Snowden, Cognitive Edge
+1 additional speaker TBC
Debunking Cloud MythsLet’s talk about common public cloud myths. Can a rogue admin get access to my data? Should I care about off shoring services?
Presentation by Amazon Web Service, followed by a Cloud panel session.
In Depth TalkThis is our off ering of 1 hour long slots that might appeal to the developer/ technical community, including those managing that community.
Speaker TBC
15:20 – 15:45 Closing Plenary Session, 1A Upper LevelDr Ian Levy, Technical Director, NCSCIncluding a direct response to questions and challenges captured throughout the event
16:00 CLOSE OF CYBERUK IN PRACTICE
AGENDA
18WWW.NCSC.GOV.UK/CYBERUK
*programme subject to change
19 20
HALL 2, LOWER LEVEL
*Floorplan may be subject to change
3A
3B
11B
LOWER LEVEL
UPPER LEVEL
11C
4A
4B12
1A
1B 1C
Main Plenary
Stream 1 Workshop 1
Stream 5 NCSC Strategy
Workshop
Stream 2 Workshop 2
CYBERUK 2017 Exhibition, Networking and Catering LOWER LEVEL
Conference Rooms UPPER LEVEL
CYBERUK 2017 Plenary & Stream sessions
Entrance & Registration The Galleria
Hall 2
Stream 3 Workshop 3
Stream 4 Workshop 4
*Floorplan may be subject to change
20
NETWORKING & EXHIBITION
PLENARY, STREAMS & WORKSHOPS
WWW.NCSC.GOV.UK/CYBERUK
21 22
Located on Liverpool’s iconic waterfront, the ACC is a world-class conference venue with excellent transport links. It is in close proximity to a wide range of high quality and good value hotel accommodation. This spacious venue provides an ideal home for the government’s biggest and most comprehensive event for IA and Cyber Security leaders and professional communities to date.
High speed internet access is provided free of charge throughout the venue.
Arena and Convention CentreKings Dock, Liverpool L3 4FP
22
VENUE INFORMATION
WWW.NCSC.GOV.UK/CYBERUK
23 24
TUESDAY 14 MARCH 2017 Government/Public Sector/Academia: FREE OF CHARGE
Industry/Private Sector (One Day Pass inc Networking Dinner): £899.00*
WEDNESDAY 15 AND THURSDAY 16 MARCH 2017 Government/Public Sector/Academia: FREE OF CHARGE
Industry/Private Sector (Two Day Pass): £499.00*
Government/Public Sector/Academia: please note that requests to attend both the Strategy and In Practice events are subject to availability and will be considered on a case-by-case basis based on suitability of role. Please contact the CYBERUK Event team [email protected] to express your interest in attending both events and include a business case.
FULL EVENT RATES* Industry/Private Sector – Full Conference Pass (Three Day Pass): £1,099.00
Industry/Private Sector – Exhibitor Pass (Three Day Pass): £300.00*please note fees do NOT include accommodation and all rates are exclusive of VAT.
24
DELEGATE FEES
WWW.NCSC.GOV.UK/CYBERUK
25 26
LEAD SPONSOR: LEAD SPONSOR: PAVILION
NETWORKING SPONSOR:
NETWORKING DINNER SPONSOR:
STRATEGY STREAM ONE SPONSOR:
STRATEGY STREAM TWO SPONSOR:
STRATEGY STREAM THREE SPONSOR:
STRATEGY STREAM FOUR SPONSOR:
IN PRACTICE STREAM ONE SPONSOR:
IN PRACTICE STREAM TWO SPONSOR:
IN PRACTICE STREAM THREE SPONSOR:
IN PRACTICE STREAM FOUR SPONSOR:
PREMIUM
EVENT PARTNERS
SME EXHIBITORS
STANDARD
GROUPCNS
INFORMATIONRISK MANAGEMENT
SPONSORS EXHIBITORS
26
SME INNOVATION ZONE SPONSOR:
STRATEGY & IN PRACTICE WORKSHOP SPONSOR:
STRATEGY WORKSHOP SPONSOR:
STRATEGY WORKSHOP SPONSOR:
STRATEGY WORKSHOP SPONSOR:
IN PRACTICE WORKSHOP SPONSOR:
IN PRACTICE WORKSHOP SPONSOR:
IN PRACTICE WORKSHOP SPONSOR:
DELEGATE BROCHURE SPONSOR:
CONFERENCE BAG SPONSOR:
MEETING SPACE SPONSOR:
WWW.NCSC.GOV.UK/CYBERUK