Royal Holloway, University of London ISG Alumni Reunion Conference Programme 25

advertisement
Royal Holloway, University of London
ISG Alumni Reunion Conference
25th - 27th June 2012
Programme
Registration, all lectures, tea, coffee and meals will be in the Windsor Building, with the exception of the conference
dinner on Monday 25th and the evening dinner on Tuesday 26th which will be in the Picture Gallery.
Monday 25th June 2012
Registration: 9:00–10:00
Session 1: Security Education (10:00–11:00): Session Chair (Konstantinos Markantonakis)
10:00-10:10
10:10-10:20
10:20-10:30
10:30-11:00
Fred Piper (ISG): Opening remarks
Chez Ciechanowicz (ISG): The RHUL Information Security Masters Degree
Zoheir Iftikhar (Deloitte) and Anish Mohammed (Accenture): ISG London Alumni Chapter update
Keith Martin (ISG): Engaging Further!
Morning coffee: 11:00–11:30
Session 2: Risk Management and Cloud Computing (11:30–13:00): Session Chair (Lorenzo
Cavallaro)
11:30-12:00
12:00-12:30
12:30-13:00
Ian D. McKinnon (Logica): HMG Risk Management – Systems Accreditation
Mark Battersby (Capgemini): The Risks, Benefits and Information Security Issues with Cloud
Computing
Stephen Barnett (MLE Consulting Ltd): Assuring telecoms services used by the UK public sector
Lunch: 13:00–14:00
Session 3: Information Assurance and Critical Infrastructures (14:00–15:30): Session Chair
(Chez Ciechanowicz)
14:00-14:30
14:30-15:00
15:00-15:30
Eirik Thormodsrud (Ernst & Young Norway): Penetration testing - a step beyond missing patches and
weak passwords
Joe Hancock (BAE Systems Detica): SCADA, Smart Meters and the Critical National Infrastructure
Adrian Culley (Access Data): The Three Dimensions of Data: What they are, and what this means for
Information Security and Digital Investigations
Afternoon tea: 15:30–16:00
Session 4: National Infrastructures and Embedded Systems (16:00–17:00): Session Chair
(Keith Martin)
16:00-16:30
16:30-17:00
David Alexander (Regency IT Consulting): Security Architectures for Industrial Control Systems
Konstantinos Markantonakis (ISG): Embedded System Security
Short break: 17:00–17:30
Session 5: Invited Speaker (17:30–18:30): Session Chair (Keith Martin)
Dr Alistair MacWillson (Accenture Technology Consulting):
The Future of Security - responding to what is ahead
Evening meal: 19:30 Picture Gallery
Tuesday 26th June 2012
Session 6: Security Management Compliance and Technologies (9:30–11:00): Session Chair
(Lorenzo Cavallaro)
9:30-10:00
Harry Bains (Euroclear SA/NV): Security architecture - a practical case study
10:00-10:30
George Patsis (Obrela Security Industries): Corporate Information Security Intelligence - Integrating
People, Process and Technology
Alexander (Baba) Akinjayeju (Verizon Enterprise Solution): Information security in today's
enterprise
10:30-11:00
Morning coffee: 11:00–11:30
Session 7: Cryptography and Access Control (11:30–13:00): Session Chair (Dusko Pavlovic)
11:30-12:00
12:00-12:30
12:30-13:00
Kenny Paterson (ISG): TLS Security - where do we stand?
Liaquat Khan (Ascertia Limited): Creating long-term digital signatures on an iPad
Nick Humphrey (Tier 3): Mandatory access controls and intelligent logging - Razor wire to entangle
zero-day attacks
Lunch: 13:00–14:00
Session 8: Security Management and Human Factors (14:00–15:30): Session Chair (Chris
Mitchell)
14:00-14:30
14:30-15:00
15:00-15:30
Geordie Stewart (Risk Intelligence Ltd): Death by a thousand facts - Criticising the technocratic
approach to information security awareness
Andrew Lee-Thorp (Cigital): BSIMM - the Building Security In Maturity Model
Lizzie Coles-Kemp (ISG): Liminal spaces: Places at the threshold of security's consciousness
Afternoon tea: 15:30–16:00
Session 9: Security Experiences (16:00–17:00): Session Chair (Dusko Pavlovic)
16:00-16:30
16:30-17:00
Taewan Park (JS Security Co): Information security of IACS (Industrial Automation and Control
System) Case study: information security of car manufacturing environments using Robots.
Piers Wilson (PricewaterhouseCoopers): Current trends or sweeping changes
Short break: 17:00–17:30
Session 10: Invited Speaker (17:30–18:30): Session Chair (Chris Mitchell)
Professor Whitfield Diffie (Chief Cryptographer, Revere Security, and VP for Information Security at ICANN):
Turning Points in Cryptography
Evening meal: 19:30 Picture Gallery
Wednesday 27th June 2012
Session 11: Network Security (10:00–11:00) : Session Chair (Jason Crampton)
9:30-10:00
10:00-10:30
10:30-11:00
David Stubley (7Elements): Network Forensics and Incident Response. Thinking outside the box
Christiaan Ehlers (Akamai): Web targeted DDos attack: trends, tools and tactics
Audun Jøsang (University of Oslo - UNIK): User-Centric Identity Management
Morning coffee: 11:00–11:30
Session 12: Strategic Aspects of Security (11:30–12:40): Session Chair (Keith Mayes)
11:30-12:00
12:00-12:30
12:30-12:40
John Ruck (BAE Systems, Detica): Can cats be made secure? Delivering Information Security into
complex environments
Mohammed Ruwaid Zumla: What is best ever practice and how do you taper it? Six months at London
2012 will bring you up to speed
Chez Ciechanowicz (ISG): Closing remarks
Lunch: 12:40–14:00
Download