Royal Holloway, University of London ISG Alumni Reunion Conference 25th - 27th June 2012 Programme Registration, all lectures, tea, coffee and meals will be in the Windsor Building, with the exception of the conference dinner on Monday 25th and the evening dinner on Tuesday 26th which will be in the Picture Gallery. Monday 25th June 2012 Registration: 9:00–10:00 Session 1: Security Education (10:00–11:00): Session Chair (Konstantinos Markantonakis) 10:00-10:10 10:10-10:20 10:20-10:30 10:30-11:00 Fred Piper (ISG): Opening remarks Chez Ciechanowicz (ISG): The RHUL Information Security Masters Degree Zoheir Iftikhar (Deloitte) and Anish Mohammed (Accenture): ISG London Alumni Chapter update Keith Martin (ISG): Engaging Further! Morning coffee: 11:00–11:30 Session 2: Risk Management and Cloud Computing (11:30–13:00): Session Chair (Lorenzo Cavallaro) 11:30-12:00 12:00-12:30 12:30-13:00 Ian D. McKinnon (Logica): HMG Risk Management – Systems Accreditation Mark Battersby (Capgemini): The Risks, Benefits and Information Security Issues with Cloud Computing Stephen Barnett (MLE Consulting Ltd): Assuring telecoms services used by the UK public sector Lunch: 13:00–14:00 Session 3: Information Assurance and Critical Infrastructures (14:00–15:30): Session Chair (Chez Ciechanowicz) 14:00-14:30 14:30-15:00 15:00-15:30 Eirik Thormodsrud (Ernst & Young Norway): Penetration testing - a step beyond missing patches and weak passwords Joe Hancock (BAE Systems Detica): SCADA, Smart Meters and the Critical National Infrastructure Adrian Culley (Access Data): The Three Dimensions of Data: What they are, and what this means for Information Security and Digital Investigations Afternoon tea: 15:30–16:00 Session 4: National Infrastructures and Embedded Systems (16:00–17:00): Session Chair (Keith Martin) 16:00-16:30 16:30-17:00 David Alexander (Regency IT Consulting): Security Architectures for Industrial Control Systems Konstantinos Markantonakis (ISG): Embedded System Security Short break: 17:00–17:30 Session 5: Invited Speaker (17:30–18:30): Session Chair (Keith Martin) Dr Alistair MacWillson (Accenture Technology Consulting): The Future of Security - responding to what is ahead Evening meal: 19:30 Picture Gallery Tuesday 26th June 2012 Session 6: Security Management Compliance and Technologies (9:30–11:00): Session Chair (Lorenzo Cavallaro) 9:30-10:00 Harry Bains (Euroclear SA/NV): Security architecture - a practical case study 10:00-10:30 George Patsis (Obrela Security Industries): Corporate Information Security Intelligence - Integrating People, Process and Technology Alexander (Baba) Akinjayeju (Verizon Enterprise Solution): Information security in today's enterprise 10:30-11:00 Morning coffee: 11:00–11:30 Session 7: Cryptography and Access Control (11:30–13:00): Session Chair (Dusko Pavlovic) 11:30-12:00 12:00-12:30 12:30-13:00 Kenny Paterson (ISG): TLS Security - where do we stand? Liaquat Khan (Ascertia Limited): Creating long-term digital signatures on an iPad Nick Humphrey (Tier 3): Mandatory access controls and intelligent logging - Razor wire to entangle zero-day attacks Lunch: 13:00–14:00 Session 8: Security Management and Human Factors (14:00–15:30): Session Chair (Chris Mitchell) 14:00-14:30 14:30-15:00 15:00-15:30 Geordie Stewart (Risk Intelligence Ltd): Death by a thousand facts - Criticising the technocratic approach to information security awareness Andrew Lee-Thorp (Cigital): BSIMM - the Building Security In Maturity Model Lizzie Coles-Kemp (ISG): Liminal spaces: Places at the threshold of security's consciousness Afternoon tea: 15:30–16:00 Session 9: Security Experiences (16:00–17:00): Session Chair (Dusko Pavlovic) 16:00-16:30 16:30-17:00 Taewan Park (JS Security Co): Information security of IACS (Industrial Automation and Control System) Case study: information security of car manufacturing environments using Robots. Piers Wilson (PricewaterhouseCoopers): Current trends or sweeping changes Short break: 17:00–17:30 Session 10: Invited Speaker (17:30–18:30): Session Chair (Chris Mitchell) Professor Whitfield Diffie (Chief Cryptographer, Revere Security, and VP for Information Security at ICANN): Turning Points in Cryptography Evening meal: 19:30 Picture Gallery Wednesday 27th June 2012 Session 11: Network Security (10:00–11:00) : Session Chair (Jason Crampton) 9:30-10:00 10:00-10:30 10:30-11:00 David Stubley (7Elements): Network Forensics and Incident Response. Thinking outside the box Christiaan Ehlers (Akamai): Web targeted DDos attack: trends, tools and tactics Audun Jøsang (University of Oslo - UNIK): User-Centric Identity Management Morning coffee: 11:00–11:30 Session 12: Strategic Aspects of Security (11:30–12:40): Session Chair (Keith Mayes) 11:30-12:00 12:00-12:30 12:30-12:40 John Ruck (BAE Systems, Detica): Can cats be made secure? Delivering Information Security into complex environments Mohammed Ruwaid Zumla: What is best ever practice and how do you taper it? Six months at London 2012 will bring you up to speed Chez Ciechanowicz (ISG): Closing remarks Lunch: 12:40–14:00