Agenda
- Jump to:
- At a Glance
- Day 1
- Day 2
- Add-Ons
- Print-friendly Format
Day 1 - Tuesday, May 23, 2017
8:30 |
Registration |
9:00 |
Chair’s Opening Remarks |
9:10 |
Keynote |
9:40 |
General Data Protection Regulation — What This Will Mean for a BREXITing Britain |
10:20 |
ICO Expectations & Role |
10:50 |
Refreshment Break |
11:00 |
Refreshment Break |
11:30 |
National Cyber Security Centre — The Best Defence is a Good Offence |
12:00 |
Cops and Robbers: Involving Law Enforcement |
12:10 |
Good Governance — The Fiduciary Duty Owed By Directors and Officers to the Shareholders |
12:50 |
Lunch |
2:05 |
The Role of Cyber Insurance |
2:45 |
Incident Response Plan — Time is Not Your Friend |
3:25 |
Putting Together an Incident Response Team — A Layered and Comprehensive Approach |
4:05 |
Refreshment Break |
4:35 |
Developing Crisis Management Solutions |
5:15 |
Forensic Investigation and Gathering Evidence |
5:55 |
Chair’s Summation |
6:05 |
Drinks Reception |
Day 2 - Wednesday, May 24, 2017
8:30 |
Morning Refreshments |
9:00 |
Chair’s Opening Remarks |
9:10 |
Keynote — Overview |
9:30 |
Reputational Risk |
10:10 |
Stress Testing Incident Response Plans — Being Prepared for the Worst |
11:20 |
Dealing with Breaches in the Supply Chain |
12:40 |
Lunch |
1:55 |
Civil & Criminal Remedies and Effectiveness |
2:35 |
International Elements to a Cybercrime — Hypothetical Case Study |
3:15 |
Strategies for Prevention |
3:55 |
Refreshment Break |
4:35 |
Civil Action Against the Breached — Minimise Your Exposure to Civil Claims |
5:15 |
Chair’s Summation |
Post-Conference Workshop
Cyber Incident Response Plan: Discovering and Recovering from a Cyber Attack
May 25, 2017 9:00am – 12:00pm
Day 1 - Tuesday, May 23, 2017
8:30 |
Registration |
9:00 |
Chair’s Opening RemarksRichard Magnan |
9:10 |
KeynoteFreddy Dezeure |
9:40 |
General Data Protection Regulation — What This Will Mean for a BREXITing BritainRenzo Marchini
|
10:20 |
ICO Expectations & Role
|
10:50 |
Refreshment Break |
11:00 |
Refreshment Break |
11:30 |
National Cyber Security Centre — The Best Defence is a Good OffenceRichard Magnan
|
12:00 |
Cops and Robbers: Involving Law EnforcementSpeaker TBC Jason Tunn
|
12:10 |
Good Governance — The Fiduciary Duty Owed By Directors and Officers to the ShareholdersGary Broadfield
|
12:50 |
Lunch |
2:05 |
The Role of Cyber Insurance
|
2:45 |
Incident Response Plan — Time is Not Your FriendIan Bryant Avi Weisman
|
3:25 |
Putting Together an Incident Response Team — A Layered and Comprehensive ApproachOisín Fouere
|
4:05 |
Refreshment Break |
4:35 |
Developing Crisis Management SolutionsSimon Fisher
|
5:15 |
Forensic Investigation and Gathering EvidenceGiuseppe Vaciago
|
5:55 |
Chair’s Summation |
6:05 |
Drinks Reception |
Day 2 - Wednesday, May 24, 2017
8:30 |
Morning Refreshments |
9:00 |
Chair’s Opening Remarks |
9:10 |
Keynote — OverviewMonty Raphael QC |
9:30 |
Reputational RiskAndrea Cremonino
|
10:10 |
Stress Testing Incident Response Plans — Being Prepared for the WorstChris Parker MBE
|
11:20 |
Dealing with Breaches in the Supply Chain
|
12:40 |
Lunch |
1:55 |
Civil & Criminal Remedies and EffectivenessMonty Raphael QC
|
2:35 |
International Elements to a Cybercrime — Hypothetical Case Study
|
3:15 |
Strategies for Prevention |
3:55 |
Refreshment Break |
4:35 |
Civil Action Against the Breached — Minimise Your Exposure to Civil Claims
|
5:15 |
Chair’s Summation |
Cyber Incident Response Plan: Discovering and Recovering from a Cyber Attack
What is it about?
Organisations may have response plans in place but often many cannot be operationalised. In many cases the documentation outlining procedure post-breach is outdated or too general, offering non-specific guidance on critical activities. Furthermore, key factors such as lack of integration across different business units, the development of siloed strategies and lack of coordination during large response efforts contribute towards an ineffective and ultimately costly response.
A response should therefore be guided by a plan that aims to not only to limit damage while reducing recovery time and costs but also manages the expectations and increase the confidence of external stakeholders.
Attending this workshop will enable you to:
- Create an effective incident response plan that is immediately operational
- Learn the latest techniques used in incident response
- Establish how to assign responsibility for the plan and ensure integration of the incident-response efforts across business units and geographies
- Ensure that response plan documentation is regularly updated widely available
- Ensure that the plan is communicated to all employees and that they are aware of their roles and responsibilities
- Establish how hackers use pre-attack research, reconnaissance and target selection to infiltrate businesses and how you can use that knowledge to strengthen your defences
- Understand infiltration and post-infiltration entrenchment
- Benchmark cyber attack scenarios and develop easily accessible quick-response guides for defined scenarios
- Maintain relationships with law enforcement
- Maintain relationships with external breach-remediation providers and experts
- Establish how to deal with media interviews and queries as well as other media & PR skills that will help not hinder
- Understand the business impacts of cyber breaches facilitated through a discussion of recent cyber attacks
- Regularly practice, probe and stress test the to increase awareness of ‘blind spots’ and hone response capabilities