Day 2 - 1 December 2023
10:00AM
(GMT)
Ayman El Hajjar
Senior Lecturer and Head of Cyber Security Research Group
University of Westminster

10:00AM - Day 2
View Chairpersons Welcome
Chairpersons Welcome
10:15AM
(GMT)
Oluwatobi Mohammed
Cyber Security Application Specialist
Motability Operations Ltd

10:15AM - Day 2
View Presentation: Examining the current IoT security landscape
Presentation: Examining the current IoT security landscape
- Assessing current measures being used to protect your organization.
- Understanding the key challenges to secure IoT Devices.
- The importance of building valid security models for IoT.
10:50AM
(GMT)
Richard Moser
Business Development Manager
LEGIC

10:50AM - Day 2
View Presentation: Supply chain and IoT security management
Presentation: Supply chain and IoT security management
- The integration of IoT into the supply chain promises to revolutionize industries, fostering a new era of efficiency, cost-effectiveness, and customer satisfaction. Despite its numerous advantages, the adoption of IoT in the supply chain also presents challenges. In this presentation we want to highlight the challenges of IoT supply chain and how we can tackle them using our technology.
– Challenges of Supply chains
– How can technology support IoT Security
– What is LEGIC?
– Introduction LEGIC technology
– Success stories / Ongoing projects
11:25AM
(GMT)
Gerald Pfeifer
Chief Technology Officer
SUSE

11:25AM - Day 2
View Presentation: On the edge of a revolution: IT and OT convergence
Presentation: On the edge of a revolution: IT and OT convergence
The rapid convergence of IT and OT unleashes a creative force that powers new business models, accelerates innovation, and drives a continuum of compute and data across core, cloud, and edge. At the same time, the scale, security, and management complexity of IT:OT convergence requires a fresh approach for sustainable operations.
This session will explore:
* Automating intelligently to manage an expanding compute and data continuum
* The explosion of machine-to-machine connection and collaboration
* Unifying data at the edge for faster analysis and better outcomes
* Protecting data at rest, in motion, and in use
11:45AM
Networking Break
12:00PM
(GMT)
Ayman El Hajjar
Senior Lecturer and Head of Cyber Security Research Group
University of Westminster

10:00AM - Day 2
View Chairpersons Welcome
Kirsty Kelly
Global CISO
Beazley

12:00PM - Day 2
View Panel: Building a robust cyber security strategy, an IoT perspective
Rhys Oxenham
Senior Director, Field Product Management & Engineering - Edge
SUSE

12:00PM - Day 2
View Panel: Building a robust cyber security strategy, an IoT perspective
Pragya Madaan
Software Engineer
The Hut Group

12:00PM - Day 2
View Panel: Building a robust cyber security strategy, an IoT perspective
Anubhav Banerjee
Chief Technology Officer
Allianz

12:00PM - Day 2
View Panel: Building a robust cyber security strategy, an IoT perspective
Panel: Building a robust cyber security strategy, an IoT perspective
- Keeping security at the forefront when developing and deploying IoT innovations and digital solutions.
- Governance, regulation and standards – the need for consistency across industries for what is required/ expected from a cyber perspective.
- Finding the best connectivity to optimise solutions and infrastructures – not a one size fits all approach.
- Strategies for the future – keeping control of systems and devices long term by discussing product lifecycles.
12:45PM
(GMT)
Ciaran Martin
Chairman
CyberCX UK

12:45PM - Day 2
View Presentation: Cyber Security: Lessons from 2023 and look ahead to 2024
Presentation: Cyber Security: Lessons from 2023 and look ahead to 2024
01:15PM
Lunch Break
02:15PM
(GMT)
Ayman El Hajjar
Senior Lecturer and Head of Cyber Security Research Group
University of Westminster

10:00AM - Day 2
View Chairpersons Welcome
Tom Burke
Technical Solutions Manager
Kigen

02:15PM - Day 2
View Panel: The ins and outs of device security
Thomas Birchler
Product Manager
LEGIC

02:15PM - Day 2
View Panel: The ins and outs of device security
Tony Proctor
Security & Information Risk Adviser
West Midlands Combined Authority

02:15PM - Day 2
View Panel: The ins and outs of device security
Panel: The ins and outs of device security
- How does the sheer diversity of IoT devices provide challenges to security teams?
- Understanding the risks associated with the management of IoT devices by disparate teams within the organization.
- Which IoT devices have the highest share of security issues and what makes them so susceptible to these issues?
03:00PM
(GMT)
Patrick Maw
Medical Device Integration and Cyber Security
University College London Hospitals NHS Foundation Trust

03:00PM - Day 2
View Presentation: Keeping patients safe – The role of connected medical devices
Presentation: Keeping patients safe – The role of connected medical devices
- The cyber risks associated with securing smart medical devices.
- What operational insights should healthcare providers understand when implementing IoT security?
- Examining different medical device security solutions.