ICE 2020 Logo

28-29 SEPTEMBER 2021
OLYMPIA LONDON

Product Innovation

Image

Product Innovation

International Cyber Expo                        International Security Expo

Loading
10:55
  1. Theatre 6
    20 mins
    • Product Innovation

    Company Intro

    Ultra slim profile shallow mount Anti-Terrorist bollards 

    Spring Steel Crash Rated  Street Furniture in the Public Realm

    Cost Effective, Large Perimeter HVM

11:20
  1. Theatre 6
    20 mins
    • Product Innovation

    Key learnings:

    • This talk first outlines the main problems traditional Network Detection & Response (NDR) solutions face: encrypted traffic, increasing network bandwidths and a shift towards distributed hybrid networks.
    • Then we show how an analytics approach that replaces traffic mirroring with specialized algorithms that reconstruct network activities from light-weight network log data copes with these challenges.
    • Further, we’ll show with practical examples why not only detection but also visibility, that is establishing a bird’s-eye view over the IT network, is crucial for an effective NDR approach.
11:45
  1. Theatre 6
    20 mins
    • Product Innovation

    Key learnings:

    • As drones become more affordable and accessible, new threats appear
    • Drones are now playing an active role in various international conflicts
    • In this session, we will:
      • Take a closer look at this new phenomenon
      • Discuss different solutions and approaches
12:10
  1. Theatre 6
    20 mins
    • Product Innovation

    Key learnings:

    • What cloud and edge computing means for the security sector (conceptual model) and what are the benefits of using it?
    • Threat Modelling Analysis – What are the key threat agents that affect edge computing ecosystem, the natural risks that this type of products may be vulnerable to and the related cyber threats?
    • How can information security assessments help improve the resilience of this ecosystem? By providing full visibility of their risk posture, helping them integrate innovation in cybersecurity and show them the opportunities for improvement in order to maintain the confidentiality, integrity, and availability of data and operations.
    • Examples from previous work we have done that are relevant and applicable to this sector.

     

12:35
  1. Theatre 6
    20 mins
    • Product Innovation
    Key learnings: The emerging drone threat: smuggling, espionage, attack and beyond. State of the art sensors to monitor, detect, track, classify and alert of drone intrusions. Use case: securing skies ...
12:55
  1. Theatre 6
    20 mins
    • Product Innovation
    • How to deliver operational efficiency without compromising physical security
    • Managing the rush to Keyless technology
    • Minimum standards for Critical Infrastructure
13:20
  1. Theatre 6
    20 mins
    • Product Innovation

    Risk Quantification can be both an enticing and intimidating exercise for a business to pursue. How does an organization get from point A to point B (and back again) to score and value risk? In this webinar, we'll take a back-to-basics approach to break down the concept of risk, contrast this understanding with some of the modern applications of risk in business, and discuss how people across your organization may interpret the meaning of risk. We'll diagnose some of the common pitfalls companies fall into and identify perspectives to help account for variables that do not have defined parameters when understanding risk.  

      

     

13:45
  1. Theatre 6
    20 mins
    • Product Innovation

    Safeguarding people, venues and infrastructure in a Digitally transforming Post-Covid world

14:10
  1. Theatre 6
    20 mins
    • Product Innovation
    • The changing workplace - an IT-Security threat
    • The art of visual hacking
    • Effects of visual hacking on your organisation
    • How best to protect your data from visual hackers
14:35
  1. Theatre 6
    20 mins
    • Product Innovation

    Key learnings:

    • How to bring a synergy to IT operations and security departments.
    • How to tackle cost reduction in resource and training requirements.
    • How to reduce your portfolio of point products yet still achieve the same results.
14:55
  1. Theatre 6
    20 mins
    • Product Innovation

    Physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. Operations also continue to grow, involving more systems, more data, and many more users. In this session learn how the Police and London Underground are using PSIM to connect disparate security systems, devices, and sensors into a common operating picture that provides visibility and control “inside the perimeter” to enable faster response to critical events.

15:45
  1. Theatre 6
    20 mins
    • Product Innovation
    • The need for a next gen cybersecurity approach to ransomware and malware attacks.
    • How Votiro Secure File Gateway disarms undisclosed and disclosed ransomware, malware and zero-day attacks.
    • Case study - Real time email and other file gateway protection without business disruption.
    • Votiro + SureDrop for secure encrypted remote worker file sharing and collaboration.
16:10
  1. Theatre 6
    20 mins
    • Product Innovation

    This session will present concepts and solutions for different approaches to contend with the emerging threat of rogue drones in sensitive and challenging environments.

    • Traditional Technologies Are Insufficient – while traditional c-UAS technologies, based on radar, jamming, and/or kinetic mitigation certainly have had an impressive record of success and will continue to play a role in multi-layered defense strategies, these methods also have drawbacks, which render them less suitable for sensitive and challenging environments, due to the high risks of collateral damage, and interference and disturbance to communications, commerce, transportation, and the continuity of everyday life.
    • Cyber-Takeover, Counter-Drone Technology Offers Many Advantages – emerging drone challenges require different counter-drone solutions, with innovative approaches based on key counter-drone concepts: control, safety, focus and future-readiness.
    • Best Practices & Actionable Insights – the session will cover approaches to safely neutralize the most dangerous drone threats of today and tomorrow, and enabling the safest possible outcome of a rogue drone incident, in any environment or scenario, ultimately ensuring the seamless continuity of everyday life.
17:00
  1. 90 mins
    • Product Innovation
10:05
  1. Theatre 6
    20 mins
    • Product Innovation

    This talk will introduce the Attack Tree methodology and explain how Attack Tree diagrams are constructed.

    It will discuss how attack paths are identified using based on the logic of the Attack Tree diagram.

    It will demonstrate how the likelihood of each attack path may be estimated based on the obstacles faced by the attacker.

10:30
  1. Theatre 6
    20 mins
    • Product Innovation
    Password policies that are inadequate for modern account protection
    Accounts with elevated privileges in place that haven't been adequately reviewed
    Accounts with delegated permissions over Active Directory that have unwanted consequences on AD security that have proliferated over time
    Weak Group Policy configuration, which creates a variety of holes that attackers can drive through
10:55
  1. Theatre 6
    20 mins
    • Product Innovation

    Understanding what your network’s technology is doing vs what it is intended to do

    How digital transformation can sometimes increase complexity, exacerbating information security issues

    How a systemic approach reduces the knowledge gap for key decisionmakers through practical changes

11:20
  1. Theatre 6
    20 mins
    • Product Innovation

    Key learnings:

    • 5G and Time Sensitive Networking (TSN) are key enablers for Industry 4.0 innovation
    • Traditional security solutions and approaches introduce latency, which inhibit the benefits of these technologies
    • Leonardo’s cyber resilience approach delivers appropriate security posture and achieves the benefits of TSN
11:45
  1. Theatre 6
    20 mins
    • Product Innovation
    There is a new standard, EN17646 relating to encryption of data/entry credentials to remote enabled Safe locking
    Safe Locking Standard EN1300 Vs prEN17646
    In operational practice – what is best?
12:10
  1. Theatre 6
    20 mins
    • Product Innovation

    The Defence and Security Accelerator (DASA) have been instrumental in supporting innovators develop novel ideas to enhance the UK security 

    • In this session, DASA will provide an overview of:
    • Our two core funding mechanisms of Themed Competitions and the Open Call for Innovation
    • DASA mentoring and supplier support services
    • The new Security Rapid Impact Innovations Open Call, a cross-government competition that focuses on tackling challenges across the UK security landscape.
    • Find out more about how you can get involved, what the benefits of working with DASA are, and understand how your innovation could support the UK security sector.
12:35
  1. Theatre 6
    15 mins
    • Product Innovation

    Company Intro

    Ultra slim profile shallow mount Anti-Terrorist bollards 

    Spring Steel Crash Rated  Street Furniture in the Public Realm

    Cost Effective, Large Perimeter HVM

12:55
  1. Theatre 6
    20 mins
    • Product Innovation

    CEM CertificationTM provides an organization’s employees, customers, and stakeholders with the confidence their company stands at the forefront of digital transformation and operates from a position of enterprise-wide resilience.

    Global organisations including Discover, Goldman Sachs, NBCUniversal, Dow and Alexion have already earned 'Best in Enterprise ResilienceTM' designation through rigorous CEM CertificationTM benchmarking.

13:20
  1. Theatre 6
    20 mins
    • Product Innovation
    • Partnership between Corps Security & MoonHub
    • The Offering / Capabilities (Demo)
    • Partnership Security Modules
    • Linking in with all facets of organisations
13:45
  1. Theatre 6
    20 mins
    • Product Innovation

    Security cannot be done in a silo. The extent and nature of data shared across line of business functions both internally and externally fuels instances of system and organizational vulnerabilities. GRC must transcend the traditional lines of defense specifically risk managers and audit professionals. In this webinar we'll discuss roles and responsivities of effective risk management practices. What can businesses do to better align key stakeholders? How can businesses incorporate Security by Design process and practices and where can technology support with structured data sets and automation?   

     

14:10
  1. Theatre 6
    20 mins
    • Product Innovation
    • How to protect critical assets through systematic, proactive threat intel.
    • What tools and information you need before you can start planning for threat hunting.
    • How to set priorities and build a threat-hunting road map.
    • The five steps involved in a threat hunt and how to perform them effectively.
    • How you can make the most of the information you gather through threat hunting.
14:35
  1. Theatre 6
    20 mins
    • Product Innovation
    • how cyber-defenders can continue to acquire and hone their skills entirely through a browser but still in a hands-on fashion.
    • …how they can learn essential real-world skills, in real networks and real VMs. From security operations to forensics to secure DevOps, modules cover a breadth of mission-critical topics.
    • …how users learn to defend against advanced attacks, quickly recognise and fix vulnerabilities and develop muscle memory in how best to react when it happens in the real world.
    • …how actionable insights and metrics about performance and skill levels of team members can help identify the cybersecurity superstars, both already in your organisation and amongst those that may want to join.
    • …how a combination of self-paced learning together with pressurised group exercises is the best way to prepare your teams for every eventuality – at a fraction of the cost of traditional learning.