Predictive Security World - Predictive Technologies for Cybersecurity | September 24-26, 2018 – Marseille, France

Program

DAY 1 - Monday September 24 Afternoon

2.00pm – 6.30pm: Opening Session | 3.50pm – 4.30pm: Coffee & Refreshment Break – Networking – Exhibition

PLENARY GRAND OPENING
Connecting the World with the New Privacy Reality
Heaven or Hell?
Chaired by: Jon Shamah, Chair of EEMA ; Principal Consultant, EJ Consultants, UK

Common to the co-located conferences forming Smart Security Week, the Grand Opening will be addressing the global move to put the consumer and citizen back in control of their data at multiple levels (citizen ID, customer ID, IoT devices ID, social network ID etc.).

This non-technical plenary session will explore both the latest privacy and data protection initiatives –policies, regulations, standards…– and their related societal and economic challenges.

On stage, several keynotes from high-level representatives of the EU, US, international organizations and other countries, as well as private sector representatives.

Day 1
24 Sep 2018
Jon Shamah

The New Privacy Reality

Part 1 – The Impact on Service Providers
Day 1
24 Sep 2018
Orlando Scott-Cowley

Enhancing Privacy and Compliance in the Cloud with AWS

● Service providers perspective of helping customers deliver privacy and compliance in the cloud
● The mechanisms AWS offers its customers to help with their compliance programs and the GDPR

Dr. Detlef Houdeau

Progress report of European Cybersecurity Industry Leadership (ECIL) recommendation to EC

● Digital Sovereignty- as answer to the behavior of China and US
● Security Certification (in reflection of the Cybersecurity Act)
● Role of ENISA
● Further Harmonization in EEA
● Incident Shaping and Reporting
● Encryption – cooperation with law enforcement

PANEL: Is it the end of the information-based “mega $ corporate”?

While some IT companies are arguing that the very concept of privacy is dead in a digital world, public authorities are pushing new regulations to protect customers and citizens. Privacy enhancing techniques enable new data monetizationbusiness models while ensuring compliance to various data protection legislations.
- Can information based corporations survive with the new legislations?
- What responsibility will they gain or lose?
- What sort of business models?
- What models are emerging for blockchain identity management?
- Can self-sovereign and traditional hierarchical identity management schemes co-exist on the blockchain?
- Blockchains can break down silos and promote interoperability. However, there are different types of blockchains and it is not clear that they will interoperate. How do we avoid building a new world of siloed blockchain identity management systems?
- It is critical for users and developers to understand blockchain's decentralized trust models. What work is being done in this area and what needs to be done?
- How do blockchains impact privacy?
- Will standards in this area help? If so, what standards are needed?
With:
Martin Claich, Privacy Solution Consultant, OneTrust, UK
Mark Lizar, CEO & Founder, Open Consent, UK
Jon Shamah, Chair of EEMA
Martin Claich
Mark Lizar
Jon Shamah

Part 2 – The Impact on the Citizen and Digital Society
Day 1
24 Sep 2018
Slawomir Górniak

EU Cybersecurity Act (Title TBC)

PANEL: The eternal debate – privacy or security? CCTV, Cyberwars, Politics and GDPR

- What more can we do to protect the citizens and society from direct cyberthreats?
- How can we reduce the impact of privacy invading techs such as CCTV and cross-domain communications?
- How can governments maintain privacy while improving efficiency?
- What models are emerging for blockchain identity management?
- Can self-sovereign and traditional hierarchical identity management schemes co-exist on the blockchain?
- Blockchains can break down silos and promote interoperability. However, there are different types of blockchains and it is not clear that they will interoperate. How do we avoid building a new world of siloed blockchain identity management systems?
- It is critical for users and developers to understand blockchain's decentralized trust models. What work is being done in this area and what needs to be done?
- How do blockchains impact privacy?
- Will standards in this area help? If so, what standards are needed?
With:
Slawomir Górniak, Expert, Security Tools and Architecture Section, ENISA
Didier Serra, EVP, Sales & Marketing, SecureKey, Canada
Jon Shamah, Chair of EEMA
Oliver Väärtnõu, CEO, Cybernetica, Estonia
Slawomir Górniak
Didier Serra
Jon Shamah
Oliver Väärtnõu

Smart Security Week Innovation Live
2.00pm: Exhibition Opening

DAY 2 - Tuesday September 25

 
1.00 – 2.00pm: Lunch – Networking – Exhibition | 2.00 – 6.45pm: Break-out Sessions | 3.50 – 4.30pm: Coffee & Refreshments Break – Networking – Exhibition

Predictive Security Best Practices
Day 1
25 Sep 2018
Piotr Ciepiela

(Title TBC)

Josh Fu

Think Like a Bad Guy: An Introduction to Understanding the Why and How of an Attack and How to Prevent It

• Challenges the assumption that breaches cannot be prevented
• Provide real-world examples and benefits of how thinking like a bad guy saved their organization
• Step-by-step instructions on how they can protect their business better immediately
• How to address the scalability problem posed by IoT

Thierry Mennesson

Preparing for Cyber Defenses Mutualization in the Financial Sector

• Strategic perspectives new cyber-attacks typology in a transforming financial sector
• Outside-in view on market trends leading toward cyber defenses mutualisation as key resolution
• Presentation of strategic options for mutualizing cyber defenses and enable efficient synergies
• Proposal of a 3-step cyber-defenses mutualization roadmap for financial institutions until 2021

ML & AI to Mitigate Risk
Day 1
25 Sep 2018
Wes Connell

Detecting Phishing attacks with Supervised Machine Learning

• Application of supervised machine learning in information security
• Static rules versus predictive modeling
• Other information security problems
• Hands-on tools built and released from the author’s research

DAY 3 - Wednesday September 26

9.00 – 10.50am: Break-out Sessions | 10.50 – 11.20am: Coffee & Refreshments Break – Networking – Exhibition | 11.20am – 1.00pm: Break-out Sessions

Workshop – Part 1
 

Workshop – Part 2
 
1.00 – 2.00pm: Lunch – Networking – Exhibition | 2.00 – 4.30pm: Break-out Sessions

Session Chair: Dr. Ilesh Dattani, Director, Assentian, UK; advisor, e-forum – European Forum for e-Public Services
Day 1
26 Sep 2018
Ina Wanca

I, Human: Cognitive Cybercrime Prevention Tools in the Domain of Personal Digital Security

● How do users make decisions that can expose them to cyber-threats?
● Deep dive into the human and psychological factors of the insider threat.
● Detecting cognitive biases in human cybersecurity behavior: user behavior analytics.
● Can cognitive learning applications help online users to self-regulate their cybersecurity behavior?

Johanne Ulloa

Unleashing the Power of Digital Identity

● Breached identity information is changing the nature of global cybercrime
● Merchant-specific trends in global cybercrime
● Different approaches to protect against identity abuse and fraud attacks.

Dr. Ilesh Dattani

FINSEC: Protection of Critical Financial Infrastructure from Emerging and Future Cyber Threats

● Infrastructures of the financial sector are increasingly vulnerable to security attacks
● FINSEC EU project: Integrated Framework for Predictive and Collaborative Security of Financial Infrastructures
● Introducing a novel standards-based reference architecture for integrated (cyber & physical) security

Gerd Pflueger

VMware Appdefense – The Future of Application Security for Edge, Branch and DC

● Concept of “Goldilocks Zone” and “Ensuring Good”
● Difference to the established security solutions
● VMware AppDefense solution based on Hypervisor technology
● Usecases with NFV, IoT and EdgeComputing

Josh Fu

Artificial Intelligence: Impact on the World

• Artificial intelligence and machine learning are everywhere, but overused and misunderstood
• Learn about the history and subfields of AI and ML and how the tech applies to various industries
• AI is imperative to solving IoT scalability challenges from worker shortages and overwhelming malware creation