#


Share
Browse
CSP 17 Agenda

CSP events are a platform for open, stimulating and productive collaboration. In addition to some exciting plenary presentations, the 2017 agenda featured over 40 workshops, where delegates could join topical discussions led by thought-leaders, innovators and peers from across the cyber security professionals' community.

Various discussion papers were made available in advance - please see below.

Proceedings

Notes, audio recordings and slide decks are available to CSP:2017 attendees for many of the workshops. Please visit the attendee zone to download the proceedings.

Throughout the two days, CSP:2017 delegates heard from:
Trend Micro, The Cyber Policy Centre, The Turing Trust, Socitm, HMRC, Marmalade Box and UK Ministry of Defence (MoD)

Workshops were led by organisations including:
Army IAS, IISP, University of Manchester, University of Warwick, Land Information Assurance Group, The National Archives, Yorkshire & Humber Regional Cyber Crime Unit, Bond Dickinson, Alienvault, Bomgar, Clearswift, Forcepoint, Google Cloud, IBM, Synopsys, VMware and many more!

 

Agenda

 

Workshop Papers and Supporting Documents:

Note that not all workshops referenced or discussed a specific document and as such not all workshops are listed below - all workshops are on the agenda (see above.)

 

Day 1 Session 1

Workshop 1: Local Tactical Response to National Cyber Security Strategy by Mark Brett, Programme Director, NLAWARP
Report: Local Public Services Handling Data Handling Guidelines (fourth edition, revised January 2017)

Workshop 1: What I Learned from an Ugly, Crazy Robot by Bruce Thomson, ICT Security Manager, LB Hillingdon
Guidance Document: An easy to read quick guide to Digital Certificates, cipher orders and cipher suites - Bruce Thomson, Admin/Human at 1 Ugly Crazy Robot & Mark Brett, NLAWARP

Workshop 2: Cloud Security Principles
White Paper: Enabling Secure Information Exchange in Cloud Environments - a Nexor White Paper

Workshop 3: Cyber - Threat, Risk and Harm by DCI Vanessa Smith, Yorkshire & Humber Regional Cyber Crime Unit
Guidance Document: Guidance on Protecting your Business Pre and Post Cyber Attack

Workshop 4: Cognitive Hacking and Weaponised Information by Dr. Char Sample, Research Fellow ICF, US Army Research Laboratory and University of Warwick
Paper: Data Fidelity: Security's Soft Underbelly - Dr. Char Sample, Steve Hutchinson and Dr. Jennifer Cowley, ICF at The US Army Research Laboratory and Professor Tim Watson, Professor Carsten Maple and Bill Hallaq, Cyber Security Centre, University of Warwick

Workshop 5: The State of the Profession, by Amanda Finch, General Manager and Martyn Boston, Director, IISP
Report: Security Market Trends and Predictions from the 2016 IISP Industry Survey

Workshop 6: Government Security Compliance: Google's Approach by Philip Maurer, Public Sector Customer Engineer, Google Cloud
White Paper: Google's Approach to IT Security

Workshop 8: People Power by Dr. Danny Dresner, Academic Coordinator for Cyber Security, University of Manchester
Article: People Power

Day 1 Session 2

Workshop 2: Data Protection in a Cloud-First World by Neil Thacker, Deputy CISO, Forcepoint
White Paper: GDPR Compliance and its Impact on Security and Data Protection Programmes

Workshop 3: Active Defence in Cyber Security by Andy Taylor, Lead Assessor, APMG International
Report: Assessment of Cyber Security - CDAT (The Cyber Defence Capability Assessment Tool)   

Workshop 4: Securing Privileged Access Inside the Perimeter by Scott Walker, Solutions Engineer, Bomgar
Webcast: Securing Privileged Access Inside the Perimeter

Workshop 8: Turning GDPR from a Data Headache into an Information Opportunity by Jos Creese, Former CIO and Independent Digital Consultant, Veritas
White Paper: GDPR - a CIO Viewpoint

Day 1 Session 3

Workshop 7: The Meme War and Life in the Post-Truth Age by Noel Hannan, Major, Army Reserve, Land Information Assurance Group
Article: The Meme War and Life in the Post-Truth Age: The Truth is Out There

Workshop 8: Google Cloud Security: Under the Hood by Philip Maurer, Public Sector Customer Engineer, Google Cloud
Report: Cloud Service Security Principles - Response from Google

Day 1 Session 4

Workshop 2: Threats are Evolving. A new approach to Cyber Security is required by Richard Ferrier, Sales Engineer, LogRhythm
White Paper: The Threat Lifecycle Management Framework

Workshop 3: EU GDPR. A fast start to compliance by Dr. Guy Bunker, Senior Vice President - Products and Marketing, Clearswift
White Paper: Preparing for the EU GDPR

Workshop 4: Proactive Defence for the Digital Transformation by Julian Anderson, Sector Sales Manager, Thales e-Security
Video: Secure your AWS Instances with Vormetric Data Security Platform

Workshop 7: Excellence in the Essentials: real lessons learned in not just implementing foundational controls, but implementing them well, by Dave McKissick, Senior Systems Engineer, Tripwire
White Paper: PSN Code of Connection - GPG13 Compliance

Day 2 Session 1

Workshop 7: What's Making Compliance with EU GDPR so Problematic? by Alan Bentley, Regional Vice President EMEA Sales, Blancco
Research Study: EU GDPR: A Corporate Dilemma

Day 2 Session 2

Workshop 2: The Challenges of Teaching Cyber Security in Schools and Colleges
Article: The Challenges of Teaching Cyber Security in Schools and Colleges

Plenary Presentations

Presentation: Defence as a Platform – Secure Mobility and Cloud by Steve Latchem, Chief Architect and Head of Architecture, Information and System Services, Joint Forces Command, UK Ministry of Defence (MoD)
Paper: Defence as a Platform - Secure Mobility and Cloud

 

Back to main page

Find Out More

Get a Quote

Call Me Back

Enquiry Form