• Day 2 Session 2 Workshop 5
  • Day 2 Session 2 Workshop 6
  • Day 2 Session 2 Workshop 7

Day 2 Session 2 Workshop 5

Privacy, Encryption & Surveillance
James Morris, Founder, Cyber Policy Centre

Cyber challenges existing legal and societal assumptions privacy and identity. It raises the prospect that the conventional analogue markers of privacy and identity are now useless. It opens new debates about the right of citizens to use strong encryption, the right of citizens to deploy multiple identities and avatars, the right of citizens to obtain and deploy anonymity, and about the role of the state in the definition and authorisation of the identity of citizens.

The purpose of this workshop was to explore the themes of identity, privacy and surveillance and focus on the novel policy, legal and regulatory challenges posed in these areas by Cyber. It explored ways in which a positive contribution can be made to the formation of new and innovative expressions of the formal mechanics of the social contract in the information age.

To do this, the workshop attendees considered the following questions:
1. Should the UK government issue all UK citizens with a digital certificate and an accompanying public and private pair of cryptographic keys. This would then serve as the official state sanctioned marker of legal human identity? 2. Should the state create and operate the cyber equivalent of a national post office to enable the secure and trustworthy conduct of cyber communications?

  • This was an open floor discussion and as such a slide deck is not available
  • Request the audio recording of the discussion - please email
  • Download the Cyber Policy Centre (CPC) overview document, outlining what the CPC does and introducing its founders
  • Enjoy the latest fresh thinking from the CPC: Brexit and cyber

Back to Day 2

Day 2 Session 2 Workshop 6

The Legal Challenges of Cyber Security
Caroline Churchill, Partner (Solicitor), Bond Dickinson LLP

All industries are becoming increasingly digitalised. IT systems are becoming more and more interconnected. As a result, vast sums of data are being collected and processed by a variety of different stakeholders. Much of this data is very attractive to cyber criminals. If these IT systems and the data residing on them are not adequately protected, they will be vulnerable and open to attack.

Research suggests that IT systems are likely to contain vulnerabilities due to a number of factors. This could be through insufficiencies in the design and development of a system, how it is configured, maintained and protected from intrusion. The increase in the number and type of vulnerabilities is inevitable as many systems move away from bespoke standalone arrangements to open-platforms, often developed using off-the-shelf components. The connectivity of systems and devices to public and private networks leaves them exposed to the threat of cyber-attack. As digitalisation brings real benefits, this inevitably opens up greater risks of cyber-attack.

Caroline's session provided an overview of:

  • The real-world cyber threats, including examining the type of attacks (deliberate and non-deliberate
  • Data security under the new General Data Protection Regulation, which comes into force on 25 May 2018, briefly examining what the new compliance landscape will look like as well as the consequences of non-compliance
  • How to prepare for and respond to a cyber security incident, which is particularly topical following the attack on various organisations including a number of NHS trusts earlier this year. This involved examining the preventative measures which can be taken, issues to consider when reporting a data security breach and some case studies to highlight the importance of risk assessment, management and governance.

Photograph of Bond Dickinson workshop at CSP

Back to Day 2

Day 2 Session 2 Workshop 7

The Challenges of Teaching Cyber Security in Schools and Colleges
Richard Hind, Tutor of Digital Technologies, York College

This session was a discussion about what the main issues facing schools and college in teaching Cyber-Security are, and how can the industry best support the education sector to produce the Cyber-Security professionals of the future.

Back to Day 2

As Seen in CyberTalk! Link to article

Find Out More

Get a Quote

Call Me Back

Enquiry Form