TEISS 2015: Andrzej Kawalec

CTO, Enterprise Security Services, HP

Andrzej Kawalec explains what is meant by the adversary kill chain and those who it has has affected in recent years.
Event Host: Shane Richmond

Information Security 2014: Sarah Lawson

Head of IT and Information Security, Oxford University

Making information security learning effective:
- online training
- face to face or value

Event Host: Jon Bentley

Information Security 2014: Ed Tucker

Head of Cyber Security and Response, HRMC

Most important transformation at HRMC?
- bring the business together
- based on the customer's needs

Event Host: Jon Bentley

Information Security 2014: Yuval Moss

Director of Professional Services, CyberArk

Detection of a cyber attack
- individual behaviour
- base line settings

Event Host: Jon Bentley

Information Security 2014: Justin Somaini

Chief Trust Officer, Box.com

- Ability to implement
- Ability to engage
- Incorporation of security

Event Host: Jon Bentley

Information Security 2014: Peter Clarke

CTO, Isle of Man Government

How do you get the right staff?
- training
- patience and effort

Event Host: Jon Bentley

Information Security 2014: Professor Paul Jeffreys

Director of IT, Oxford University

How do you get people to follow the rules?
- ask a lot of advice
- sessions organised to help

Event Host: Jon Bentley

Information Security 2014: Martyn Croft

CIO, The Salvation Army

Establish trust between two parties:
- inception of cryptography
-

Event Host: Jon Bentley

Information Security 2014: Ed Tucker

Head of Cyber Security and Response, HRMC

Are you becoming more agile?
-
-

Event Host: Jon Bentley

Information Security 2014: Peter Clarke

CTO, Isle of Man Government

Do CTOs have enough influence within their businesses? -


Event Host: Jon Bentley

Information Security 2014: Martyn Croft

CIO, The Salvation Army

Difference between corporate and personal computing: same machines, different behaviour.

Event Host: Jon Bentley

Information Security 2014: Professor Paul Jeffreys

Director of IT, Oxford University

Do security experts over-complicate issues?
- the way people speak
- the way experts speak

Event Host: Jon Bentley

Information Security 2014: Andrzej Kawalec

Chief Technologist, HP

How many people were involved in the biggest cyber attack?
-

Event Host: Jon Bentley

Information Security 2014: Andrzej Kawalec

Chief Technologist, HP

Recents cyber criminality examples:
- the cash machine
- drug & cyber: crime association

Event Host: Jon Bentley

Information Security 2014: Andrzej Kawalec

Chief Technologist, HP

The biggest challenges in tackling cyber crime:
- recognition of the threat
- staying ahead

Event Host: Jon Bentley

Information Security 2014: Andrzej Kawalec

Chief Technologist, HP

Closing the gap between cyber security experts and criminal
-

Event Host: Jon Bentley

Information Security 2014: Yuval Moss

Director of Professional Services, CyberArk

What are the best methods for protecting a business against cyber attacks?
-

Event Host: Jon Bentley

Information Security 2014: Yuval Moss

Director of Professional Services, CyberArk

Sources of cyber attacks:
- External/ Internal
- Public

Event Host: Jon Bentley