BAE Systems Applied Intelligence will be hosting RESET: a single-track one-day cyber security conference on Wednesday 19 June at Kings College London.
The event will continue its mission to feature substantive presentations and research on: Threat Intelligence, Policy Law, Journalism, Malware Analysis, Reverse Engineering and other aspects of cyber security.
While last year’s conference featured an all-female speaker programme to disrupt the industry standard, RESET 2019 is taking an approach to represent the ideal of the cyber security field by hosting a more gender balanced line-up.
Simultaneously, RESET has now become a platform to showcase the diversity and talent that exists in the industry. You will see plenty of exciting speakers sharing their ideas with you again this year to challenge your opinion on the cyber security industry.
The event welcomes all professionals from relevant industries that want to learn about various themes and topics in cyber security as well as the threats faced by defenders and customers alike.
When: Wednesday 19 June 2019 Conference: 8:30 – 17:00 Drinks: 17:00 – 19:00 Where: The Auditorium, Bush House South Entrance, Kings College London, WC2R 2LS
Event Information - Speakers and Agenda:
Louise Fisk, Communications and Marketing Director, BAE Systems AI
Louise joined BAE Systems in 2015 having headed up global communications and investor relations for Innovation Group, a FTSE 350 technology and services company. Specialising in Communications for two decades, Louise has worked closely with a number of businesses from FTSE 100’s through to start-ups, to build their market reputations in order to help generate sales and deliver shareholder value.
Prior to Innovation Group Louise spent six years at business and technology services company Logica, where she managed global PR and external communications, including two large acquisitions and eventually the acquisition of Logica by CGI. Before Logica, she worked agency-side for 10 years, eight of which were at Lewis PR managing clients such as BT, Cognos, Postini and CMG.
Louise holds a BA honours degree in Language and Communications, a Post-graduate diploma in Public Relations and Journalism and was PR Week’s Young Communicator of the Year. Louise is a Trustee for the Williams Syndrome Foundation and is married with two young boys.
Description of talk: The UK Biometric Strategy, unveiled in June 2018, has been under consultation by an advisory board and is due to report to the public in June 2019. Currently, UK law only regulates the use of DNA and fingerprints for use by the police only, not by other branches of government and not by the private sector. Nor does the UK have any protections in law around the use of our face or voice data - both of which can be gathered without our consent or knowledge and used in ways that threaten our privacy, civil liberties and human rights. This talk assesses the shortcomings of the UK Biometrics Strategy and offers solutions so that the United Kingdom regulates the use of biometrics in ways that respects the rights of its citizens and residents.
Biography: Stephanie Hare is a researcher focused on technology, politics and history. Selected for the Foreign Policy Interrupted Fellowship and the BBC Expert Women programme, she shares insights on television and radio and broadcasts on the BBC World Service and Radio 4. She has published in the Harvard Business Review, the Financial Times, Project Syndicate, the Herald, CNN and the Guardian. Previously she has worked as a principal director at Accenture Research, a strategist at Palantir, a senior analyst at Oxford Analytica, and a consultant at Accenture. Hare earned a PhD in International History and a MSc in Theory and History of International Relations from the London School of Economics, and a BA in Liberal Arts (French) from the University of Illinois at Urbana-Champaign. Her media work and publications are available at www.harebrain.co.
Description of talk: This talk discusses some of the common myths and misconceptions of social engineering. From understanding human behaviour and how it can be manipulated, to the skills required to do an effective and ethical job, to the truth about awareness of the practice and how it might be prevented. This talk touches on what is actually required in higher level social engineering attacks and prevention and discusses how to "level up" from both an offensive and defensive perspective.
Biography: A "burglar for hire", lifelong social engineer and investigator, Jenny is the founder of Human Factor Security a firm specialising in social engineering and psychological infiltration practices. A well known keynote speaker at industry events, she hosts an award winning podcast and writes, speaks and blogs about all aspects of human based attacks, scams, cons and frauds. Jenny is an expert in influence and persuasion techniques, non-verbal communications and deception detection and was a Hunter on the hit Channel 4 TV show "Hunted." She is frequently featured in the media as an expert on human security topics.
Description of talk: In 2013, a public report reveals a group of actors conducted targeted attacks, leverage a malware dubbed ICEFOG against mainly government organisations and defence industry of South Korea and Japan. Little has been published on the activities of ICEFOG malwares since the report was released more than six years ago. However, despite a pause and a decrease in sample numbers were observed, the attacks leveraging the ICEFOG malware did not entirely stop after the exposure.
In the past few years, we observed different attacks which the malware delivered and exploit with different tactic, techniques and procedure (TTP) compare with the campaign reported in 2013. In the recent attack, a new variant of the ICEFOG samples were also discovered. In this talk, I will introduce our findings among different samples discovered across these years and highlight the evolved TTPs that actor applied to evade detection in the new campaign. In addition, I will also introduce and clarify the potential connections between ICEFOG operator and other APT groups.
Biography: Chi-en Shen (Ashley) is a senior researcher at FireEye, where she focuses on threat intelligence research. She specialises in threat hunting, malware analysis, reverse engineering, and targeted attacks analysis. For supporting women in InfoSec, Ashley co-founded "HITCON GIRLS" – the first security community for women in Taiwan. Ashley is also a regular speaker at global security conferences, including Black Hat, FIRST, HITB GSEC, CODE BLUE, Troopers, HITCO. etc. Ashley also serves as a review board member of Black Hat Asia, Blue Hat Shanghai and Hack in the Box conferences.
Description of talk: Uncovering malicious network campaigns is a major part of threat intelligence research. Alerted by victims, pursuing OSINT leads, or detecting new variations on known malicious behaviour, the results may end up as a complete unravelling of a national intelligence operation. Yet we are inherently limited in our understanding of the context around what we expose, and the results can be an escalating chain of uncontrollable consequences that have global significance. Exposing an operation may not just limit a country's intelligence efforts. It may hinder other ongoing efforts, put people at risk, eliminate a critical view into sensitive targets, alert and inform adversaries, or shake alliances. This talk will explore the many layers of context around network operations by looking at the whiplash effect of their exposure. By examining some key reveals from the last decade and beyond, we will see how the threat intelligence community has made itself a key player in global events, and therefore a threat in its own right.
Biography: Daniel Moore is currently a teaching fellow at the War Studies Department in King's College London, from which he holds a PhD focused on cyber-warfare. He also works as a research and development team lead at Accenture Security, where he designs and builds threat intelligence platforms. Daniel has previously held several private and public positions in cyber-security and intelligence, dating back nearly fifteen years to when he served as an officer in Israeli military intelligence.
Description of talk: This talk will discuss the current state of the challenges posed to our cryptography by quantum computers and discuss options for the path forward. There are options to provide for a quantum safe future, but we need to choose wisely and start early. Organisations need to understand their crypto assets and plan ahead in order to bridge the gap between standards availability and implementation readiness. We will discuss a simple plan that everyone can use to start thinking about doing business in a post quantum era.
Biography: Jaya Baloo the CISO of KPN Telecom in the Netherlands. She is recognised in 2017 as one of the top 100 CISOs globally. Jaya works with an amazing information security team of highly driven specialists. Working in the information security arena for the past 18 years, she has worked mostly for global telecommunications companies such as Verizon and France Telecom. Jaya is also a frequent speaker at security conferences on subjects around lawful interception, mass surveillance, and cryptography.
Description of talk: This talk will provide the audience with an overview of how cybercrime has evolved over the past 20 years with the overall aim of identifying the fundamental driving forces that has facilitated the transformation. The talk will leverage Darwin's Theory of Evolution to capture the evolutionary moments of cybercrime which will include highlighting those who were successful and those who were not. The talk will close with an overview of the most recent threat landscape and what it means for the near future.
Biography: Michael is currently a Security Principal at iDefense, Accenture Security where he leads the Targeted Attacks Analysis (TAA) team. He is a CREST Certified Threat Intelligence Manager (CCTIM) and holds a PhD in Quantitative Criminology which examines the use of data analytics to drive cybercrime disruption strategies for the NCA. Prior to Accenture, Michael served as a Director in Threat Intelligence Operations at Stroz Friedberg and as a senior threat researcher at PwC and QinetiQ. Thanks to train strikes and a relatively inadequate social life, Michael is also the founder of a non-profit initiative called ThreatMiner.
The NCSC is helping to make the UK the safest place to live and work online. It supports the most critical organisations in the UK, the wider public sector, industry, SMEs as well as the general public. When incidents do occur, the NCSC provides effective incident response to minimise harm to the UK, help with recovery, and learn lessons for the future.
Description of talk: Users rely more and more on mobile applications for every day tasks, from checking the weather forecast to consulting travel directions and managing their bank accounts. The average user has 20 to 40 applications installed on their phone. While the design and functionalities of mobile applications has grown significantly over the last decade, their security seems to have taken a step back. We sniffed our own mobile phone traffic and we were surprised with what we have found. This talk will walk you through some of our most important findings.
Biography: Veronica is a researcher and intelligence analyst from Argentina. Her research has a strong focus on helping people and involves different areas from wireless and bluetooth privacy issues to malware, botnets and intrusion analysis. She has presented her research on international conferences such as BlackHat, EkoParty, Botconf and others. She is the co-founder of the MatesLab hackerspace based in Argentina, and co-founder of the Independent Fund for Women in Tech. She is currently the director of the CivilSphere project at the Czech Technical University, dedicated to protect civil organizations and individuals from targeted attacks.
Description of talk: Modern transport systems are changing in several ways that impact their cyber security profile, in a world where cyber security threats are becoming ever more sophisticated and targeted. This talk addresses key themes such as increased speed, capacity, what this means for passenger safety and security. Miriam will discuss the evolution of civil transport systems such as autonomy and machine learning, alongside the legacy estate and operational technology, and considers some of the security challenges, before outlining some of the exciting research and development initiatives in the cyber and data analytics world, that may just provide our escape route.
Biography: Miriam is one of BAE Systems Applied Intelligence’s more senior female security consultants, with a long background with national policing and government business. She recently finished working in the commercial aviation space, have spent the previous two years working with biometrics solutions. In recent years, Miriam has been studying International Relations, culminating in an MSc in International Security, three years at the Foreign & Commonwealth Office and a series of study visits to the Middle East. She runs a Women in Cyber Security group within Applied Intelligence, focussed on the recruitment and retention of women within the cyber security industry.
Description of talk: As organisations go more digital and move more key workloads into Internet and mobile platforms what impact does that have on cyber security? How do we need to evolve our cyber security strategy and approaches to deal with the "cloud first" model that many organisations are advocating. This talk will briefly cover some of the changes and the impact on security.
Biography: Siân John MBE is Chief Security Advisor for EMEA in the Cybersecurity Solutions Group at Microsoft. She leads the EMEA security advisors who work with Microsoft’s customers as they evolve their security strategy and capabilities to support digital transformation and cloud adoption.
She was awarded an MBE in the Queens New Year’s Honours List for 2018 for services to Cybersecurity.
Saher Naumaan is a Threat Intelligence Analyst at BAE Systems Applied Intelligence and a rising star in the industry. Her current research is on state-sponsored espionage operations with a focus on threat groups and activity in the Middle East. Saher specialises in analysis covering the intersection of geopolitics and cybersecurity, and regularly speaks at events and conferences around the world. Prior to working at Applied Intelligence, Saher graduated from King’s College London with a Master’s in Intelligence and Security, where she received the Barrie Paskins Award for Best MA dissertation in War Studies.
If you would like to reserve your place at the event please visit our event registration page here, or email email@example.com if you have any questions.