Sign up or log in to build your custom agenda.

How is the Battleground Changing to Manage Risk?

Chris Kubecka
Hypasec, CEO

Chris Kubecka is an experienced, committed, energetic and certified digital security expert who is passionate about solutions. Author of multiple books including the 2019 release of Hack the World with OSINT. Over 20 years of professional experience ranging from military, government, public and private business. Prior to establishing HypaSec in 2015, Chris established and headed network and security operations teams, ICS security, international joint intelligence teams, EU/UK privacy group for EMEA and South American (outside Saudi Arabia) for Aramco Overseas Company, part of Saudi Aramco. Tasked with setting up digital security after the 2012 Shamoon attacks and featured on Darknet Diaries episode 30 Shamoon. At Unisys she advised flagship clients at Lloyds TSB and Danone on their overall security and incident response. It is no surprise that outside of work she continues to tap into his love for research by pursuing IoT and ICS exploitation and defense of critical infrastructure.

Ravinder Singh
TATA SIA Airlines Limited, Chief Information and Innovation Officer

Ravinder Pal Singh (Ravi) is an Award Winning Technologist, Rescue Pilot and Investor with over 50+ global recognition and 17 Patents. His body of work, mostly 1st in the world are making a difference within acute constraints of culture and cash via commodity technology. He has been acknowledged as world's top 25 CIO and top 10 Robotics Designer in 2018.
Ravi is a global speaker and has delivered over 100+ lectures and papers in Asia, Europe, USA and Africa in 2018-19. Ravi is advisor to board of 9 enterprises where incubation and differentiation is a core necessity and challenge. He sits on the advisory council of 3 global research firms where he contributes in predicting practical future automation use cases and respective technologies.

Ron Brash
Verve Industrial Protection, Director of Cyber Security Insights

Ron is the Director of Cyber Security Insights at Verve Industrial Protection and acts as an SME in various ICS/SCADA/critical infrastructure security areas (but not specifically limited to and includes aviation). Previously, Ron was a manager and SME at a Canadian Cyber Risk Advisory practice based out of Montreal, Quebec. He focused on providing technical knowledge in the varying security domains, selected ICS/SCADA topics, and advised on a number of technical areas ranging from technical risk assessments, security architecture review, OT SIEM integrations, and control review. Additionally, Ron was CTO of a technology consultancy providing secure development and security services, co-author of a book at Packt publishing, and was an embedded developer at Tofino Security (A division of Belden).

Kevin Borley
KJB-ASSOCIATES LTD, Senior Technology Practitioner

Significant C Level experience and able to work 'hands on’ across organisations of all sizes and at a technical level. Kevin’s research and advisory work supports stakeholders looking to embrace change, as well to assist incumbent CTO’s, CIO’s and CISO's. Kevin has been at the forefront of (best practice) technology delivery for 35 yrs. and the detailed management of cyber risk for the past 20 years, both in the UK and internationally with experience gained in the front line of the internet security world.
A regular commentator and conference speaker and technology analyst, Kevin has contributed to discussions with Government, the NCSC and regulatory bodies regarding the impact of Cyber and legislation.

This Keynote Panel will include industry disruptors who are changing the landscape to even the odds against evolving threats and malicious actors.
We will look at the following:
1. Where the Bad guys work closely together and share intelligence how can we do the same
2. How can organisations react faster to evaluate and adopt new architectures and mindsets to
change the battlefield location?
3. When vendors create a product with flaws or vulnerabilities that need constant management (at our cost) should we be taking hard action against them?
4. It is possible to gather intelligence as to who is being targeted and how. It is possible to gather information as to what vulnerabilities are looking to be exploited?
5. With nation-state actors developing significant cyber warfare capabilities aimed at disrupting corporate infrastructure and applications (for use against the enemy) what has to change in terms of how global corporates manage cyber risk?