Technology without borders: how to assert sovereignty in a connected world

Brought to you by The Security, Privacy, Identity & Trust (SPIT) Group

In an era of continuing technological transformation and highly dynamic global networks, the complex challenges facing UK information flow across borders and equipment/system supply sovereignty are a critical element of national security.

Registration for this event is now closed.

About the event

Critical Defence and Security equipment/infrastructure and their components are increasingly being procured from non-sovereign sources. This is being driven by: costs; the need to inter-operate with partners; technology advancements and sharing.

However, the non-sovereign procurement could leave countries vulnerable and locked in to potentially unfriendly powers. Are we comfortable having the supply of key technologies and systems in the hands of those we cannot control? Are commercial arrangements enough?

This Security & Defence SIG event will analyse the impact of the connected world on technological sovereignty, discussing how can we objectively assess this risk and what strategies should we employ to minimise the risk dependent upon the degree of criticality.

You can follow @cambwireless on Twitter and tweet about this event using #CWSecurity.

Co-organised by KTN

The KTN is the UK'S innovation network. Connecting for Positive Change

View profile

Hosted by CMS

CMS is a pioneering firm with a distinctive approach to business law.

View profile

Agenda

Expand all

The information supplied below may be subject to change before the event.

12:00

Registration and networking over lunch

13:00

Introduction to Security & Defence SIG from Paul Tindall, Sepura

13:05

Welcome from our partner, Mark Littlewood, Head of Sensor Systems, The KTN

13:15

Welcome from our host, Elle Todd of Olswang LLP

13:20

Overview and scene setting - How does technology affect our national security?; David Chater-Lea of Motorola Solutions

Emergency services, power, defence, communications and transport

13:25

The future problem - Virtualisation moves technology beyond national boundaries; Tim Phipps of Cambridge Consultants

Increasing abstraction of technology innovation away from fixed hardware implementations allows for greater portability and less control. (Internet, Cloud, OTT, NFV).

13:30

Complication - The supply chain is more complicated than you'd think; Paul Tindall of Sepura

What is really inside your technology product. China manufacturing, India software, US radio, UK user interface. Talk about the need to control key, strategic components.

13:35

Possible resolution - Commercial technology Euros Davies of Airwave

For emergency services communications you could build and control your own network (Airwave), or
you could hope to reuse a commercial network (ESN). Discusses the key considerations for ESN users.

13:40

Possible resolution - Regulation will control technology flows; Tim Phipps of Cambridge Consultants

We can restrict leakage of innovation by export control. (But this can be just a limit on free trade). National laws can control the technology used within our borders.

13:45

International data flows in a post Snowden era; Elle Todd, International media and technology lawyer, Olswang LLP

Elle will look at what sovereignty means post-Snowden. How are the balances of power and tensions
between surveillance and privacy, economic growth and terrorist fears shaping up and how is this affecting data flows over national boundaries? What is motivating the latest developments in international data issues and what might a ‘post post-Snowden’ era look like?

14:05

Q&A

14:10

A view from the Cabinet Office; Dr Nigel Brown, Lead for Resilient ICT Strategy, Cabinet Office

14:20

Security assurance – ways, means & outcomes; Paul Thorlby, CTO Security (Cyber Information & Training Division), Qinetiq

Traditional approaches to security assurance tend to focus on providing inputs to an assurance method, rather that the assurance outcomes sought. These approaches often do not scale well, nor do they work well in practice with complex global supply chains. Exploring security assurance in outcome terms (what am I trying to achieve) and that seeks to align incentives, may open up new and more effective approaches. The talk will also share some learning points from a novel approach developed for providing information security assurance for a national scale radio network.

14:40

Q&A

14:45

Refreshments & Networking

15:15

End-to-end cyber security management; Dave Francis, Cyber Security Officer, Huawei UK

The thrust of the talk will be as follows: There is no such thing as a European, American or Chinese
product as all products are constructed from the global supply chain. Management of supplier processes is as important as internal processes due to the volume of 3rd party components used in modern products. Transparency is essential to trust. The danger of confusing security with the illusion of. We need to collaborate across all sectors. How we are keen to share our experience and hear the experiences of others.

15:35

Skating on quicksand; Peter Davies, Technical Director, Thales e-Security

This talk will discuss the types of security that can reasonably be expected to be implemented over the top of untrusted networks together with an analysis of some of those that cannot. It will discuss the types of solution that might be necessary in order to successfully implement a security solution over the top of an untrusted network and the types of threats that implementing such a solution might introduce.

15:35

Q&A

16:00

Q&A

16:05

Open Forum/debate with all speakers and The KTN chaired by Paul Tindall of Sepura

16:40

Closing Remarks from Paul Tindall of Sepura

16:45

Complete Feedback forms and Event Closes

Speakers

Nigel Brown - Lead for Resilent ICT Strategy, Cabinet Office

Peter Davies - Director, Thales

David Francis - Global Cyber Security & Privacy Officer, Huawei Technologies R&D UK Ltd

Paul Thorlby - CTO Security, QinetiQ

Elle Todd

SIG Champions

Zahid Ghadialy - Principal Analyst & Consultant, 3G4G

Zahid is a technologist with a deep understanding of architecting world-class mobile products and solutions. With over 20 years of experience in the telecom industry in various roles, he has been an evangelist for mobile and wireless technologies. Over the years he has accumulated a vast following on his blogs and social networks with simple explainer posts and videos.

His 3G4G blogs are widely read where he looks at different aspects of mobile technology and especially 5G and 6G nowadays, including the architecture, deployments, use cases, applications, etc. His YouTube channel is also very popular where he explains many new features expected as part of 5G in the future. While his style and content is unique, he also references many industry publications and provides slides that are very useful to view online.

He is also very active on Twitter under his @3G4GUK brand helping disseminate the benefits of 5G and why 5G will be needed in the long run. He covers a very wide portfolio of 5G related information that is hard to find otherwise.

Until recently, Zahid was a Senior Director looking at Technology & Innovation Strategy in Parallel Wireless. As a brand ambassador, he represented the company in various Open RAN discussions and also created tutorials on Open RAN and O-RAN which are being used as reference for new starters on the topic.

Richard Jacklin - Business Development - Commercial Lead, Plextek

Richard is the Commercial Lead for Plextek Services, helping customers design and produce highly innovative electronic, radar and radio communications enabled solutions. His career, now over 30 years, has included sales management, product management and engineering leadership in companies including Ericsson, Samsung, UL, Keysight, PPM and NI. He has presented and contributed to many forums including Cambridge Wireless, GSMA working groups, and Satellite Innovation Group. Richard graduated from the University of Portsmouth with a degree in Electronic Engineering, he was also awarded Chartered Engineer status and Fellow of the Institute of Engineering and Technology (IET).

Bob Oates - Associate Director, Cambridge Consultants

Bob Oates is a specialist in the interaction between safety and security for operational technology, critical infrastructure, and IoT devices. He works within the Engineering Assurance Team at Cambridge Consultants, ensuring that intelligent, AI-enabled systems are safe and secure. In addition to his academic background, Bob has over a decade of industrial experience working in the critical national infrastructure, defence, aerospace, nuclear, and maritime domains, including acting as the head of security for the development of the world’s first commercial remotely operated ship. He holds an Honorary Professorship in Safety and Security at De Montfort University.

Yiru Zhong - None

Yiru is an M2M/IoT market veteran with an industry research background and practical deployment experience. She understands the complexity of new service launches and the investigative nature of enterprise adoption trends. In her analyst past, she has launched two successful M2M/IoT research programmes, changed leadership minds on focussing on security, and managed an IoT platform validation programme. Her current role utilises her industry and IoT technology knowledge to accelerate enterprise adoption. She represents Soracom in the UK to lead conversations with start-ups, SMBs and enterprises on how to use IoT for their business. She is passionate about resolving commercial practicalities of IoT deployment and mostly building a positive conversation around IoT security.

Event Location

Open in google maps

Location info

Olswang LLP, 90 High Holborn, Greater London, WC1V 6XX

Related events

  • Cambridge Wireless

    East of England Tech Collaboration

    Register now
  • Cambridge Wireless

    Risk, perception, management and mitigation in RF Safety

    Register now
  • Cambridge Wireless

    AI, Law and Ethics 101: a quick start guide to what you need to know

    Register now

Subscribe to the CW newsletter

This site uses cookies.

We use cookies to help us to improve our site and they enable us to deliver the best possible service and customer experience. By clicking accept or continuing to use this site you are agreeing to our cookies policy. Learn more

Reserve your place

Join the CW network

CW is a leading and vibrant community with a rapidly expanding network of nearly 400 companies across the globe interested in the development and application of wireless and mobile technologies to solve business problems.

Sign in to your account

Please sign in to your CW account to reserve a place at this event and to qualify for any member discounts.

Start typing and press enter or the magnifying glass to search

Sign up to our newsletter
Stay in touch with CW

Choosing to join an existing organisation means that you'll need to be approved before your registration is complete. You'll be notified by email when your request has been accepted.

i
Your password must be at least 8 characters long and contain at least 1 uppercase character, 1 lowercase character and at least 1 number.

I would like to subscribe to

Select at least one option*