Registration and networking over lunch
Introduction to Security & Defence SIG from Paul Tindall, Sepura
Welcome from our partner, Mark Littlewood, Head of Sensor Systems, The KTN
Welcome from our host, Elle Todd of Olswang LLP
Overview and scene setting - How does technology affect our national security?; David Chater-Lea of Motorola Solutions
Emergency services, power, defence, communications and transport
The future problem - Virtualisation moves technology beyond national boundaries; Tim Phipps of Cambridge Consultants
Increasing abstraction of technology innovation away from fixed hardware implementations allows for greater portability and less control. (Internet, Cloud, OTT, NFV).
Complication - The supply chain is more complicated than you'd think; Paul Tindall of Sepura
What is really inside your technology product. China manufacturing, India software, US radio, UK user interface. Talk about the need to control key, strategic components.
Possible resolution - Commercial technology Euros Davies of Airwave
For emergency services communications you could build and control your own network (Airwave), or
you could hope to reuse a commercial network (ESN). Discusses the key considerations for ESN users.
Possible resolution - Regulation will control technology flows; Tim Phipps of Cambridge Consultants
We can restrict leakage of innovation by export control. (But this can be just a limit on free trade). National laws can control the technology used within our borders.
International data flows in a post Snowden era; Elle Todd, International media and technology lawyer, Olswang LLP
Elle will look at what sovereignty means post-Snowden. How are the balances of power and tensions
between surveillance and privacy, economic growth and terrorist fears shaping up and how is this affecting data flows over national boundaries? What is motivating the latest developments in international data issues and what might a ‘post post-Snowden’ era look like?
A view from the Cabinet Office; Dr Nigel Brown, Lead for Resilient ICT Strategy, Cabinet Office
Security assurance – ways, means & outcomes; Paul Thorlby, CTO Security (Cyber Information & Training Division), Qinetiq
Traditional approaches to security assurance tend to focus on providing inputs to an assurance method, rather that the assurance outcomes sought. These approaches often do not scale well, nor do they work well in practice with complex global supply chains. Exploring security assurance in outcome terms (what am I trying to achieve) and that seeks to align incentives, may open up new and more effective approaches. The talk will also share some learning points from a novel approach developed for providing information security assurance for a national scale radio network.
Refreshments & Networking
End-to-end cyber security management; Dave Francis, Cyber Security Officer, Huawei UK
The thrust of the talk will be as follows: There is no such thing as a European, American or Chinese
product as all products are constructed from the global supply chain. Management of supplier processes is as important as internal processes due to the volume of 3rd party components used in modern products. Transparency is essential to trust. The danger of confusing security with the illusion of. We need to collaborate across all sectors. How we are keen to share our experience and hear the experiences of others.
Skating on quicksand; Peter Davies, Technical Director, Thales e-Security
This talk will discuss the types of security that can reasonably be expected to be implemented over the top of untrusted networks together with an analysis of some of those that cannot. It will discuss the types of solution that might be necessary in order to successfully implement a security solution over the top of an untrusted network and the types of threats that implementing such a solution might introduce.
Open Forum/debate with all speakers and The KTN chaired by Paul Tindall of Sepura
Closing Remarks from Paul Tindall of Sepura
Complete Feedback forms and Event Closes