How the crime business grew out of recession

Brought to you by The Security, Privacy, Identity & Trust (SPIT) Group

National statistics show a fall in surveyed crime to a third of the peak value over 20 years. Under this recessionary pressure criminal businesses have reacted with a strategy of consolidation and innovation.

Registration for this event is now closed.

About the event

As the arms race between the IT industry and the criminal world escalates, criminals are using new technologies to exploit new vulnerabilities. As the IoT develops and more and more ‘things’ are connected to the internet, we will see more attacks in which physical devices are taken over and misused for criminal activities. We can expect sophisticated and, dare we say, innovative criminals to make increasing use of AI and cloud computing resources to automate, anonymise and increase the scale of cybercrime.

Organisational pressures are mounting to reexamine internal assumptions made about the Internet, highlighting a need for regular reassessment of cyberspace threats, including the insider threat of deliberate or inadvertent actions within businesses. We’re seeing a priority placed on the enforcement of measures for extending enterprise risk management to include organizational risk and cyber resilience.

From the technology viewpoint, the use of disruptive technology to fight cyber-crime innovation has shown rapid advancements in the past 18 months (Ransomware, IoT DDoS attacks, wider dissemination of Cryptocurrencies). Innovative technologies help businesses to get ahead of the arms race and disarm criminals. Security automation and the advent of narrow AI in cybersecurity shifts the odds in favour of the defenders. DARPA’s grand cyber-challenge has proven that applying maturing technologies such as machine learning to fields like vulnerability fuzzing & patching will bring significant changes on how cybersecurity is practised.

This half day event seeks to discuss current trends in cybercrime and shed light on a much-needed business and technology-driven response. Speakers will highlight how advanced technologies can be applied by today’s cybersecurity community to make enterprises a difficult target for cyber-criminals. Finally, what role do the regulators play in the criminal marketplace? How big is the problem? How much are companies investing in barriers to cybercrime? What is the state of play in the growth of new innovative cyber businesses in the UK? Join us as we attempt to answer these queries and many, more.

You can follow @cambwireless on Twitter and tweet about this event using #CWSecurity.

Agenda

Expand all

The information supplied below may be subject to change before the event.

12:30

Registration and networking with refreshments (no lunch will be provided)

13:30

Introduction to Security SIG from Tim Phipps of Solarflare

13:40

The future impact of AI in cybercrime; Dave Palmer, Director of Technology, Darktrace

The risks from the digital era have changed; intellectual property and financial theft have been a frustration, but we should now expect attacks on enterprise physical assets as well as the deliberate undermining of data-driven strategic decisions aimed to cause damage in the long term. AI and machine learning developments offer new opportunities for resilience across the whole digital business but will how will these same developments by used by digital criminals?

14:00

Q&A

14:05

Malware: why are we losing the battle, and what can be done?; Fraser Kyne, EMEA CTO, Bromium

Over the last decade we’ve trebled our spending on IT security; yet breaches are up 4x over the same period. Clearly, something isn’t working…The software on modern PCs and mobile devices has become too large and complex to secure via conventional means, making it an easy target for malware. This session will look at the uncomfortable truths behind why the bad guys are winning, and propose what we can realistically do about it by taking advantage of hardware-assisted virtualization.

14:25

Q&A

14:30

Refreshments and networking

15:00

The Business Case for Cyber Security, and the Investment Landscape; Nick Kingsbury, Serial Investor & Entrepreneur and Founder, Kingsbury Ventures

The first part of this presentation will look at the key questions a board should answer about their business, its assets, its plans and the key risks. In answering these questions a business case can be built. The second part will provide a snapshot of the investment landscape for innovative cyber security technology companies that are helping protect business against those risks.

15:20

Q&A

15:25

Effective engagement & information sharing with Law Enforcement concerning business crime; DS Tim Court Metropolitan Police

This talk will outline the current framework of law enforcement response and activity to tackle cyber crime and fraud offences in the UK. It will provide an insight into serious organised crime groups targeting businesses and clarify what to expect from a LE response; and finally how to prepare for such engagement.

15:45

Q&A

15:50

Policy responses to the changes in the ‘technology of crime’; Jane Cannon MBE, Director, Security Industry Engagement, Head, Joint Security & Resilience Centre

Jane will discuss the challenges facing HM Government and the security sector

16:10

Q&A

16:15

Open Forum/Panel session with all speakers chaired by Tim Phipps of Solarflare

17:15

Closing remarks

17:20

Complete Feedback & Event closes

Speakers

Nick Kingsbury - Director, Kingsbury Ventures Ltd

Fraser Kyne - EMEA CTO, Bromium UK

Dave Palmer - Director of Technology, Darktrace

SIG Champions

Zahid Ghadialy - Principal Analyst & Consultant, 3G4G

Zahid is a technologist with a deep understanding of architecting world-class mobile products and solutions. With over 20 years of experience in the telecom industry in various roles, he has been an evangelist for mobile and wireless technologies. Over the years he has accumulated a vast following on his blogs and social networks with simple explainer posts and videos.

His 3G4G blogs are widely read where he looks at different aspects of mobile technology and especially 5G and 6G nowadays, including the architecture, deployments, use cases, applications, etc. His YouTube channel is also very popular where he explains many new features expected as part of 5G in the future. While his style and content is unique, he also references many industry publications and provides slides that are very useful to view online.

He is also very active on Twitter under his @3G4GUK brand helping disseminate the benefits of 5G and why 5G will be needed in the long run. He covers a very wide portfolio of 5G related information that is hard to find otherwise.

Until recently, Zahid was a Senior Director looking at Technology & Innovation Strategy in Parallel Wireless. As a brand ambassador, he represented the company in various Open RAN discussions and also created tutorials on Open RAN and O-RAN which are being used as reference for new starters on the topic.

Richard Jacklin - Business Development - Commercial Lead, Plextek

Richard is the Commercial Lead for Plextek Services, helping customers design and produce highly innovative electronic, radar and radio communications enabled solutions. His career, now over 30 years, has included sales management, product management and engineering leadership in companies including Ericsson, Samsung, UL, Keysight, PPM and NI. He has presented and contributed to many forums including Cambridge Wireless, GSMA working groups, and Satellite Innovation Group. Richard graduated from the University of Portsmouth with a degree in Electronic Engineering, he was also awarded Chartered Engineer status and Fellow of the Institute of Engineering and Technology (IET).

Bob Oates - Associate Director, Cambridge Consultants

Bob Oates is a specialist in the interaction between safety and security for operational technology, critical infrastructure, and IoT devices. He works within the Engineering Assurance Team at Cambridge Consultants, ensuring that intelligent, AI-enabled systems are safe and secure. In addition to his academic background, Bob has over a decade of industrial experience working in the critical national infrastructure, defence, aerospace, nuclear, and maritime domains, including acting as the head of security for the development of the world’s first commercial remotely operated ship. He holds an Honorary Professorship in Safety and Security at De Montfort University.

Yiru Zhong - None

Yiru is an M2M/IoT market veteran with an industry research background and practical deployment experience. She understands the complexity of new service launches and the investigative nature of enterprise adoption trends. In her analyst past, she has launched two successful M2M/IoT research programmes, changed leadership minds on focussing on security, and managed an IoT platform validation programme. Her current role utilises her industry and IoT technology knowledge to accelerate enterprise adoption. She represents Soracom in the UK to lead conversations with start-ups, SMBs and enterprises on how to use IoT for their business. She is passionate about resolving commercial practicalities of IoT deployment and mostly building a positive conversation around IoT security.

Event Location

Open in google maps

Location info

Jesus College, Jesus Lane, Cambridge, CB5 8BL

Related events

  • Cambridge Wireless

    East of England Tech Collaboration

    Register now
  • Cambridge Wireless

    Risk, perception, management and mitigation in RF Safety

    Register now
  • Cambridge Wireless

    AI, Law and Ethics 101: a quick start guide to what you need to know

    Register now

Subscribe to the CW newsletter

This site uses cookies.

We use cookies to help us to improve our site and they enable us to deliver the best possible service and customer experience. By clicking accept or continuing to use this site you are agreeing to our cookies policy. Learn more

Reserve your place

Join the CW network

CW is a leading and vibrant community with a rapidly expanding network of nearly 400 companies across the globe interested in the development and application of wireless and mobile technologies to solve business problems.

Sign in to your account

Please sign in to your CW account to reserve a place at this event and to qualify for any member discounts.

Start typing and press enter or the magnifying glass to search

Sign up to our newsletter
Stay in touch with CW

Choosing to join an existing organisation means that you'll need to be approved before your registration is complete. You'll be notified by email when your request has been accepted.

i
Your password must be at least 8 characters long and contain at least 1 uppercase character, 1 lowercase character and at least 1 number.

I would like to subscribe to

Select at least one option*