3:45 PM | Conference Close | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Session 1 - Protecting Scotland's Critical Digital National Infrastructure | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
8:30 AM - 9:05 AM | Registration & Networking | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:05 AM - 9:10 AM | Chair's Opening Remarks | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:10 AM - 9:25 AM | Priorities for Scotland's national digital infrastructure Why cybersecurity is critical to developing digital public services | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:25 AM - 9:45 AM | The new Strategic Framework for a Cyber Resilient Scotland Working to integrate cyber across a broad range of government digital platforms and strategic plans | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:45 AM - 10:05 AM | Keynote Speech: Building Public Trust and Resilience in our National Cyber Security Systems and Critical Digital Infrastructure. Ensuring a safe and prosperous digital economy in the future will depend on how we work across sectors to enhance our cyber defences | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:05 AM - 10:25 AM | Building our Strengths and Capabilities in Cyber in a Post-Pandemic World: Positioning Scotland as a leader in data and digital security | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:25 AM - 10:45 AM | A New National Cyber Strategy for Police Scotland: Keeping People Safe in the Digital World is an ambitious programme that will see Police Scotland move more of its resources and capabilities to protecting people from harm online. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:45 AM - 11:50 AM | Expert Panel: How will Scotland's Cyber Leaders Collaborate and Respond to a wide scale Cyber Attack How would public sector agencies come together in the event of a cyber attack on critical national infrastructure? Join our panel of international cyber experts from government, police and partner agencies who outline the resilience challenges and opportunities of building Scotland's reputation as a leading cyber nation. David Ferbrache OBE - Chair - National Cyber Resilience Advisory Board, The Scottish Government Malcolm Graham - Deputy Chief Constable, Crime & Operational Support - Police Scotland Jude McCorry - CEO - Scottish Business Resilience Centre Prof Ciaran Martin CB - Former Chief Executive Officer - National Cyber Security Centre (NCSC) Terry A'Hearn - Chief Executive - Scottish Environment Protection Agency | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Session 2 - Masterclasses & Knowledge Exchange Sessions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
12:15 PM - 12:45 PM | Protecting the employee by protecting the workspace: The Citrix view on Zero-Trust. Employees are our most important asset, so protecting them and their work interests should be our most important mission. You can easily recognize organizations that truly “get it.” They’re the ones shifting security efforts from a primary focus on protecting underlying technologies to the more business-relevant position of protecting the value delivered by employees. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Session 3 - Building Cyber Resilience Across The Public Sector | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
12:50 PM - 1:05 PM | A CISO’s perspective and recommendations to overcome the ‘common struggles’ faced by the public sector to maintain its cybersecurity defences How sector-wide approaches, shared skills, resources and threat intelligence can be at the heart of inclusive security strategies | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:05 PM - 1:20 PM | Spinning Up Resilient Services in Record Time, and Supporting Secure Cloud-Based, On-Premises and Legacy Systems Ensuring the integrity of the NHS's national IT estate and that the quality and security of service across critical business systems remain without breach. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:20 PM - 1:35 PM | Working to Protect Local Government from the Increasing Range of Cyber Threat Vectors Resilience levels among local authorities have been put to the test during lockdown with councils most likely to be targeted by ransomware attacks according to leading industry surveys. With the move to remote working - and a commensurate shift to cloud-based platforms - this session explores how Scottish councils are dealing with cyber harm on their networks. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:35 PM - 1:55 PM | Why cyber resilience is a team effort Without the right people, process, technology and plans in place, future security attacks will be successful. The pandemic has changed the way we all think and work, but we’ve learned a lot. Not least, the human side of security. This session explores the key cyber resilience areas including human security potentially being the weakest link. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:55 PM - 2:05 PM | Questions from the audience | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:05 PM - 2:20 PM | Networking | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Session 4 - Building a More Trusted Digital World | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:20 PM - 2:35 PM | Building a Cyber Ecosystem That Can Support Domestic Resilience and Act as a Growth Catalyst in Overseas Markets The Cyber Cluster approach taken By Scotland's tech trade body - ScotlandIS - is helping to build resilient supply chains that can position Scotland as a leading cyber nation. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:35 PM - 2:50 PM | Pioneering Innovation Can Secure Cyber Systems by Design. It Takes Leadership to Change The Approach Industry is leading the way on developing innovative cyber systems that protect customer data from breaches that - if successful - would carry a potentially catastrophic reputational risk. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:50 PM - 3:05 PM | Protecting Sensitive Data with Tokenisation With the increased exposure of your sensitive data to external attacks, you must prepare and future-proof your organisation and operations before a compromise happens. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:05 PM - 3:30 PM | Questions from the audience |