" rel="stylesheet">
Skip Main Navigation
Page Content
This event has ended

Cyber Security Conference 2011

InfoLab21 & ICTKTN

Monday, September 19, 2011 from 9:00 AM to 4:30 PM (BST)

Cyber Security Conference 2011

Ticket Information

Type Remaining End Quantity
Cyber Security Conference 16 Tickets Ended Free  

Share Cyber Security Conference 2011

Event Details

Cyber Security Conference 2011



Cyber security has been identified by the UK government as a key threat that businesses of all sizes will face over the coming years. In response, Infolab21 is hosting a regional Cyber Security event in partnership with the ICT KTN to help you think about how you could respond to this threat.


The Cyber Security Conference 2011 will be held in Lancaster, providing delegates with the opportunity to hear from leading academics from across Lancaster University's Faculty of Science and Technology, keynote speeches from Daniel Hunt and Tony Dyhouse and a range of exhibitions and break out sessions showcasing cyber security prowess and research.


The event will have a number of breakout sessions from key business experts and thought leaders in order to help you improve your businesses security posture. This event builds on the information security excellence that can be found in Infolab21 and draws together experts from other disciplines from across Lancaster University.  


The event will showcase Lancaster Universities multidisciplinary approach to cyber security and how these disciplines need to be considered in order to respond comprehensively to cyber security threats. The main thrust of the event is to develop key insights in to how your business can respond in the face of increasingly complex attacks on your infrastructure. Improving the security and resiliency of your information systems is a task that must be faced in order to compete effectively in today’s economic environment.

Why attend and what will you get out of it?

  • This event will give you access to key players and leading academic research in the information security field
  • You will have the opportunity to network with like minded businesses and those in the field of cyber security who are able to help your company
  • Find out what academics across a variety of disciplines are getting up to at Lancaster University
  • Become more aware of potential threats you could be faced with and create a plan of action to protect yourself from such threats
  • Find out which key areas you should allocate you budget to

Who should attend?

  • Companies looking to improve their knowledge of cyber security
  • Individuals concerned about cyber threats to their business
  • Companies looking to work with the University in this research field
  • Anyone considering the options available to overcome threats to cyber security


09:00 – Registration, refreshments and exhibitions               

09:45 – Event opening remarks (Dr. Dan Prince, Prof. Geoff Coulson, Nick King)                           

10:15 – Keynote 1 (Tony Dyhouse, ICT KTN) - Threats                              

10:45 – Refreshments and exhibitions                                  

11:15 – Move to Breakout Sessions                                       

11:25 – Breakout Session (Industry)                                                    

12:10 - Keynote Presentation 2 (Daniel Hunt, Get Safe Online) - Expert Advice for Everyone                

12:40 – Lunch, refreshments and exhibitions                       

13:50 – Move to Breakout sessions                                                   

14:00 – Breakout Session (Academic)                                               

14:45 – Move to Bowland Suite                                                         

15:00 – Keynote Presentation 3 (Stuart Coulson, UK Fast) - Protection on a Budget                          

15:30 – Panel Session                                                            

16:15 – Event close, refreshments and exhibitions                  

17:15 - Close


Speaker information

Dr. Daniel Prince, ICT Focus

Dr. Daniel Prince is a Teaching Fellow at Lancaster University and has been working in the area of mobile network systems and information security for 6 years. Daniel completed his Undergraduate studies in Computer Systems Engineering in 2000 and went onto complete his PhD in Programmable Ad Hoc Networks in 2004. During his PhD he extensively worked with Mobile IPv6, working to complete an Implementation of Cisco IOS and as part of a team worked to implement the protocol in Windows CE. He now lectures in information security risk management, penetration techniques and digital forensics as part of the MSc in Cyber Security at Lancaster University, for which he is the course director.

Tony Dyhouse, ICT KTN

Tony took over as Director of the Cyber Security Knowledge Transfer Network in 2009, continued as Director of the Cyber Security programme within the Digital Systems KTN and now within the ICT KTN.Tony joined DERA (now QinetiQ) in 2000 and became the Director of QinetiQ’s Operations & Technical Services group, providing a range of managed security services. This role was followed by a spell as Director of the Information Assurance Consultancy group before becoming Director of the Cyber Security KTN. His expertise extends across all areas of Cyber Operations and Information Security, with specialist knowledge in Network Intrusion Detection, Penetration testing, Incident Response and Digital Forensics.

Tony’s early career was with British Gas, ICL and Fujitsu, spanning over 28 years in the IT industry with experience in Telemetry, the operational management of WANs and LANs and various security technologies.

Tony works with a range of public and private sector organisations on matters of Cyber Security, as well as being active in several industry forums and strategy groups. He is a regular contributor to BBC television and of published features and articles.

Daniel Hunt, Get Safe Online

Daniel Hunt is a Get Safe Online Ambassador within the office of cyber security and information assurance. Daniel joined the Cabinet Office in December 2007 and has worked in the information security and cyber fields for over two years.  He is currently the Communications Manager for OCSIA and a strong supporter of the Get Safe Online initiative.

Get Safe Online (www.getsafeonline.org), which is now entering its fifth year, is the UK’s national internet security awareness initiative. A joint partnership between the Government, the Serious Organised Crime Agency (SOCA), Ofcom and private sector sponsors from the worlds of technology, communication, retail and finance, the initiative continues to educate, inform and raise awareness of internet security issues to encourage confident, safe use of the internet. GetSafeOnline.org is supported by the Cabinet Office, Department for Business, Innovation & Skills (BIS), Home Office, Serious Organised Crime Agency (SOCA), HSBC, Microsoft, Cable & Wireless, Ofcom and PayPal.


Stuart Coulson, UKFast

Stuart Coulon is a security professional at UKFast a [premium] internet hosting company. UKFast has been operating since 1999 hosting website for major high-street brands as well as smaller start-up organisations. He has been involved in the security industry for over 8 years and has been involved with training security professionals for three of those. His experience and expertise has come from dealing with major corporations and assisting them with relevant protection plans. More recently he has been involved with product development to bring to market exciting new tools for website clients.


Industry Breakout Sessions


Option 1: Securapro Hosted Security Services from Octree (Tony Richardson) - Best Practice Security Management Systems for SMEs

Tony Richardson has been involved in information technology for more than 20 years and achieved CISSP certification in 2009. Tony holds a Post Graduate Certificate in Microsoft Technologies gained at Lancaster University, and is a member of the Microsoft Partner Research Panel, a Microsoft Certified Professional, and a consultant for the Reuters Insight Community of Experts. He is an associate of IT Governance specializing in ISO27001 ISMS implementation and is currently studying for his MSc. in Cyber Security at Lancaster University.


Many small and medium sized firms (SMEs) are failing to identify all aspects of the data security risk they face, for three main reasons. First, not appreciating the gravity of this risk; second, not having the right expertise to make a reasonable assessment of key risk factors and devise ways of mitigating them; and third, failing to devote or coordinate adequate resources to address this risk. Also, many businesses lack  awareness that customer data, and confidential business information for that matter, is a valuable commodity for criminals. As a consequence, systems and controls are often weak and sometimes absent.


SMEs attending this session will be provided with the tools and guidelines for adopting a best practices approach to Information Security, especially geared towards those with little or no technical knowledge. An online questionnaire based on the content of the presentation will also be available for delegates to assess the existing data protection stance of the organisation.


Option 2: The National Computing Centre (Richard Henson) - Balancing Risk and Opportunity: Corporate quality security for SMEs and the rest of the supply chain

When a small to medium-sized enterprise (SME) is up against criminals, terrorists, industrial spies, hacktivists, disgruntled insiders, well-intentioned insiders, and even information security professionals…who you gonna call? This seminar will look at how to boil down the risks, and reduce the soup of uncertainty into the stock of confidence. It’s relevant for organisations who would like to do business with SMEs if only they could trust them to pay attention to information security, it’s pertinent for academics who are interested in developing data sets for security metrics. Oh! ...and it’s rather useful for SMEs too.

Option 3: Isis Forensics (Prof Awais Rashid) - Protecting Organisations and Individuals Online

In this session Awais will discuss the risks that Peer-to-Peer (P2P) can pose to organisations including a study by Isis Forensics that showed how over a third of FTSE 100 and over half of Fortune 100 companies were found to be distributing copyrighted or illegal material via their networks. He will also provide an overview of Isis Forensics latest developments.

Awais Rashid is Director of Research and Development for Isis Forensics. He has extensive expertise in engineering of cybersecurity systems and developing techniques to protect individuals and organisations online. He was the lead author of the UK case study for the Internet Governance Forum in 2009 and has been interviewed frequently on national and international media including The Daily Telegraph, Independent and the BBC.

Isis Forensics is an international digital forensics firm which specialises in developing solutions to protect individuals and organisations online. Their focus on R&D has allowed them to develop cutting edge technologies including within the areas of network monitoring, language analysis and online child protection. Solutions include helping organisations to minimise the security, legal and financial risks that Peer-to-Peer (P2P) and file sharing technologies can pose, and more recently the development of the mobile phone child protection app 'ChildDefence', which made international headlines when it was released in February.


Option 4: Technology Strategy Board (Andrew Tyrer) and HW Communications (Dave Lund) - TSB Bids, a Beginner's Guide

During this breakout session, Andrew will cover who the Technology Strategy Board is, what they do and how they can help you to innovate within your business. Andrew will discuss how the TSB consider bids and what they look for in successful companies. Come along for hints, tips and suggestions for bid writing.

David will present a short introduction of two TSB funded projects which aim to solve some of the key issues surrounding online privacy and trust in the rapidly evolving information space:
EnCoRe  - (Ensuring Consent and Revocation) is developing software and processes to make an individual’s consent a more powerful means for allowing them to control what happens to the personal information they disclose to organisations.
TEASE - (Trust Enabling Augmented Reality) is developing innovative tools to assist digital information users in assessing the confidence they should place in the reliability of the information that is presented to them.

The Technology Strategy Board (TSB) is the UK’s national innovation agency. Their goal is to accelerate economic growth by stimulating and supporting business-led innovation. The TSB work right across government, business and the research community - removing the barriers to innovation, bringing organisations together to focus on opportunities, and investing in the development of new technology-based products and services for future markets.

Andrew Tyrer joined the Department of Trade and Industry, on secondment from the National Physical Laboratory, to run the Network Security Innovation Platform in April 2006. He transferred his secondment to the Technology Strategy Board on its inception in July 2007. In March 2008 Andrew became a full time employee of the Technology Strategy Board and now works in the Digital team as a lead specialist. Prior to this he worked for Serco Science at the National Physical Laboratory, where he managed business development for the Division of Enabling Metrology. Immediately prior to this he worked for Serco Group PLC, as a business development manager in their Technology division, working in areas such as speed enforcement, automatic number plate recognition and traffic control systems. From 2006 to 2010 when running the Network Security Innovation Platform he invested over £20m of funding with UK businesses addressing Cyber Security issues.

Dr David Lund leads the Cyber Security and Resilience (CSR) team at HW Communications. David has lead his team through numerous challenging Research and Development projects over the past 10 years closely tracking changes in the availability of technology to help us all, as individuals, to communicate and share information. The challenges posed by the vast fluidity of the information space is seen as the key challenge for the next 10 years as information boundaries are no longer limited to the physical world.

Working with academia, industry, the European Commission and numerous UK Government departments, David's team is currently working on:
- Risk management and technologies for Critical Information Infrastructure Protection (CIIP)
- Resilience in wired and wireless communication
- Vulnerability assessment in complex networks
- Trust, provenance and controlled information exchange
- Privacy and consent management

Academic Breakout Sessions


Option 1: Dr. Bela Chatterjee (Law) - Encryption and the Law

Dr. Bela Chatterjee has a Ph.D in cyberlaw (legal regulation of adult sexual expression online) and has published several papers on adult pornography, the internet and the law. Her current research is on encryption and UK law, focusing on terrorism and child indecency cases.


Dr. Bela Chatterjee will be presentating on the evolution and current status of contemporary English encryption laws (key offences) with a particular focus on child indecency situations. In essence, what is the law currently? How did we get here? What are the particular problems we face now? Will the law be effective from an enforcement/technological point of view? Are there any possible alternatives?


Option 2: Dr. Mark Lacy (Politics) - Cybersecurity and the Politics of Security

Dr. Mark Lacy teaches international relations at Lancaster University. Mark is interested in the emergence of new security problems and will teach on the MSC in Cybersecurity in 2012. He is the author of two single authored books on security politics and the editor of two edited collections.
In the break out session, Mark will discuss some of the potential security problems that inter-disciplinary research on cyber security confronts. Participants will be encouraged to discuss the future of cybersecurity and the problems of security and risk.


Option 3: Dr. Daniel Prince (Computing and Communications) - The Tools of the Hacker

Dr. Daniel Prince is a Teaching Fellow at Lancaster University and has been working in the area of mobile network systems and information security for 6 years. Daniel completed his Undergraduate studies in Computer Systems Engineering in 2000 and went onto complete his PhD in Programmable Ad Hoc Networks in 2004. During his PhD he extensively worked with Mobile IPv6, working to complete an Implementation of Cisco IOS and as part of a team worked to implement the protocol in Windows CE. He now lectures in information security risk management, penetration techniques and digital forensics as part of the MSc in Cyber Security at Lancaster University, for which he is the course director.

In this session Daniel will discuss and demonstrate the type of tools that are freely available to the community and how they are used. There are numerous and powerful penetration testing tools available, free of charge, that range from exploitation frameworks, to information gathering tools, to frameworks for social engineering attack automation. The talk hopes to highlight the sophistication of the threat that modern businesses face.

However, it is not all doom and gloom! Forewarned is forearmed as they say, and once you are familiar with the types of tools out there you will be better prepared to defend yourself. Daniel will therefore go on to discuss strategies for practical defence of your information. Starting with an information-centric approach he will look at ways in which you can provide protection in a strategic way while maximising the protection gained for every pound spent.


Option 4: Dr. Paul Smith (Computing and Communications) - Network Resilience

Dr Paul Smith is a Senior Research Associate at Lancaster University’s School of Computing and Communications.  In general, Paul is interested in the various ways that networked (socio-technical) systems fail to provide a desired service when under duress from various challenges, such as attacks and mis-configurations, and developing approaches to improving their resilience.  In particular, his work has focused on the rich set of challenges that face community-driven wireless mesh networks.  He is currently working on an EU FP7 project called ResumeNet, which is investigating a framework and mechanisms for future Internet resilience.

In this session, Paul will present some of his on-going work on network resilience -- ensuring a network and associated systems continue to function in light of various problems that may affect their operation. Paul will present a high-level strategy for network resilience, a classification of the challenges that networks may face and an overview of a risk assessment process that can be used to identify high impact challenges. The talk will then focus on the problem of Distributed Denial of Service (DDoS) attacks as a case study, which are understood to be one of the most prominent threats today, and some commercial and research perspectives on how to mitigate them. 

The aim is to give participants an introduction to the resilience problem, the types of challenges that exist (which transcend those normally considered under an information security banner), an approach to identifying pertinent challenges in their context and an overview of how to mitigate one of the significant challenges du jour.  Paul is interested in discussing with participants their operational concerns, and how you could collaborate in the future to apply some of the research work in order to mitigate these. 


Option 5: Dr. Coral J. Dando (Psychology) - User Behaviour as an Asset to Security

Cyber-security experts have long recognised the central role of user behaviour to system breaches, but they have paid far less attention to the role of human behaviour in enhancing security. In this presentation I will argue that user behaviour should be viewed as an asset rather than hinderance to security and security investigations. I support this by describing a series of studies in which 'digital scent trails,' which I define as behavioural patterns in the use of all digital media (from mobile phone to wordprocessing), have been used successfully to differentiate suspicious and non-supicious user activity in both open and office-like environments. I will highlight both the challenges that come from integrating and interpreting such data, and also the opportunities that lie ahead. Psychological science is at a point where it can provide, when interfaced with technology, sophisticated inferences about a user based on his or her behaviour. The cyber-security field would do well to capitalise on those developments.


Please contact Carolyn Hayes c.hayes2@lancaster.ac.uk or 01524 510465 if you have any problems with registering.

This event is hosted by InfoLab21 in partnership with the ICT KTN

By registering for this event you agree that your registration data can be shared with the ICT KTN and that you may receive communication from the ICT KTN.


InfoLab21's ISIS Project

This event is supported by InfoLab21 as part of the ISIS project’s regional events programme


About ISIS

Support for BusinessISIS aims to raise levels of ICT investment across the region by providing objective advice, guidance and appropriate ICT solutions to SMEs (Small & Medium Enterprises) throughout the Northwest, supporting business changes to minimise cost and maximise the benefits from ICT, both now and in the future.

ISIS is the first project of its kind in the UK and is delivered under the "Transformational ICT" product, part of the Government's Solutions for Business portfolio, a highly targeted, publically funded suit of products and services offering solutions to real business needs.

More about ISIS



Have questions about Cyber Security Conference 2011? Contact InfoLab21 & ICTKTN
Attendee List Sort by: Date | First Name | Last Name
Show More

When & Where

Lancaster House Hotel

LA1 4GJ Lancaster
United Kingdom

Monday, September 19, 2011 from 9:00 AM to 4:30 PM (BST)

  Add to my calendar


InfoLab21 & ICTKTN

InfoLab21 is Lancaster University's world-class ICT Centre of Excellence.
It is a well equipped, high-tech environment providing ICT support for businesses, business incubation facilities, ICT education & training, and research & development.

The ICT KTN seeks to create a competitive advantage for the UK by facilitating the exchange of knowledge on Information & Communications Technologies.

  Contact the Organizer
Cyber Security Conference 2011
Lancaster, United Kingdom Events Class

Interested in hosting your own event?

Join millions of people on Eventbrite.

Please log in or sign up

In order to purchase these tickets in installments, you'll need an Eventbrite account. Log in or sign up for a free account to continue.