International Conference of Big Data in Cyber Security

Introduction

The world is moving towards Big Data, with Cyber Security and the tracking of network events one of its leading applications. Threats to organisations increase by the day, and many have responded by moving towards the integration of SIEM (Secure Incident and Event Management) to detect malicious activity.

Our conference brings together industry, academia and law enforcement to share insights, ideas, expertise and resources in responding to current security challenges, and in particular to look at the opportunities and challenges in managing and using big data in a cyber security context.

This event is hosted by The Cyber Academy, in collaboration with Hewlett Packard Enterprise, and will investigate best practice in industry and look to future Big Data infrastructures for the benefit of organisations in monitoring security events, and in automated generation of audit information and business analytics.

The application of SIEM is now being applied in many areas including security monitoring, incident response and Cyber Crime investigation. The event aims to showcase best practice in industry and in network investigations.

Pictures from the day

Scope

The areas covered include:

  • insights into current high profile security incidents, their impact, and how they are reported
  • key threats and risks associated with losing business critical data
  • leading tools, techniques and insights in network threat analysis, detection and investigation
  • best practice in implementing SIEM strategy
  • developing and testing effective incident response
  • evolution of the Security Operations Centre (SOC) and its emerging future requirements
  • the need for skills, knowledge and awareness across an organisation

Programme

The conference started at 9:15am.

Time Riady Theatre
Lindsay Stewart Theatre
PGCS Symposium Room 2/05
09.15-09.30 Welcome and Opening Address, Steven Wilson, Head of Europol’s European Cybercrime Centre (EC3)
09.30-10.00 Conference Keynote Address: Swimming in the Tsunami of Data - “think like the bad guy” - Industry Trends and disrupting the adversary, Tim Grieveson, Chief Cyber & Security Strategist, EMEA, Hewlett Packard Enterprise [Presentation]
10.00-10.30 Bare Metal Forensics, Douglas Carson, Solutions Consultant, Keysight Technologies [Presentation] JAKU - Analysis of a Botnet, Andrew Settle, Head of Special Investigations, Forcepoint [Presentation] Big Data: Machine Learning, Heuristic Methods and the Future of Cybersecurity in HPC Environments, Dr. Matthew Craven - Plymouth University
10.30-11.00 Big Data Analytics and Innovation, Simon Arnell, Chief Technologist, Security Services, HPE [Presentation]
Security Analytics, Ben Fountain, Senior Consultant, NCC Group [Presentation]
Incident Response, Vincent Lamb - IT Security Training Ltd
11.00-11.30: Coffee (Foyer)
11.30-12.00 Why Big Data Shouldn’t be Big, Dr Jamie Graves, CEO, ZoneFox [Presentation] Security Operations in Financial Services, Stephen Livingston, Security Operations, Lloyds Banking [Presentation]
Session 1 (see below)

Investigation of Virtual Network Isolation Security in Cloud Computing: Data Leakage, Haifa Al Nasseri, St. Andrew University, PDF

DNS in Botnets and Advanced Persistent Threats, Peter Mclaren, Edinburgh Napier University, PDF

12.00-12.30 Large-scale Log Analysis, David Stubley, 7elements. [Presentation] Data Protection & Privacy, Peter Ridley, UKI Practice Leader, Data Protection and Privacy Practice, HPE
Session 2 (see below)

Introduction to Security Onion, Ross Heenan, Abertay University, PDF

Very Large Scale Digital Forensics (VLSDF), Vassilios Manoussos, Strathclyde Forensics, PDF

12:30-13.30: Lunch (Chapel and Rivers Suite)
13.30-14.00 Large-scale digital forensics, Ian Rainsborough, Guidance Software Overview of Data Lab, Brian Hills, Head of Data, The Data Lab
Mobile Authentication, Dr. Ron Poet - University of Glasgow
14.00-14.30 Splunk User Behavioural Analytics - Machine Learning for Threat Detection, Harry McLaren, Security Consultant, ECS [Presentation] Big data the next generation of cyber security, James Kwaan. ISACA Intelligent IDS, Dr. Naghmeh Moradpoor, Edinburgh Napier University
14.30-15.00 Cyber Security, Eamonn Keane, Detective Inspector, Cyber Crime Unit, Police Scotland [Presentation] Using big data to create engagement agility, Jason McClay, Operations Director, G2G3 Session 3 (see below)

CyberSecurity for the Unbanked, Stephen Ambore, Bournemouth University, PDF

TCloud: Availability at Zero Downtime, Elochukwu Ukwandu, Edinburgh Napier University, PDF

A Survey of Intrusion Detection System technologies, Ross Heenan,Abertay University, PDF

15.00-15.20 Coffee (Foyer)
15.20-15.40 Securely Networking Big Data Environments’, Stephen Hampton, Chief Technology Officer, Hutchinson Networks [Presentation]
15.40-16.00 Cyber Hunting, How to Catch Your Prey, Rashmi Knowles, RSA, The Security Division of EMC
16.00-16.20
Closing Address: Mandy Haeburn-Little, Director of the Scottish Business Resilience Centre
16.20-16.40
Q & A Panel
16.40-16.55
Concluding Remarks/The Cyber Academy

Capture The Flag

The Cyber Academy and RSA will be hosting a cyber ‘capture the flag’ competition in room 0/09, 11:00 – 13:00.  We invite 6 teams of 3 to take part in this challenge; measuring skills, tactics and professionalism.  Spaces are limited - sign up at the CTF desk in the Foyer between 08.45 – 09.15.

Research Sessions

Research Session 1 and 2:

  • Investigation of Virtual Network Isolation Security in Cloud Computing: Data Leakage, Haifa Al Nasseri and Ishbel Duncan, St. Andrew University. PDF
  • DNS in Botnets and Advanced Persistent Threats, Peter Mclaren, Dr Gordon Russell and Prof Bill Buchanan, Edinburgh Napier University. PDF
  • Introduction to Security Onion, Ross Heenan and Naghmeh Moradpoor, Abertay University and Edinburgh Napier University. PDF
  • Very Large Scale Digital Forensics (VLSDF), Vassilios Manoussos, Strathclyde Forensics. PDF

Research Session 3:

  • CyberSecurity for the Unbanked, Stephen Ambore, Christopher Richardson, Huseyin Dogan, Edward Apeh and David Osselton, Bournemouth University. PDF
  • TCloud: Availability at Zero Downtime, Elochukwu Ukwandu, Prof Bill Buchanan and Dr Gordon Russell, Edinburgh Napier University. PDF
  • A Survey of Intrusion Detection System technologies, Ross Heenan and Naghmeh Moradpoor, Abertay University and Edinburgh Napier University. PDF

Speakers

The bios are here Conference Speakers

The bios are here PGCS-symposium Speakers

Sponsor of the PGCS-symposium:

Book for the event

Contact

Your Name (required)
Your Email (required)
Your Organisation
Role
Message (if any)

Partnership

This conference is being delivered in partnership between Hewlett Packard Enterprise and The Cyber Academy: