CSX NORTH AMERICA

CSX EUROPE

CSX ASIA PACIFIC

31 OCTOBER - 2 NOVEMBER  |   LONDON, UK

EXPLORE. EXCHANGE. EXCEL.

 

KEYNOTES

SPONSORS

ACTIVITIES

AGENDA

VENUE

29

30

31

1

2

SATURDAY

TIME

FUNCTION

LOCATIONS

7:00-17:00 Workshop Registration

Arora Ballroom Foyer
7:00-8:30 Workshop Breakfast

 
9:00-17:00 WS1 - CSX Fundamentals

 
10:30-11:00
Workshop Refreshment Break

 
12:30-13:30 Workshop Lunch

 
15:00-15:30 Workshop Refreshment Break

 

JUSTIFY YOUR ATTENDANCE

For information security professionals, nothing is more imperative than staying ahead of the curve. ISACA’s Cybersecurity Nexus applies five decades of best-practice IT knowledge towards the most advanced cyber security training program in the industry.

 

Attendees will gain cyber security skills that will help their organization:

 

Identify - Develop the organizational understanding to manage cybersecurity risk to systems, assets, data and capabilities.

Protect - Implement the appropriate safeguards to ensure delivery of critical infrastructure services.

Detect - Discover cybersecurity events and potential events quickly and effectively.

Respond & Recover - Accurately execute and assess the correct actions to manage a security event.

Defend – Become a hands-on innovator in sessions and activities that range from witnessing the Global CyberLympics World Finals to getting in on the action of data protection and recovery.

Explore - Leverage thought leadership and proven experience on processes, technologies and techniques that are newly emerging as “Megatrends” and solutions for cybersecurity and information systems professionals around the world.

 

 

SUNDAY

TIME

FUNCTION

LOCATIONS

7:00-13:00 Workshop Registration

Arora Ballroom Foyer
7:00-8:30 Workshop Breakfast

 
9:00-17:00 WS1 - CSX Fundamentals

 
10:30-11:00
Workshop Refreshment Break

 
12:30-13:30 Workshop Lunch

 
15:00-15:30 Workshop Refreshment Break

 
17:00-19:00 CSX Cybersecurity Nexus Conference Welcome Reception

Arora Ballroom Foyer

Connecting Women Leaders in Technology

 

Join ISACA’s exciting new pilot program–Connecting Women Leaders in Technology–at CSX 2016 Europe.

All attendees are invited to the networking event Tuesday evening focused on empowering women within the global technology workforce. Come join in on the fun and make new connections that help accelerate your career to new levels at this entertaining, interactive Connecting Women networking event.

MONDAY

TIME

FUNCTION

LOCATIONS

7:00-17:00 Registration

Arora Ballroom Foyer
7:00-8:30 Continental Breakfast

 
8:30-9:30 Opening Keynote - Collaboration is the Weapon of Choice in the Fight against Cybercrime
Raj Samani

 
9:30-10:00 Morning Expo Hall Networking and Refreshment Break

 
10:00-11:00

111 - Art of Performing Risk Assessments
112 - The Document Tree: A Highway Code to Creating Effective Policies
113 - Understanding Covert Channels of Communication
114 - 101 to Threat Information Sharing
115 - Biometric Authentication - Combat Crime

 
11:00-11:15 Session Movement Break

 
11:15-12:15 121 - Cybersecurity Skills Audit
122 - Cyber Warfare & Critical Infrastructures: the New Threats to Security
123 - Masking APT and Hacking Vectors with DDOS
124 - Future of Mobility – Evolving Cybersecurity Landscape
125 - Cyber Risk = Business Risk

 
12:15-13:30 Expo Hall and Lunch Buffet
Sponsored Lunch & Learn Session (RSVP required)

 
13:30-14:30 Afternoon Keynote - Mind The Gap: Analyzing cybersecurity controls that few organizations are implementing, and why.
Justine Bone

 
14:30-14:45 Session Movement Break

 
14:45-15:45 131 - Dark Web Markets: From the Silk Road to Alphabay, Trends and Developments
132 - Encryption, Encryption, Encryption!
133 - A Year of Vulnerability Scanning Lessons
134 - Practical Workshop on Incidents Handling (Part 1)
135 - Cybersec in Complex IT Environments

 
15:45-16:15 Networking Break

 
16:15-17:15 141 - Cybersecurity Threats, Vulnerabilities and Attack Vectors within your Data Center - The Open Back Door
142 - Intro to the Dark Web
143 - Cybersecurity in Industrial Control Systems
144 - Practical Workshop on Incidents Handling (Part 2)
145 - Defend Session announced soon!

 
17:15-19:15 Expo Hall Networking and Cocktail Reception

 

TUESDAY

TIME

FUNCTION

LOCATIONS

7:30-17:00 Registration

Arora Ballroom Foyer
7:00-8:30 Continental Breakfast

 
8:30-9:30 K3 Morning Keynote - The Human Factor: Cyber Security is Made out of People
Misha Glenny

 
9:30-10:00 Networking break

 
10:00-12:00 CSX Cyberchallenge – morning session

 
10:00-11:00

211 - Digital Forensics Challenges in the Age of Big Data
212 - ISO 27032:2012-Guidelines for Cybersecurity
213 - Check Before You Wreck Operationalizing the Verizon Data Breach Investigation Report (DBIR)
214 - Strangers in the Night
215 - Kickstarting European Security Solutions

 
11:00-11:15 Session Movement Break

 
11:15-12:15 221 - Control Outsourcing. Is Compliance Best We Can Do?
222 - Why it's Safe to Pay with Your Mobile Phone
223 - Penetration Testing
224 - Become Your Own Malware Fortune Teller
225 - Do you Have a Hackable Car?

 
12:15-13:15 Sponsored Lunch & Learn Session (RSVP required)

 
12:15-13:30 Expo Hall and Lunch Buffet

 
13:30-14:30 Afternoon Plenary Session Discussion - Cybersecurity Information Exchange Panel
Eddie Schwartz

 
14:30-14:45 Session Movement Break

 
14:45-17:15 CSX Cyberchallenge – Afternoon Session

 
14:45-15:45 231 - Using NIST SP800-53 Principles
232 - Modern Exploit Mitigations
233 - Is Your Company Ready for A Cyber Investigation? (Part 1)
234 - Planning for Response
235 - DevSecOps & the Future of Enterprise Security
236 - Connecting Women in Technology: If You Don’t Ask, You Don’t Get

 
15:45-16:15 Afternoon Expo Hall Networking and Refreshment Break

 
16:15-17:15 241 - Lessons from a Red Team Exercise
242 - Cyber Governance Risk and Compliance
243 - Is Your Company Ready for A Cyber Investigation? (Part 2)
244 - T-18m: Are you ready for GDPR?
245 - Active Defense

 

WEDNESDAY

TIME

FUNCTION

LOCATIONS

8:00-12:15 Help Desk

Arora Ballroom Foyer
7:00-8:30 Continental Breakfast and Networking

 
8:30-9:30 311 - How to Manage the Cybersecurity of Hundreds
312 - Sustainable Cyber Defense Techniques
313 - Footprinting and Information Exposure Risks (Part 1)
314 - Cybersecurity Incident Management Applied
315 - Responding to Targeted Cyber Attacks

 
9:30-9:45 Session Movement Break

 
9:45-10:45

321 - Wake-Up Call? Fight Back Against Cybercrime
322 - Let’s go Phishing in the Wild OAuth Seas
323 - Footprinting and Information Exposure Risks (Part 2)
324 - Recover timely and get back to Business – Yeah right?!
325 - Defend Session announced soon!

 
10:45-11:00 Session Movement and Refreshment Break

 
11:00-12:15 Closing Keynote - 'The Time has Come' - Cybersecurity in the 21st Century
Dr. Simon Moores

 

Cyber Challenge

Dive deeper into your interactive cybersecurity experience with the CSX Cyber Challenge. Go head-to-head with conference colleagues and compete for exciting prizes in a game of Panopoly. Professionals at every skill level are welcome! Be sure to reserve your spot when you register for CSX Europe 2016.

 

Panoply is a timed competition event. At the beginning of the competition, common resources are available for teams to scan, assess and penetrate. To claim ownership of a service, teams must plant their flag, an assigned hexadecimal string, inside the banner of the service. An automated scanner detects ownership changes and awards ownership of the service to the team whose flag appears in the service banner. At random intervals, an automated scoring engine checks the status and functionality of all critical services. If a team has ownership of a functional critical service during a successful service check, that team is awarded points for owning and maintaining a critical service. Teams accumulate points for each critical service they control, and continue to accumulate points as long as they own and maintain those critical services. Teams that fail to secure resources and services they have captured may have them taken away by rival teams. Throughout the competition, new resources are added to the common pool, forcing teams to choose between defending existing assets and going after new assets. The team with the highest point total at the end of the competition wins.

 

The customized competition levels are described below:

The targets available during each session will be geared toward the advertised skill level.

 

Beginner:  The targets in the beginner session will consist mainly of systems with well-known, easily exploitable vulnerabilities.  Targets may contain accounts with no password, easy to guess or default credentials, vulnerabilities that are directly exploitable via Metasploit, backdoors on well-known ports, and so on.  These targets are designed for players with little to no assessment/exploitation experience.

 

Intermediate/Advanced:  The targets in the Intermediate/Advanced session will consist primarily of systems requiring a higher degree of skill and experience in assessment and exploitation techniques.  Targets may contain SQL injection vulnerabilities, allow user access but require privilege escalation for administrator/root access, contain hidden backdoors, contain PHP-based backdoors, be partially protected by firewalls, and so on.  Most of the targets will require multiple steps and privilege escalations to obtain root/administrator level access.

OCTOBER

OCTOBER

OCTOBER

NOVEMBER

NOVEMBER

SESSIONS & WORKSHOP

The riverside InterContinental® London - The O2 hotel stands out in the buzzing Greenwich Peninsula as one of the most exciting luxury hotel additions in the past year. Featuring chic, granite bathrooms, the hotel’s contemporary rooms offer complimentary Wi-Fi, smart TVs and desks. The hotel is a 10 minutes' walk from the North Greenwich tube station and 6 miles from the Tower of London. The Thames Clipper and the Jubilee line offer fast links to London’s West end and London City Airport.

 

In addition to being the center of all CSX 2016 Europe Conference activities, spectacular Canary Wharf, City of London and Greenwich views can be enjoyed over cocktails in Eighteen Sky Bar, or from one of several dining destinations in the hotel. The legendary O2 arena is steps away via a covered walkway as is the soaring Emirates Air Line , which transports you over the River Thames to ExCel London and the restaurants and cafes of the redeveloped Royal Victoria Dock.

Make new connections and liven up your experience at CSX by participating in the following activities.

Each activity is designed to enhance your cyber experience while you have fun!

CSX Cyber Challenge Competition

Take advantage of the first free hands-on cyber gaming session while attending CSX! The founders of the National Collegiate Cyber Defense Competition are hosting beginner and intermediate sessions of competitive game play on Tuesday, November 1. Test your skills or learn new ones by bringing your personal laptop to participate, earn CPE, and win prizes!

The Cyber Challenge is a network assessment and network defense competition. Individuals will be able to compete for control of common resources and the critical services on those resources. You will be able to accumulate points for controlling and operating critical services such as SMTP, DNS, HTTP, HTTPS, SSH, and so on.

 

 

 

Connecting Women Leaders in Technology

Amazing things can happen through facilitated peer-to-peer networking, including having careers leap forward! All CSX 2016 attendees are welcome to join in on the fun and make new connections at this dynamic, interactive event.

 

Tuesday, 1 November

 

Sunday, 30 October

 

Welcome Reception

Kick off the conference with a constructive and relaxing networking reception while picking up your Conference credentials. This will be your first opportunity to network and make new contacts, reconnect with colleagues, solution providers and the CSX Cybersecurity Nexus team.

 

Monday, 31 October

 

Expo Hall Networking and Cocktail Reception

Enjoy another festive opportunity to meet solution providers in a relaxed atmosphere. Nosh on appetizers and unwind with colleagues in what could be the best happy hour you’ve attended in years.

 

London Intercontinental – The O2 | London, United Kingdom

1 Waterview Drive

Greenwich Peninsula

SE10 0TW

T: +44 (0)20 8463 6868

IDENTIFY

Develop the organizational understanding to manage cybersecurity risk to systems, assets, data and capabilities. Learn how to focus and prioritize your organization’s efforts, consistent with its risk management strategy and business needs. The Identify track explains asset management, business environment, governance, risk assessment and risk management strategies.

 

Implement the appropriate safeguards to ensure delivery of critical infrastructure services. The Protect track teaches access control, awareness, and training data security, information protection, processes and procedures, maintenance and protective technology.

 

DETECT

Discover cyber security events and potential events quickly and effectively. The Detect track focuses on anomalies and events, security, continuous monitoring and detection processes.

 

RESPOND

Accurately execute and assess the correct actions to manage a security event. The Respond track covers response planning, communications, analysis, mitigation and improvements.

 

RECOVER

Develop plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. Initiate timely recovery to normal operations to reduce operational impact. The Recover track examines recovery planning, improvements and communications.

 

DEFEND:

Go from spectator to hands-on innovator in sessions and activities that range from participating in the CSX Cyber Challenge to getting in on the action of data protection and recovery.

 

EXPLORE

Leverage thought leadership and proven experience on processes, technologies and techniques that are newly emerging as “Megatrends” and solutions for cyber security and information systems professionals around the world.

 

WORKSHOP

Online —Including Early Bird Savings

Register and Pay Online before 11:59 pm CDT (UTC-5) Monday, 24 October 2016

US $1,550 member / US $1,750 non-member

 

Onsite

Register and Pay after Monday, 24 October 2016

US $1,950 member / $2,150 non-member

 

Justify Your Attendance

Supporting Sponsors

See what attendees loved about 2016’s CSX conference in London.

Thank you to all our attendees!

CSX 2016 Europe has come to a close and was a resounding success. We would like to thank all of our speakers and volunteers for helping to create an energetic and collaborative learning atmosphere. But most importantly, we would like to thank all of you who attended. None of this would be possible without your passion for learning and dedication to your profession.

PRICING

 

LONDON LOCAL ATTRACTIONS

© 2016 ISACA. ALL RIGHTS RESERVED