This breakout session will share approaches to securing your OT environments, with discussions amongst participants on the strategies, skillsets, and tools needed to increase resilience.
With traditional approaches to OT monitoring largely focusing on network-based products, this session will specifically look at other areas organisations may be overlooking. These include:
Defining OT threat intelligence requirements
Upskilling OT incident responders
Approaches to active and passive scanning, and log aggregation and extraction
Determining which IT controls can also be applied in the OT space
Session Hosts
Martin Riley
Director of Technology, Bridewell
Keith Gilbert
Principal System Engineer, Forescout
In this breakout session, participants will look at practical applications of the Cyber Assessment Framework (CAF) and how it can be used to enhance defences against real world threats.
Looking at real world scenarios and case studies, participants in this workshop will discuss how appropriate alignment to the CAF outcomes could have prevented or mitigated these cyber incidents.
This session will provide practical strategies for leveraging the CAF to drive cyber security improvements as well as meeting regulatory requirements.
Session Hosts
Emran Ali
Associate Director - Cyber Security, Bridewell
Scott Hudson
Principal Consultant, Bridewell
In this TLP RED session we will cover the tradecraft required to investigate and track adversary infrastructure. Attendees will be able to play along if they so wish whilst Gavin and Josh walk through several practical threat hunts to uncover both APT and criminal infrastructure.
The presenters will also cover how Bridewell have automated the infrastructure tracking process to provide near real-time detection and the advantages of leveraging a research driven approach to generate indicators of attack over the use of indicators of compromise.
This introductory session is designed for those looking to strengthen their understanding of adversary infrastructure and improve their organisation's approach to threat intelligence through automation.
Session Hosts
Gavin Knapp
Cyber Threat Intelligence Principal Lead, Bridewell
Joshua Penny
Senior Cyber Threat Intelligence Analyst, Bridewell
With AI tools becoming commonplace, it's increasingly important to understand the impact they have on data privacy.
In this session, participants will learn how to make the most of AI within their business while maintaining best practice for data privacy. This includes how to determine when you should and shouldn't be using AI, how to mitigate risks, and how to embed data privacy by design.
Workshop participants will also explore the laws, regulations, and frameworks governing AI and data privacy, and what they must do to comply. Participants will hear from experts about how to continue meeting data protection requirements, create strong risk treatment plans, and use AI ethically.
Session Hosts
Chris Linnell
Associate Director of Data Privacy, Bridewell
Aimee Bush
Principal Consultant, Bridewell
"Bridewell’s CNI Summit is my only must attend event each year. The carefully curated list of speakers, workshops and attendees in the inaugural summit were second to none. You’ll find bigger events, and you may find events which cover more topics, but you’ll seriously struggle to find anything which is more worthy of a day of your time.”
Jon Pocock – Global Head of Information Security, Alfa Financial Software Ltd