Lock Key

Aiming to bring a flavour of established IT Security events from the major centres down to the South West, Tom, Jay and Hannah made the short trip down to the Robbins Conference Centre in Plymouth to check out this free event organised by the University of Plymouth. Website here.

Talks

A lot on content was squeezed in to a single day, with a variety of speakers covering a spectrum of security issues from HP, Kaspersky and The Global Identity Foundation to name but a few.

An anticipated talk on real world cyber security was sadly missed as Monster Worldwide speaker Craig Goodwin was unable to make it to the event, but organiser Prof. Steve Furnell filled in with an eye-opening talk from his own research on the psychology of password creation and the (perhaps not surprising) failings of some big names and online account creation.

Topics of Note

Paul Simmonds

Paul Simmonds

Paul Simmons from the Global Identity Foundation spoke on maintaining secure online identities alongside the   need for anonymity – raising a number of moral an ethical issues and a few ‘what ifs’ around the individuals security online and the consequences of losing your global identity.

Christopher Smith

Christopher Smith

  Christopher Smith of Green Hills Software took us through secure separation kernels and how the methodology used for security and safety critical systems in the medical, automotive and aeronautics industries might be applied to systems a little more down to earth.

Marta Janus

Marta Janus

  Taking over from colleague David Emm’s (Kaspersky Lab) talk on the human factor in security, Marta Janus unravelled the anatomy of the Red October virus, giving us a more in-depth look at its deployment and activity; concluding with some, not unsettling, theories as to possible perpetrators. We’re sworn to secrecy!

Dr Maria Papadaki

Dr Maria Papadaki

  Dr Maria Papadaki of Plymouth University encouraged us to get ourselves hacked (in an organised, professional manner of course) with a look at the methodologies behind penetration testing. A look at the costs incurred by even small companies from network breaches makes this a good idea for all of us.