Lectures and Conferences
Newrisk Limited has an established record of delivering presentations at both private and public events. Internal talks to organisations and government entities are available on request and can be tailored to suit clients' requirements. Newrisk Limited is also able to deliver conference papers and after dinner talks on a variety of topics and topical events, including those subject areas set out in the expertise area of this site.
To request or discuss a proposal for a lecture or conference talk, please contact Newrisk Limited directly.
Recent Lectures and Conference Talks
A sample of recent lectures and conference talks include:
- 'Defeating Strategic CNI Cyber Threats: Generic Human and Systems Enablers', Opening Keynote Lecture Cyber Security for Critical Infrastructure (CSCI), Professional Development Course, Bristol (England) for the Institute of Engineering and Technology in September 2015;
'Aviation Cyber Weapons, Comparing Cyber and Human Factor Risk across Aviation and the Built Environment Sectors' for the Register of Security Engineers Meeting in London (England) in July 2015;
- 'A Snapshot of the Emerging Threat Horizon in Cyberspace', 7th Annual Chief Security Officer Conference and Roundtable in Lisbon (Spain) in December 2013: Emerging threats in smart cities, intelligent buildings, interconnected systems and human interfaces are a challenge for security leadership within companies and governments. Broadening the attack surface analysis is proposed as a step towards pre-empting critical loss events and maintaining trust in company systems and government capability. Contents covered:
- A Wider Attack Surface: Top Threats – cyber and physical
- Emerging Vulnerabilities – smart cities and intelligent buildings
- SCADA and layered attacks on cities
- Critical National Infrastructure (including Cloud and Big Data) - an asymmetric weapon
- Wikileaks/Snowden and Human Factor Interface Vulnerabilities
- Critical facts to know about Security of Reputation - media and social media
- Soft Wars and Proxies for Nation States – North Korea, Iran, Syria
- Participants Discussion
- Top threat scenarios EU and Rest of the World?
- Systems of Systems Approaches to Integrated Security
- 'Cyberterror and Proxy Conflict Risk – Solutions and CNI Resilience', Keynote, ICS-CSR 2013: International Symposium for ICS & SCADA Cyber Security in Leicester (England) in September 2013. Cyberterrorism is a key threat to national security. Emerging risks of layered terror attacks that comprise physical and cyber threats are discussed alongside human factor failures through the Wikileaks and Snowden security breaches and risks of social media exploitation during an attack. Added to this are new vulnerabilities in infrastructure from trends in cyber connectedness for intelligent buildings and smart cities which may present unexpected failure points under a terror attack. Blue sky research is recommended for solutions to CNI resilience through novel system of systems design for catastrophic failure, changes in human interface management and a review of whether current top critical security controls are adequate: more online. ICS-CSR 2013 is a research conference on security of industrial control systems in the light of their increasing exposure to cyber- space.
- ‘Effects of solar storms (ElectroMagnetic Pulse EMP) on system critical control devices, CNI and solar storms: Integrating risk mitigation’, Paper for 'Solar Storms, Building a business case to protect and prepare ground based infrastructure against geomagnetic storms' for the Institution of Technology and Engineering in London (England) in April 2013: discussing case examples of water and communications: 1. Risk Thresholds - remembering Fukushima; 2. Top Events and Catastrophic Risk - Integrated Risk Management; 3. CNI Stakeholder Business Case Development - Risk Management or Transfer? Quantifying Consequences and Residual Risk. Quantifing Mitigation Options. 4. Media and Scientific Communications; 5. Psychology of Public Response; 6. Confounding Factors in Solar Events - 'end of world', terrorism, state sponsored cyber attacks; 7. CNI Solutions Summary - top event definition, principles for risk management, risk communications to stakeholders, public communications, technical solutions and risk appetite;
- 'CBRNE/Cyber Terrorism: Technical briefing for ‘Exercise London' - Lecture for the Ministry of Defence, Terrorism Causes, Trends and Responses, Knowledge Transfer Programme at the University of Bradford, School of Social and International Studies in April 2013;
- 'Managing Shock Attacks on Cities: Multiple Terrorist, Nuclear or Cyber Threat Horizons' - Keynote and Planning Lecture for CEOs at the Sixth Chief Security Officer Summit in Berlin (Germany) in December 2012;
- 'Scientific Solutions for CBRNE Terrorism and Catastrophic Events with Reflections on Fukushima and Norway, Situational Awareness, Communications, Evacuation, Shelter, Risk' - Co-chair for the Permanent Monitoring Panel on Mitigation of Terrorist Acts at the 'Role of Science in the Third Millenium, International Seminar on Nuclear War and Planetary Emergencies', 45th Session in Erice (Italy) in August 2012.
- 'Permanent Monitoring Panel Report on Terrorist Acts' - Lecture to the 'Role of Science in the Third Millenium, International Seminar on Nuclear War and Planetary Emergencies', 45th Session in Erice (Italy) in August 2012.
- 'Water and CBRNE/Cyber Terrorism: Waterborne threats and sustainability of cities including unusual secondary and tertiary water contamination lessons from Fukushima' - Presentation to the 'Role of Science in the Third Millenium, International Seminar on Nuclear War and Planetary Emergencies', 45th Session in Erice (Italy) in August 2012.
- 'London in 2012: Terrorism, Catastrophic Incidents and Helpful Hints' - Presentation to the High Premium Group Annual Conference in London (England) in April 2012.
- 'International Terror Threats to London in 2012' - Briefing to UK Police and Business in Manchester (England) in March 2012.
- 'Resilience to Increasing Terror Threats: African Piracy and Aviation' - Keynote Paper to the Security Africa Summit in Cape Town (South Africa) in November 2011: discussing the increasing terror threat impact on international trade and reputation across Africa. For example, terror connections with piracy threatens the security of ports, government stability and the important international maritime trade. Piracy and aviation threats, especially liquid explosives, are top challenges for the reputation and resilience of African nations. Testing counter terrorism resilience and information governance which are new roles auditors are embracing, alongside heads of security and chief executive officers.
- 'Cyber Infrastructure & Physical Security: Evaluating Case Studies of London in 2012 and Bulk Cargo; Managing Catastrophic Risk in Security Architecture: Insider Threats, Integration of Intelligence and Terror Threats' - Keynote Paper to the 2nd Annual Information and Communications Technological Security Africa Conference in Accra (Ghana) in September 2011: discussing catastrophic risk within the African continent, including terrorism and organised crime, evolving cyber threats to infrastructure, reputation risk and the media, border security and cyber architecture. Case studies considered bulk cargo (particularly, the sugar industry), identification of critical infrastructure, shipping and port risks, vulnerability and recovery.
- 'Cloud Catastrophic Risks & Reputation Assurance for Chief Intelligence Security Officers: Risk Insights' - Paper to the Cloud Security Forum in Rome (Italy) in June 2011: discussing the potential for cloud vending to provide a breakthrough in business costs and outsourcing of assurance risks. Highlights included the consideration of new challenges for CISOs and the creation of a new internal security framework to take account of cyber threats, reputation risk, transparency, business drivers, uncontrollable risk variables and risk metrics.
- 'Strategic Approaches to Catastrophic Risk of Fraud and Corruption: New Lessons from London in 2012 and other Cases Studies including Wikileaks' - Paper to the 5th Annual Fraud and Corruption Summit in Copenhagen (Denmark) in April 2011: strategic partnerships and catastrophic risk auditing are essential components in fraud and corruption management. The imminent danger of cyber crime is a driver for reforms in policing and security risk management. This lecture addressed the development of audit principles for catastrophic risk reduction, strategic dominance of cyber crime and future security policies, the significance of audit assurance processes including internal audit, reputation loss and the media (especially with respect to Wikileaks). The case studies in this lecture assessed emergency services reform, corruption at the local level, fraud and procurement, budget impacts, risk reduction by way of major reforms and governance deliverables.
- 'Catastrophic Risk Briefing' - Presentation to the High Premium Group Annual Conference in London (England) in April 2011.
For further details of previous presentations, please refer to the relevant areas of expertise which are accessible under the site menu. To request Newrisk Limited's assistance in connection with a proposed lecture or conference talk, please contact Newrisk Limited directly.