Wednesday 18th - Friday 20th March 2015

At this 5th Global Cybersecurity Technology Research Summit we will once again bring the international research community together with industry leaders and government policy makers from around the world to discuss the industry’s research challenges over the next 5-10 years. This year’s Summit will have a theme of A Future Legacy - What can we promote at this Summit that will have a lasting positive impact on our industry and community? We welcome you to join us again or anew to be a part of Belfast 2015: A Future Legacy.

Summit Report

The Belfast 2015 Summit Report is now available.

Keynote slide decks

Confirmed Keynote speakers


Confirmed Breakout Panellists


Briefing Document

Breakout Sessions

+ Startups

Session 1: A Cyber Pre-Accelerator - Constructive destruction of CSIT’s proposed new Programme

So cyber innovator… you have an idea, you see a need, you may have a team and you are confident of getting finance. But there is one thing missing - the product! How do you develop the product fast? Where do you get easy access to the engineering talent and ecosystem to bring it all together? What you need is a Pre-Accelerator. Somewhere where you can access rapid prototyping capability and have your idea turned to reality.

Financier/accelerator… you meet an innovator, you see a concept you believe in, but you need to see it teased out further than a slide deck. Where do you direct the concept to in order to access talent and a wider ecosystem to bring it all together? What you need is a Pre-Accelerator. Somewhere you can point the innovator to and bring your interest, or seed investment through to serious traction.

This session will outline the need and have an expert panel that will Masterclass and springboard CSITs proposed Pre-Accelerator Programme, and together with delegates, provide the best quality feedback and adjustments to perfectly position this Programme to fill a gap in the National Cyber Security Innovation ecosystem… A Programme that can springboard cyber security innovators in academia, industry and government agencies, and pump prime traditional Accelerator Programmes with proven viable technology propositions.

Moderated by Steve Orr, Director, NISPConnect, an expert panel will feature contributions from Stephen Wray, Commercial Director at CSIT, Alex van Someren (Amadeus Capital), Gibb Witham (Paladin Capital), Sandy McKinnon (TechStartNI), Jon Bradford (TechStars), Paul Smith (CyLon), Zach Tudor (SRI International) and Stuart Laidlaw (Cyberlytic).


Session 2: Cyber Security’s biggest opportunities! - A lively debate on the problems screaming out for entrepreneurs to solve

An expert panel will answer the question. "If you were going to start a new business in cyber security right now, what problem/need would you like to solve?” This session will address the question and dovetail into a discussion on ‘lean ways to find product/market fit fast’. 

Often start-ups/entrepreneurs "Get brilliant ideas and hope for the best”. Starting with technology, developing a product, and providing a solution with the aim of giving meaning or value to a market need. Wouldn’t it be better to…“Get close to brilliant needs and work back”? Starting with meaning, developing solution, finding the right technology and turning that to product! Zach Tudor (SRI International) will give a brief talk and our panel will debate the issues.

Moderated by Stephen Wray, Commercial Director, CSIT, the panel includes Alex van Someren (Amadeus Capital), Sandy McKinnon (TechStartNI/Pentech Ventures), Amit Mital (Symantec) and Suren Gupta (Allstate).

+ Securing the Human

Session 1: Cyber-securing the Human

Co-facilitators: Mary Aiken & Doug Maughan

Cyber behavioural profiling: In this forensic cyberpsychology session participants will explore a multi-disciplinary approach to determining modus operandi and motivation regarding cyber-crime and insider threat events.

Using examples of such events and compromises provided by the co-facilitators and participants the aim is to explore patterns, organisation, typological behaviours and motivations of threat actors with a view to implementing multi-faceted detection, protection and prevention strategies. Cybermethodology recommendations along with technological, data, human and ethical requirements of various approaches will also be explored.

Session 2: Hactivism

Co-facilitators: Dr Michael Bourne, Leonie Maria Tanczer, Dr Kieran McLaughlin

Hacktivism: Perceptions of digital disobedience in the context of the tech-industry and the technical, ethical, legal and societal implications of politically motivated hacking.

Hacktivism is a relatively new form of political activism, utilizing technology and the internet for political means. It is a conflation of hacking and activism, whereby activism comprises actions taken to promote change in opposition to prevailing powers. It includes various methods along the line of categories of dissent, resistance and rebellion.  At present it is frequently associated with collectives such as Anonymous or LulzSec.

Current definitions and depictions of hacktivism are often negative and do not reflect affirmatory intentions of this form of online activism which were often centred around the idea of using technology to improve human rights across electronic media. Under the present framework hacktivism is treated as a security issue equalised with terrorism, criminal activities and ‘juvenile vandalism’. Its political connotations are suppressed for the technical and security challenges this activity may comprises.

This break out session would like to discuss the perceptions around the concept of hacktivism and identify its challenges in regard to technical, legal as well as ethical and societal terms. It is structured along the lines of a focus group and centred on questions such as: Can we take advantage of this form of online activism and are there opportunities to legitimise disobedience online? Where are its limits and boundaries? Could hacktivism be considered as a transfer of human rights to the internet i.e., right to protest? Is it part of digital citizenship and what practical steps can inter-disciplinary research organisations take to create awareness for the right to protest online?

+ Technology

In this stream participants will discuss new and emerging technologies for cybersecurity and their potential to be "game changers". What technologies could disrupt the current state of affairs, render some existing problems and solutions obsolete, and turn the tables on attackers? 

Session 1: Advanced Anti-Malware Technologies

This includes new network protection devices, and endpoint protection in the form of detection and isolation through sandboxing or virtualization. 

Session 2: Big data collection and analysis for cybersecurity

This includes detailed event and causality tracking and autonomous predictive analysis enabling faster-than-human threat mitigation.

This stream forms part of the Network in Internet and Mobile Malicious Software (NIMBUS) international engagement activity. NIMBUS is an Engineering and Physical Sciences Research Council (EPSRC) funded project which will act as a catalyst to develop a balanced programme of both blue skies research and near term applied research that will assist in the fight against cyber crime in the UK. 

+ Ecosystem

The Ecosystem: Building a holistic community to drive Cybersecurity innovation (Bewiser)

Innovation ecosystems are complex, featuring many different actors from academia, industry and government. In some regions these three groups are formally bound to create so-called ‘triple-helix’ clusters which represent the shared strategic interests of all three groups. In other regions this binding is much less formal, with the groups coming together for specific projects or initiatives and focussing on more short-term tactical objectives.

During the first part of the session, delegates will hear about BEWISER, a European FP7 project focussing on building stronger innovation ecosystems across the regions of Europe, specifically in the field of wireless and internet security. The project partners, coming from seven different countries, will present an outline of project activities to date, and a Joint Action Plan (JAP), a series of concrete actions based on best practices which have been identified in exemplar regional ecosystems.

The second part of the session will offer the opportunity for in-depth discussion innovation ecosystems and the assessment of the benefits of formal ‘triple-helix’ clusters. The BEWISER team will briefly present findings of a comparison of formal and informal ‘triple-helix’ regions, after which delegates will be invited to share their own experiences of such models. Delegates will then discuss the challenges of building innovation ecosystems at regional level, and the issues that need to be addressed in extending collaborations beyond a local ecosystem and on to the international stage. Delegates will be encouraged to explore how they might help support the activities of the BEWISER Joint Action Plan, and, more importantly, understand how they might benefit from the future activities of the BEWISER project. 

Building Enterprises – Wireless and Internet Security in European Regions (BEWISER) is a European FP7 project bringing together partners from seven European regions with very different approaches to the triple helix cluster model. With the rapid expansion in wireless based devices, many undertaking complex and often highly confidential transactions, the security of data transmission is increasingly important as billions of objects are connected via the Internet of Things. The main objective of the project is to identify strengths and weaknesses of the different ecosystem models with a view to identifying areas of best practice, and enabling different regions to benefit from the experience of the others.

Note – this breakout session will feature the same agenda and content on both days in an effort to draw as wide a range of delegates as possible. 

Belfast 2015 Briefing Document
Belfast 2015 - Summit Report

In This Section