With the ever-increasing cyber threat we have moved towards all-encrypted IP networks in order to secure our information and to allow information with different sensitivities to share the same infrastructure. This is a powerful approach, but within it there are dangers to avoid, associated with traffic analysis and machine learning, as well as threats to some of our most useful tools such as deep packet inspection and WAN acceleration.
This presentation looks at the issues, and for many the surprising results, that are now arising with an all-encrypted approach as the publicly published research starts to highlight the art of the possible.
--------------------------------------------------------------------------------
SPEAKER
Professor Brian Turton
----------------------------
AGENDA
6.30pm: Registration & Refreshments
7.00pm: Brian will begin his presentation
7.45pm: Take a break and chance to talk and network
8.15pm: Brian will continue the presentation
8.45pm: Q & A
9.00pm: Meeting ends
--------------------------------------------------------------------------------
SYNOPSIS
With the ever-increasing cyber threat we have moved towards all-encrypted IP networks in order to secure our information and to allow information with different sensitivities to share the same infrastructure. This is a powerful approach, but within it there are dangers to avoid, associated with traffic analysis and machine learning, as well as threats to some of our most useful tools such as deep packet inspection and WAN acceleration.
--------------------------------------------------------------------------------
SPEAKER BIOGRAPHIES
Professor Brian Turton (Email:Brian.Turton@Airbus.com) has worked in the area of secure communications for over 15 years with what is now Airbus Defence and Space Limited, with particular connections to the University of South Wales Information Security Research Group. Prior to that he was a lecturer at Cardiff University for nearly 10 years.
Brian has spent many years overseeing the technical aspects of government research into secure information infrastructure (ESII and CSIIS) and has provided independent technical advice to government through programmes such as the International Technology Alliance (ITA). In addition, he has been involved in the architecture, design and development of a variety of large-scale secure communications systems.
--------------------------------------------------------------------------------
THIS EVENT IS BROUGHT TO YOU BY:
Nottingham and Derby Branch
Visit: https://nottmderby.bcs.org/
For overseas delegates who wish to attend the event please note that BCS does not issue invitation letters.