Keynote Speaker Category: Cybersecurity & Dark Net,
Edwin (Eddie) Doyle, is the Global Security Strategist at Check Point Software Technologies, where he works with corporations across the globe to identify risks that emerging threats in cyber security, cyber forensics pose to people, assets and interests. As a result, he enables industry professionals to anticipate, identify, measure and mitigate those threats the world over through the psychology of peak performance, best practice and bold decision making. See more in his full Bio below: –
Below are topics that have proven valuable to customers in the past and are meant only to suggest the speakers range and interests. Edwin tailors each presentation to the needs of his audience and is not limited to the topics we have listed below. Please ask us about any subject that interests you; we are sure that we can accommodate you.
EMOTIONAL CYBER SECURITY
Cyber-Security is a warfare of psychology, not technology; psychology has its roots in our biology; programmed by our DNA, is the survival instinct to avoid looking weak and foolish at all costs. Understanding innate biological influences on our decision-making criteria will therefore set the foundation to successful cyber-security adoption of best practices. Having the best expertise, satisfying the toughest technical requirements and understanding employee skillsets are the foundation of an essential security architecture, but they are just not enough.
In 1939, Polish resistance forces captured a Nazi Enigma machine and successfully smuggled it to England, where the British Admiralty were presented with a challenge never before seen in modern warfare; to break a cipher of over 159 million, million, million daily possible variations; with pen and paper! Instead of looking to traditional clandestine spy work, intelligence services sought the leadership of a little-known mathematician, Alan Turing, who rose to the challenge by inventing something new (a computer) to solve the mystery of the Enigma, becoming the unsung hero of WWII.
Today, with over 1.8 billion web sites and over 7 billion IoT devices, criminal syndicates have billions of attack vectors to explore. Exploit kits are offering a weaponised Internet to anyone with nefarious intent. Standing between them and your corporation are the unsung heroes of cyber security. In this session, discover how the department of the CISO is making efforts to keep you safe from cyber
HACKING THE BOARDROOM.
This interactive chalk-talk discussion will educate CxOs/Board members on the massive scale of cybercrime organisations, the severity and financial impact of a hack and the reputational damage to the company’s brand when compromised. Edwin will interpret the business-focused dialogue of a Board, with the technical needs of the office of the CISO. Additionally, he will make predictions on future attack vectors, helping leaders from both the business and cyber agree on a fortified corporate security strategy, working together as a team! View a synopsis of the chalk-talk here: https://youtu.be/MLy2FJynwiM
HACKERS’ CODING ETHICS, CRACKED VIA MALWARE DNA SEQUENCING.
Machines will be soon be making ethical decisions! In a survey across 200 countries to answer just one question, MIT’s Dept. of Computers, Robotics and Philosophy assembled over 40 million data points, to solve the dilemma of when a driverless car is facing an unavoidable crash but must decide who should live and who should die. Humans are teaching machines to do the unthinkable… decide our fate!
In this fascinating talk Edwin will talk about how to prevent cyber-crime, relying on the advancements A.I. has made in identifying unknown threats through sequencing the DNA of Malware.
TITLE OF KEYNOTE: CYBERWARFARE 101.
The cyber landscape has three layers: Nation States. Bad Actors. Gigantic platforms.
In this session, the audience will learn about the cyber arms race by Nation States. The Bad Actors stealing weapons from those Nation States and the gigantic platforms the criminals use to attack us. Come hear how White Hat Hackers beat back cyber-criminal syndicates on a daily basis, lowering your Threat Response time to seconds and minutes.
In the media:
The evolution of the Ciso
One of the best ways to avoid a security breach at your company is to make sure employees are well informed of cyber risks, and the best ways to prevent them. Edwin ‘Eddie’ Doyle has dedicated his career to helping corporations avoid these malicious cyberattacks.
Edwin ‘Eddie’ Doyle is a Security expert and Cyber Security Keynote Speaker. In his Keynotes he talks about identity theft, hacking, and other cybersecurity attacks which can be detrimental to a business, leaving employees, customers, and company information vulnerable.
Eddie provides leading cyber threat intelligence to Check Point Software customers and also in his Keynotes to the greater intelligence community.
At Checkpoint, the research team collects and analyzes global cyber attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. From the moment a breach is initiated, ThreatCloud begins sharing data across the entire network, providing researchers with the intelligence they need to deeply analyze and report on attacks. Check Point Research publications and intelligence sharing fuel the discovery of new cyber threats and the development of the international threat intelligence community to keep you secure.
Eddie is regularly featured as a security expert in leading media outlets & analysis, via keynote addresses, panel discussions & interviews.