International Conference on Cyber Crime & Legal Compliance

Detecting and preventing cyber crime while being compliant has never been more complicated. Compliance protects your business continuity as well as your clients' data and personal information from potential attacks or breaches that might cause financial loss, risk your reputation, and lead your company to face sanctions. In addition, compliance works for your competitive advantage, allowing you to offer your clients data and data transfer security.

During the International Conference on Cyber Crime and Legal Compliance, participants will hear about sensitive issues for data protection security and the biggest risks, norms and regulations of the moment. They'll also touch on the economic aspects of compliance, including how companies can and should prevent and protect themselves from data breaches, economic sanctions, cybercrime, and how to ensure legal compliance with national and international regulations.

The Conference offers education on the topic of 'Cyber Crime and Legal Compliance', outstanding networking opportunities with tech and law experts, a complimentary lunch and question and answer sessions with speakers Gaynor Ogden-Sutton, Former Head of the Public Defender Service of England and Wales, Maka Petriashvili, Cyber Security Expert, Co-founder of CYSEC Cyber Security Educational Center, John Chain, Blockchain Expert, Founder and President of Chain Enterprises LLC, Nevada, USA, and Maksim Iavich (Cyber Security Expert, Professor of Computer Science, Founder and President of Scientific Cyber Security Association).

Conference participants will be introduced to Data Protection, get to watch a cyber-crime simulation in real time, and learn hands on the importance of pen testing and the ways to prevent and catch cyber criminals. Guests will also have the chance to network with Tech and Law Experts, find out more about regulations and legislation for Data Protection and how to avoid data breaches, economic sanctions and cyber-attacks. Find out more about the speakers below:

Gaynor Ogden-Sutton

Gaynor is an Oxford University, Balliol College, Law graduate and master’s degree holder, Solicitor and High Court Advocate. She currently advises the Governing Board of Educational Providers of South West England on constitutional, legal governance, issues. Gaynor has an exceptional background and expertise in criminal law, having been a Senior Crown Prosecutor from 1989 to 1991. Throughout her impressive legal career as a specialist criminal law practitioner, she has been involved in notable cases e.g. changing the definition of ‘suspect’ and bringing about changes in the Police and Criminal Investigation Code. The Legal Services Commission of England and Wales has sent Gaynor to lecture and advise in Mexico, Columbia, Malawi, Lithuania and Georgia on the establishment of legal defense systems and the management of government legal organizations.

Maka Petriashvili

Maka has worked at the Ministry of Defense of Georgia since 1999, specializing in cyber security, military intelligence, defense policy and planning, human resources and strategic defense review. She worked as a human resources and organizational development consultant in the Cyber Security Bureau and coordinated the Cyber Security Awareness Project in 2015-2016. She is also involved with cyber security awareness training and has participated in the development of NATO’s Cyber Security Generic Reference Curriculum. She holds a Master’s degree in security studies from the US Naval Postgraduate School in Monterey, California, and a Master’s degree in Human Resource Management from the University of Manchester, England.

Maka is involved in various cyber security projects as a lecturer on cyber security, cyber hygiene and cyber bullying.

John Chain

Long before founding Chain Enterprises LLC in Nevada, USA, John Chain had been tackling unique problems in technology. From as early as age 11, when he took over his family’s IBM XT computer, he experimented with a bulletin board based on Wildcat! BBS and dove into Slackware Linux from a CD in the back of a computer magazine, soon after Phrack, Alt 2600, and DEFCON l to self-study in software development and offensive Cyber Security.

John recently retired in Colorado after spending 12 years as a Green Beret with the 10th Special Forces Group of the US Army. During his service he developed offensive and defensive cyber solutions, worked as a Department of Defense trainer alongside a penetration testing organization within the defense community, developed custom built solutions with single board computers and off the shelf electronics, and managed various exercises and events around the globe with multinational partners.

When Bitcoin surfaced in 2009, he did some research and dedicated several machines to mining. Although the old mining hardware has long since disappeared, his dedication to explore and develop within the blockchain space continues to grow. No longer content with simply mining, John focuses his tech energy on creating unique solutions with existing hardware. His latest project leverages GPU mining hardware to create cluster machine learning and distributed rendering solutions.

Maksim Iavich

Maksim is a distinguished cyber security academic and practitioner, heading the Cyber Security Department at Caucasus University, and was named ‘Best Young Scientist of the Year’ by the Shota Rustaveli National Foundation in his homeland of Georgia. Internationally, Maksim is known as a prominent speaker at global cyber security and hacking conferences. In 2018, Maksim was the keynote speaker on Defcamp9, one of the biggest hacking conferences in Europe. He is certified in cyber security by international universities such as Stanford and Maryland. Maksim is involved in various, international scientific cyber security projects as the key researcher, and a highly skilled cryptographer and software penetration tester.

06 May 2019 17:25