Keynote Address
Cyber security - who says we are safe?
Mike St John-Green, Independent expert in cyber security, UK
|
Session 4a: Integrating the Human
|
Session 4b: Cyber Assessment of
Systems
|
4.a.1
Securing the human to protect the system: Human factors in cyber security
M G Lee, Symantec.cloud, UK |
4.b.1
System security assessments using a cyber range
H Winter, Northrop Grumman Information
Systems Europe, UK |
4.a.2
Safety enhancement through situation-aware user interfaces
V De Florio, C Blondia, University of
Antwerp and IBBT, Belgium |
4.b.2
Emerging good practice for cyber security of industrial control systems and SCADA
R S H Piggin, Atkins, UK |
Keynote Address
The safety of complex engineered products - what's changed since Haddon-Cave?
Dr Chris Elliott, Director, Pitchill Consulting Ltd, UK
|
Session 5a: SILs – The enduring challenge
|
Session 5b: Governance
|
5.a.1
The uses and abuses of ASIL decomposition in ISO 26262
D Ward, S E Crozier, MIRA Ltd, UK |
5.b.1
The four principles of product safety
N Sibley, B Walby, D Priestley, BAE Systems,
UK |
5.a.2
Agonising over ASILS: Controllability and the in-wheel motor
M Ellims, H E Monkhouse, Protean Electric Ltd, UK |
5.b.2
Trust and control: A safety model for people and organisations
W A Hoskins, ARCADIS UK Ltd, UK |
Session 6a: Incident Assessment
|
Session 6b: Trends and Assurance
|
6.a.1
The SAVE ME project real-time disaster mitigation and evacuation management system
I Tsekourakis, C H Orlis, D Ioannidis,
D Tzovaras, Information Technologies
Institute, Greece |
6.b.1
A framework for determining the sufficiency of software safety assurance
R D Hawkins, T P Kelly, University of York, UK |
6.a.2
(SMA)2 - A social media audience sharing model for authorities to support effective crisis communication
S Raue, C W Johnson, T Storer, University of Glasgow, UK |
6.b.2
Emerging technologies with the potential to impact safety in defence
P R Caseley, G T Strong, D J Holland Smith,
K J Bown, B K Madahar, Dstl, UK |