Your Search

  • Topic Area

    • Governance, risk and compliance Remove
  • Company Size

  • Type of Content

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 24 of 35 results

|

Items per page:

Sort By
  • Workshop 3: CISSP Preview: A Risk Based Approach to Security

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Risk and security remain inextricably linked, this workshop examines practical approaches to the effective management of this important relationship, including ...

    • Language: English

  • Workshop 2: Stressless ISMS: How Shakespeare Helps When Setting Up an ISMS

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    The session will contain two parts, one in which practical aspects of how to set up and run a certified ISMS are explained and another containing examples of se...

    • Language: English

  • What’s New with the ePrivacy Regulation? Key Considerations for Tomorrow’s Electronic Communications

    Tuesday11:15 - 11:4504 Jun 2019
    Talking Tactics

    The ePrivacy Regulation will have a profound effect on marketing activities moving forward. Faced with the legal and financial ramifications of ignoring a consu...

    • Language: English

  • The Key to Securing Your Hybrid Cloud Starts with "ABC"

    Tuesday11:20 - 11:4504 Jun 2019
    Technology Showcase

    Many enterprises are adopting a cloud-first strategy to drive their business. As cloud deployments increase, security requirements increase with them, leading t...

    • Language: English

  • The Digital Risk Dilemma: How to Protect What You Don’t Control

    Tuesday12:40 - 13:0504 Jun 2019
    Strategy Talks

    Everyday more of your attack surface moves to web infrastructure that you neither own nor directly control. To protect your digital assets and thwart malicious ...

    • Language: English

  • Using Shipbuilders Wisdom to Protect Data Centres & Clouds

    Tuesday13:20 - 13:4504 Jun 2019
    Technology Showcase

    In today’s modern, hyper-connected and threat-laden enterprise landscape, the time has come to shift from traditional walls-based protection into a flexible sec...

    • Language: English

  • SSH Keys: Security Asset or Liability?

    Tuesday13:20 - 13:4504 Jun 2019
    Strategy Talks

    All enterprises rely on SSH for routine administrative tasks by systems administrators, as well as for secure machine-to-machine automation of critical business...

    • Language: English

  • Securing SMEs Symposium

    Tuesday14:00 - 16:3004 Jun 2019
    Securing SMEs Symposium

    Implementing Information Security Controls to Manage Risk in the SME When: Tuesday 4th June, 14.00-16.30 Where: Pillar Hall, Olympia The 2018 Verizon Data Br...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Tuesday15:05 - 15:2004 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding rout...

    • Language: English

  • How to Find Infrastructure Shadow IT in the Cloud

    Tuesday15:15 - 15:4504 Jun 2019
    Talking Tactics

    The cloud has enabled increases in agility and cost savings in IT, but has allowed employees to buy and provision out-of-policy cloud infrastructure without app...

    • Language: English

  • Privileged Access Management Made Easy

    Tuesday16:00 - 16:3004 Jun 2019
    Talking Tactics

    Keeping sensitive information secure, maintaining data regulation compliance, and enabling privileged users to work efficiently, at the right levels of access, ...

    • Language: English

  • The Song Remains the Same: Moving the Cybersecurity Dial…

    Tuesday16:00 - 16:2504 Jun 2019
    Strategy Talks

    We're still victim of vulnerabilities which are more than 20 years old despite the evolution of cyber security solutions in the same period.  How can we truly ...

    • Language: English

  • Personality Traits Meet Cybersecurity

    Tuesday16:40 - 17:0504 Jun 2019
    Strategy Talks

    The art of “people hacking” tricks people into unwillingly participate in scams. Certain personality traits make people more (and less) likely to fall prey to s...

    • Language: English

  • View from the Board: Managing Organisational Complexity & Risk

    Wednesday11:25 - 12:0505 Jun 2019
    Keynote Stage

    Keynote Presentation During this presentation Dame Inga Beale, former CEO of Lloyds of London will share her perspective on how to change business and culture a...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Wednesday11:45 - 12:0005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding rout...

    • Language: English

  • Don’t Acquire Your Next Breach: Managing Vendor Risk Under the GDPR

    Wednesday11:45 - 12:4505 Jun 2019
    Information Security Exchange

    Managing vendor risk before, during and after onboarding is a continuous effort under the GDPR and impending data protection regulations. While outsourcing oper...

    • Language: English

  • The Future of Cyber Employment

    Wednesday12:35 - 12:5005 Jun 2019
    Cyber Innovation Showcase

    For every 100 cyber jobs posted on Indeed.com there are only 32 applicants, a skills gap that TechCrunch describes as a gigantic problem for 2019. According to ...

    • Language: English

  • How the UK’s Data Protection Act of 2018 Impacts Your GDPR Programme

    Wednesday12:45 - 13:1505 Jun 2019
    Talking Tactics

    While the UK's Data Protection Act of 2018 complements the GDPR, there are several key pieces that impact how individual's personal data is managed. The Act sup...

    • Language: English

  • Whose Transformation is it Anyway? How IT Security Teams can Support Digital Services

    Wednesday13:00 - 14:0005 Jun 2019
    Information Security Exchange

    Ask any CIO what phrase they have been asked about most often in the past year, and digital transformation is probably the most common response. Digital transfo...

    • Language: English (United Kingdom)

  • Integrating Cyber Risk into an Enterprise Risk Management Strategy: The CRO’s Perspective

    Wednesday13:45 - 14:2505 Jun 2019
    Keynote Stage

    Cyber risk is listed one of the top 10 risks in terms of both likelihood and risk  in the WEF Global Risk Report 2019. There is no doubt that cyber risk is a co...

    • Language: English

  • The Rise of the Data Subject

    Wednesday14:30 - 15:1505 Jun 2019
    Insight Stage

    The impact of GDPR after 367 days, the complexity of GDPR, how businesses have had to change post GDPR and how Kingston can help you to deal with it. Over 1 yea...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Wednesday14:40 - 15:0505 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • How to Optimise Investment in Cybersecurity Tools, Technologies & Products

    Wednesday14:40 - 15:3005 Jun 2019
    Keynote Stage

    Panel Discussion - CISOs in Conversation Peddling fear, uncertainty and doubt is a criticism that is frequently levelled at information security vendors with a...

    • Language: English

  • National or Sectorial Cybersecurity Capability Build-Out: Capability Assessments, CSIRT/SOCs, Threat Landscapes & CIIs

    Wednesday15:15 - 15:4505 Jun 2019
    Talking Tactics

    The session will cover cybersecurity capability build-out via cybersecurity capability assessment, establishment of cybersecurity framework, role of threat land...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.