Last year I went to the infosecurity EUROPE conference and exhibition and I have to say the presentation and format of the exhibition is very good and was probably the best large scale exhibition I visited. It's on the same time as Counter Terror Expo 2012 and although very different is well worth going along if you like security technologies of a differing sort.
WE HAVE MOVED - CHECK OUT OUR NEW HOME!
Please hold the line........the caller knows you are waiting and we are trying to connect you........
Showing posts with label CISO. Show all posts
Showing posts with label CISO. Show all posts
Tuesday, 20 March 2012
Information Security Breaches 2012 - Questionnarie
Research is currently being undertaken to identify information security breaches for 2012. Below is a link to a questionnaire, this is being conducted by infosecurity - Europe, in association with the department for Business, Innovation and Skills (BIS) and PricewaterhouseCoopers LLP.
Monday, 20 February 2012
Press Release - Tech:Touchstone: Information Security Executive Summit 2012
I am attending and presenting at the following Information Security Summit. The organisers contacted me today and asked if I could share today's Press Release. Please see below the composed release for the Information Security Summit that I will no doubt talk more about before, during and after.
Tech:Touchstone announces its 3rd Annual Information Security Executive Summit from the 28th - 29th February at the Richmond Hill Hotel. The 3rd Annual Information Security Executive Summit will cover the critical issues and considerations that Information Technology and Information Security leaders need to be mindful of when planning their IT strategy for 2012 and beyond.
Speakers at the event include: Tony Hird, Chief Technologist at British Airways Plc, Christophe Gabioud, Global Head of IS at UBS Investment Bank, and Michael Paisley, Head of IS, DP & Business Resilience at Santander UK Group. Each speaker will bring their unique take on how their business implements Information Security Strategy and Technology on a daily basis, as well as the major trends to look out for in 2012.
The summit brings together the most decision ready Senior IT Executives, the foremost Analysts and Vendors in the Information Security Technology Community to network, discuss and learn about the latest developments in Information Security. It has proved crucial for many businesses to assess their current technological standing and build new relationships and alliances in markets which rely more and more heavily on technology for day to day business process.
“We are excited to host such a high level group of thought leaders in the Information Security space representing some the UK’s largest organisations” said Simeon Turner Managing Director of Tech:Touchstone, “The new threats created by increased workforce mobility and the move to cloud infrastructures is forcing constant reassessment of key strategies. We look forward to facilitating an engaging debate!”
The Information Security Executive Summit 2012 will look to build upon previous year’s success of bringing the best in business together to formulate and build new partnerships. Sponsors of the event include: Symantec, TrendMicro, Imperva, Caretower, Netwrix, FoxT and Loghythm
About Tech:TouchStone
Tech:Touchstone creates business-to-business events, with its latest event being the Information Security Executive Summit on the 28th-29th February, for the IT sector where face-to-face communication is paramount to fully understand complex issues, solutions and value propositions.
The company's portfolio of events focuses on areas of strategic industry debate and growth market sectors, with the aim of creating a collaborative learning environment for time-poor IT executives and to facilitate high value, quality interactions between all participants.
If you’re interested in attending this event or any other please contact the Tech:Touchstone team on 0208 166 4390 and follow them on Twitter @TechTouchstone
Wednesday, 8 June 2011
8th Annual CISO Summit Rome 2011
Day One - Cyber Crime Risk
Following the Cloud Summit day one of the 8th Annual CISO Summit and Roundtable starts with Detective Superintendent Charlie McMurdie, Head of the Police Central e-crime Unit (PCeU). Providing an overview of the National approach to cyber crime programme. 'National harm, national impact' and briefly shares some limited details on several success stories on arrest operations.
Don Randall, Chairman of the 'Sister Banks' gives his opinion on some of the threats as he sees it and some opportunities to engage with all levels of staff.
Mike Maddison and Sir David Pepper from Deloitte raise the level with Cyber risk should be at board level.
A very interesting and dynamic presentation by Michael Colao, Head of Information Security at Beazley on Insuring against cyber security risks.
And now for the break and expresso.
Back from a break and now it's Don Randall MBE, Master of The Worshipful Company of Security Professionals who announced yesterday (7th June 2011) the first ten Registrants have been admitted to the new Register of Chartered Security Professionals who is chairing the panel on 'Advanced persistent cyber threats and critical infrastructure protection'.
Amongst the panelist are Charlie McMurdie, Jim Reavis of Cloud Security Alliance, Eddie Schwartz newly appointed Head of Security at RSA who got a big laugh at his introduction of company. So far we talked about Olympics, 7/7, cyber crime and data loss but obvisouly no public comments on the current RSA issues, to soon me thinks.
Very informative discussion from the panel and nicely rounds off the first part of the days proceedings. A final presentation from one of the sponsors Courion then it's lunch and more expresso.
Now back from lunch, which incidentally was good I especially love the fact wine was on the table. You've got to admire the Italians approach to eating.
Next up is the turn of Dr Simon Singh on 'The science of secrecy' which was fascinating and inspired by that presentation I've decided to leave and concentrate on my own presentation for tomorrow on Combating and Managing Security Risk through Security Assurance.
I have been very impresses with the quality of the presenters and MIS Training who organised the event no it's off to sponsored drinks and dinner in the centre of Rome somewhere. More tomorrow and my turn in front of this very experienced audience.
Day Two - Security Governance
The second day starts for me with a presentation on Beyond the Cloud by the very entertaining Ray Stanton of British Telecom and there was some funny moments between him and the chair Marcus Alldrick CISO Lloyds.
Next up Dr John Meakin from BP discussing BP's approach to information security.
Lunch and wine complete now back with a presentation by Nils Puhlmann co-founder and CSO of Zynga who created Mafia Wars and other similar games and apps talking about security innovation - are we keeping up.
Next the Technology challenge of identity and access intelligence by my new friends and tour guides at Whitebox Security. Shlomi Wexter discusses. Very passionate and interesting talk.
CISO 'Think Tank' up next. Time for me to prepare for my presentation on Security Risk and Assurance.
Presentation delivered, off for a quick meeting about planning the Round Table slot, drink then dinner.
Final full day for me tomorrow, will be busy with the Round Table section of proceedings, then travelling home so will hopefully will post a wash up in the next couple of days.
Following the Cloud Summit day one of the 8th Annual CISO Summit and Roundtable starts with Detective Superintendent Charlie McMurdie, Head of the Police Central e-crime Unit (PCeU). Providing an overview of the National approach to cyber crime programme. 'National harm, national impact' and briefly shares some limited details on several success stories on arrest operations.
Don Randall, Chairman of the 'Sister Banks' gives his opinion on some of the threats as he sees it and some opportunities to engage with all levels of staff.
Mike Maddison and Sir David Pepper from Deloitte raise the level with Cyber risk should be at board level.
A very interesting and dynamic presentation by Michael Colao, Head of Information Security at Beazley on Insuring against cyber security risks.
And now for the break and expresso.
Back from a break and now it's Don Randall MBE, Master of The Worshipful Company of Security Professionals who announced yesterday (7th June 2011) the first ten Registrants have been admitted to the new Register of Chartered Security Professionals who is chairing the panel on 'Advanced persistent cyber threats and critical infrastructure protection'.
Amongst the panelist are Charlie McMurdie, Jim Reavis of Cloud Security Alliance, Eddie Schwartz newly appointed Head of Security at RSA who got a big laugh at his introduction of company. So far we talked about Olympics, 7/7, cyber crime and data loss but obvisouly no public comments on the current RSA issues, to soon me thinks.
Very informative discussion from the panel and nicely rounds off the first part of the days proceedings. A final presentation from one of the sponsors Courion then it's lunch and more expresso.
Now back from lunch, which incidentally was good I especially love the fact wine was on the table. You've got to admire the Italians approach to eating.
Next up is the turn of Dr Simon Singh on 'The science of secrecy' which was fascinating and inspired by that presentation I've decided to leave and concentrate on my own presentation for tomorrow on Combating and Managing Security Risk through Security Assurance.
I have been very impresses with the quality of the presenters and MIS Training who organised the event no it's off to sponsored drinks and dinner in the centre of Rome somewhere. More tomorrow and my turn in front of this very experienced audience.
Day Two - Security Governance
The second day starts for me with a presentation on Beyond the Cloud by the very entertaining Ray Stanton of British Telecom and there was some funny moments between him and the chair Marcus Alldrick CISO Lloyds.
Next up Dr John Meakin from BP discussing BP's approach to information security.
Lunch and wine complete now back with a presentation by Nils Puhlmann co-founder and CSO of Zynga who created Mafia Wars and other similar games and apps talking about security innovation - are we keeping up.
Next the Technology challenge of identity and access intelligence by my new friends and tour guides at Whitebox Security. Shlomi Wexter discusses. Very passionate and interesting talk.
CISO 'Think Tank' up next. Time for me to prepare for my presentation on Security Risk and Assurance.
Presentation delivered, off for a quick meeting about planning the Round Table slot, drink then dinner.
Final full day for me tomorrow, will be busy with the Round Table section of proceedings, then travelling home so will hopefully will post a wash up in the next couple of days.
Day Three - Round Table
This is the part of the event that more and different people that haven't been at the summit turn up especially for this discussion. This is the opportunity for any and all to be involved in the questioning and challenging today's issues through a series of pre prepared and supplied questions by the audience. This is also the first time I have been invited to do something like this so I am very much looking forward to assisting in facilitating the day.
Unfortunately I cannot say too much about the content as we all promised up front to be discreet ('Chatham House Rule' apply) or more simpler, The first rule of the Round Table is you do not talk about the Round Table, the second rule of the Round Table is ...... well you can see where I am going with that so I'll stop there. Nothing further to report only that I have been very surprised by the fact I've actually learnt a few new things and met some interesting people which I intend to keep in touch with and as conferences go that doesn't happen very often, of course the food and wine was typically Italian . Ciao per ora. Richard
Posted by Richard using BlogPress from my iPhone
Posted by Richard using BlogPress from my iPhone
Labels:
CISO,
cyber security,
cyber terror,
Deloite,
e-crime,
infosec,
insider threat,
Richard Bell
Subscribe to:
Posts (Atom)