Event Format

With plenary sessions and a dedicated series of education seminars that form part of the main agenda, this event provides practical strategic, tactical and technical knowledge to information security stakeholders on how to manage threats and overcome challenges. Networking opportunities are provided over the course of the event during refreshment breaks and a buffet lunch.

Plenary Sessions Education Seminars Networking Breaks

2015 Key Themes

Protecting and detecting: using actionable intelligence to prevent attacks and fraudulent activity as early as possible
  • Utilising cyber threat analysis and monitoring logs to increase awareness of ever-more targeted, automated and advanced threats
  • Implementing technologies such as SIEM, big data analysis and intelligence tools to gain visibility, detect vulnerabilities and mitigate threats across your IT environment   
  • Managing fraud risk across all channels and strengthening anti-fraud controls & proactive fraud detection capabilities

Data, people and access: identifying critical assets, balancing risks with availability requirements and securing the sharing of information 
  • Understanding the interaction between users and data to aid productivity internally and minimise the possibility of inadvertent data leakage
  • Successfully classifying users and effectively managing user privileges to reduce opportunities for accidental or malicious insider incidents  
  • Implementing scalable and flexible solutions that provide secure and convenient information sharing to employees, partners, and customers

Maintaining information security programmes: building dynamic processes and policies and ensuring company-wide compliance
  • Managing the right mix of people, process and technology to deliver security and protect customer trust
  • Increasing the effectiveness of user awareness training to combat spear-phishing and social engineering attempts
  • Developing appropriate and concise documentation to improve your information security program and meet compliance requirements
Organisation-wide collaboration: delivering value through security by successfully engaging company stakeholders 
  • Working alongside the board and company management to maintain momentum and secure budget
  • Making risk relatable across the board so security becomes seen as an enabler rather than a blocker 
  • Maximising return from investment and company resources, whilst meeting the changing business needs
Rapid incident response: facilitating swift forensic investigations and minimising impact on company reputation
  • Preparing efficient and comprehensive incident response plans to effectively minimise the ramifications of a breach  
  • Implementing procedures promptly to mitigate financial loss and impact on share prices
  • Following legal requirements efficiently, including notification and reporting requirements
Outside the organisation: managing third party risk and industry collaboration 
  • Managing risk across the supply chain and implementing information security requirements for third parties and  outsourced partners 
  • Working with law enforcement and government bodies to enable investigations and facilitate prosecutions for cyber crime
  • Cooperating with national and international actors to limit the impact that the evolution of cyber espionage and attacks on critical infrastructure might have on the organisation
The evolving technology landscape: keeping pace with developments in the market, changes in regulations and the increasingly mobile workforce
  • Managing the implications of cultural and technological workplace shifts such as the evolution of social media, BYOD and the decline of the office-based workforce
  • Understanding the implications of new and evolving regulations, standards and laws
  • Recognising and mitigating the risks associated with harnessing the power of new technologies and changing infrastructures, such as cloud and virtualisation