Key Themes & Event Format
With plenary sessions and a dedicated series of education seminars that form part of the main agenda, this event provides practical strategic, tactical, and technical knowledge to information security stakeholders on how to manage threats and overcome challenges.
Networking opportunities are provided over the course of the event during refreshment breaks and a buffet lunch.
|Key themes for 2012|
Protecting information and IT assets at the speed of business: rethinking defence in depth to meet the need for data-centric security
Cloud, social networking, outsourcing and workforce mobilisation offer the opportunity for businesses to decrease cost and increase productivity. However they also expand the attack surface and make it challenging to demonstrate compliance to numerous entities.
Unlocking the power of IT and security data to enhance risk management capabilities: advancing metrics and measuring effectiveness
In a changing business and technology environment, the ability of an enterprise to safeguard electronic assets and IT systems without limiting operational flexibility or increasing complexity will be determined by how risk is managed.
Adapting the controls environment to account for changing attack vectors and threat profiles: achieving balance across people, process and technology
Previous evolutions in the threat landscape demonstrate that cyber attacks that rely on a broad range of compromise create the conditions for those that follow to be stealthier, increasingly automated and more targeted.
Advancing incident response to ensure a fast reaction to identified threats: closing windows of vulnerability and facilitating forensic investigations
External threats from state sponsored attackers, organised crime syndicates and 'hacktivists' are all becoming more sophisticated. There is a high probability that organisations will, at some point, have to deal with a critical event.
Collaboration, cooperation and communication: working with internal and external stakeholders to prevent, detect and respond to cyber threats
Intelligence is key to an organisations’ ability to get ahead of the curve. Industry, government and intelligence agencies are actively building models for collaboration with the aim of protecting intellectual property and critical infrastructure.
Privacy, policy and practice: changes in the regulatory environment and their implications for securing and protecting personally identifiable information
Industry bodies and governments are seeking to introduce further IT and data security regulations, for example the recently announced EU Breach Disclosure Law. Organisations must find more cost-effective and less time-consuming ways of meeting compliance requirements, while also ensuring spending on compliance improves security posture.
2012 Principal Sponsor
2012 Strategic Sponsors
2012 Education Seminar Sponsors
2012 Networking Sponsors
2012 Networking Break Sponsor
2012 Event Guide Sponsor