REGISTER

email 14 48

Barclays

When: Apr 08 2010 10:00 am

Presenting: Michael Spadea, Head of Privacy, Barclays Wealth

Michael presents a case study on achieving global privacy which won the 2009 IAPP award for innovation, he will also demonstrate how this framework can be applied by any other company navigating their way through ambiguity.

Enterprise Privacy Group

When: Apr 08 2010 6:00 am

Presenting: Toby Stevens, Director, Enterprise Privacy Group

As the country goes to the polls, the three main parties have committed to specific policies on Privacy, Data Protection and Security. In particular, the Conservatives have promised radical reform in these areas. What changes are we likely to see once the new government is elected?

KAUST

When: Apr 08 2010 3:00 am

Presenting: Phil Cracknell, Head of Information Security; KAUST

Phil is regarded as one of the Europe's leading information security and compliance specialists. He has over 20 years experience gained in a variety of high-profile technical and managerial security roles.

Accenture

When: Apr 08 2010 4:00 am

Presenting: Bojana Bellamy, Director of Data Privacy, Accenture

Bojana Bellamy has over 15 years of working experience in international data privacy law and practice. Bojana works for Accenture as Global Data Privacy Compliance Lead, based in the company's London offices.

overcoming

When: 16 Apr 2010 5:00 am

Presenting: Seyi Okanlawon

In order for ITIL adoption to be successful, the cooperation and commitment of the stakeholders (i.e. management, users and service providers) is required.

outside

When: 15 Apr 2010 3:00 pm

Presenting: Ian Clayton, Principal, Service Management 101

The next generation of service management initiatives carries the ‘B' prefix - and like the ‘IT' prefixed initiatives that preceded them, they will likely fail the customer. Why?

its time

When: 15 Apr 2010 2:00 pm

Presenting: Evelyn Hubbert, Senior Analyst, Forrester

IT is still struggling with growing pains, meaning that the current economic conditions present a catalyst for change and an opportunity to mature.

When: 15 Apr 2010 12:00 pm

Presenting: Ken Wendle, ITSM Industry Advocate at itSMF

What is the true value proposition behind what is known as "ITIL V3"?

When: 15 Apr 2010 10:00 am

Presenting: Lynda Cooper, Managing Consultant, Service 2000 Limited

ITIL and ISO20000 are extensively used in the IT environment. But the future points towards a more business focused world. There have been frequent challenges to extend ITIL and ISO20000 into business processes but these have been resisted up to now as being too difficult. Now is the time to consider this next step.

When: 15 Apr 2010 8:00 am

Presenting: Howard Kendall, Founding Director, SDI Europe

Howard Kendall is hosting this Rountable discussion

paneltn2

In this Executive Podcast Discussion Aberdeen Group's GRC Analyst Stephen Walker conducts an intriguing dialogue with 3 leading IT-GRC Vendor's; CA's Chris Fox, eFortresses John Dimaria and Aline's Roland Mosimann. The discussion covers the recent Aberdeen Group IT-GRC survey results and looks at some best practices and cost effective measures organizations can take to overcome the issues. Gain leading Market Intelligence by listening to this podcast.

handle

When: 25 Mar 2010 1:00 pm

Presenting: Ben Rothke; Senior Security Consultant, BT Professional Services

Getting a handle on wireless security for PCI DSS compliance

strategic approach

When: 25 Mar 2010 5:00 am

Presenting: Ian White, Consultant, PCI Subject Matter Expert, Verizon Business

A Strategic Approach to Establish & Maintain PCI DSS Compliance

When: 25 Mar 2010 4:00 am

Presenting: Gareth Bowker, Senior PCI QSA, Meridian Services International

Understanding the Intent of PCI-DSS

hp

When: 11 Mar 2010 1:00 pm

Presenting: Archie Reed, Chief Technologist for Cloud Computing, HP

Cloud Security & Privacy

When: 11 Mar 2010 12:00 pm

Presenting: Ward Spangenberg of CSA, Archie Reed of HP

Trust Management in a Cloud Environment, a Roundtable Discussion

barclays

When: 11 Mar 2010 10:00 am

Presenting: Becky Pinkard, Head of Attack and Data Protection Monitoring, Barclays Bank

In this webcast we'll discuss the intricacies of data monitoring in the cloud, the need for succinct policy development, buy-in and roll-out prior to cloud utilisation, the importance of understanding what kind of data is created and used by whom and where, and lastly, compliance and reporting on useage and policy deviation.

predicting

When: 11 Mar 2010 8:00 am

Presenting: Andrew Yeomans, Jericho Forum

Andrew is the Vice President of Global Informational Security at Commerzbank, and he is on the Board of the Jericho Forum, which is an international information security thought-leadership group.

how much

25 Mar 2010 4:00 pm Presenting Ward Spangenberg, Director at IOActive

PCI DSS 1.2.1 - How Much is it Going to Cost You

pci summit

25 Mar 2010 2:00 pm Presenting Greg Naderi; Solutions Specialist SonicWALL

Navigating Your Way Through PCI Compliance

pci summit

25 Mar 2010 12:00 pm Presenting Anton Chuvakin; Principal, Security Warrior Consulting

This presentation will cover PCI DSS-related myths and misconceptions that are sadly common among organizations dealing with PCI DSS challanges and payment security.

pci summit

25 Mar 2010 11:00 am Presenting Michael Dahn; Global PCI QA Manager, Verizon Business

The PCI DSS is the latest regulation of personal data protection since the Gramm-Leach-Bliley Act in 1999.

pci summit

25 Mar 2010 7:00 am Presenting Simon Langley, Principal Advisor, KPMG & Financial Services Consultant

Simon Langley provides advice on a wide range of Information Security Issues.

accel

11 Mar 2010 3:00 pm Presenting Abolfazl Sirjani, Citrix Systems, VP of Microsoft Tech and Standards Strategy

Accelerating Cloud Adoption Using Visualization Mgmt Standards

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

Go to top