REGISTER

Taneja Group

When: Jan 13 2011

Presenting: Dave Bartoletti; Taneja Group, Senior Analyst

In this presentation, Taneja Group analyst Dave Bartoletti will share his insights, strategies and outlook on the rapidly emerging field of cloud-based data protection, including backup, recovery, replication and DR.

The Economist

When: Jan 13 2011

Presenting:  Vicki Gavin, Head of Business Continuity, The Economist Group

Join Vicki Gavin, Head of Business Continuity as she explores the emerging challenges in 2011 for business resilience in the supply and industry chain.

ACTNOW

When: Jan 13 2011

Presenting: Ibrahim Hasan, CEO, Act Now Training

Ibrahim Hasan is a recognised expert on data protection, freedom of information and surveillance law. He was previously Principal Solicitor at Calderdale Council and has worked for Bradford Council and Nottinghamshire County Council.

CNet

When: Jan 13 2011

Presenting: Paul Rivett, Operations Director, CNet Training

What is the perception of BCDR & cloud backup - are they useless you test them?

NEXCOM

When: Jan 13 2011

Presenting:  Shankar Swaroop, Director of BCDR, NEXCOM

An organization's resiliency is directly related to the effectiveness of its continuity capability. An organization's continuity capability—its ability to perform its essential functions continuously—rests upon key components and pillars, which are in turn built on the foundation of continuity planning and program management.

When: Jan 13 2011

Presenting: Ashar Baig; Chairman of Cloud Backup & Recovery, SIG, SNIA

Most companies are so focused on data backup that they often forget "why" they are backing up their data in the first place. Data protection (backup, snapshots, replication, CDP, etc.) is just a means to an end.

SANS

When: Dec 07 2010

Presenting: Ward Spangenberg, Director, Zynga Game Network; Dave Asprey, Trend Micro; Becky Pinkard, The SANS Institute

Join Ward Spangenberg, Director of Security at Zynga Game Network; Becky Pinkard of SANS Institute and Dave Asprey of VP Cloud Security, Trend Micro as they critically evaluate if vendors are doing enough to prevent the threats from hackers in the cloud.

The Aberdeen Group

When: Dec 07 2010

Presenting:  Derek Brink, Vice President & Research Fellow, Aberdeen Group

Worries of 2011 – What to look out for and how to tackle them.

Quocirca

When: Dec 07 2010

Presenting:  Bob Tarzey, Analyst & Director, Quocirca

In IT the term end point is broad, covering everything from servers at a fixed location inside the firewall to smartphones that may move from one side of the globe to another in a matter of hours.

BT

When: Dec 07 2010

Presenting: Jason Stradley; BT Global Services, US&C Security Practice Lead

Endpoint Security Management: Trust but Verify

Check Point Software

When: Dec 07 2010

Presenting: Alwyn Nash, Endpoint Technical Director Check Point Software Technologies; Meint Dijkstra, Computerlinks

Alwyn is an experienced professional with 15 years of experience in the IT business. He has held previous positions with Pointsec Mobile Technologies, Royal London Insurance, EDS and the UK Armed Forces.

Symbian Foundation

When: Dec 07 2010

Presenting: Craig Heath, Chief Security Technologist, Symbian Foundation

Fashion accessory, personal entertainment device, social network portal and business tool. People keep their smartphones with them 24 hours a day and expect to use them in all contexts of their life, both business and personal.

Intel

When: Dec 07 2010

Presenting:  Jamie Sumner, Strategic Planning Manager, Anti-Theft Services, Intel

The boundaries separating work, home and play have become more and more blurred. Mobility, once a nice-to-have capability, is increasingly important for business strategy, while, simultaneously increasing risk of theft and data loss.

SonicWALL

When: Dec 07 2010

Presenting:  Matt Dieckman; SonicWALL, Secure Remote Access, Product Manager

The proliferation of end user devices combined with the need for employees to work at any time, from any location has resulted in the mobile workforce accessing critical network resources from an unprecedented variety of end points.

OWASP

When: Dec 14 2010

Presenting: Justin Clarke, London Chapter Leader, OWASP

Justin Clarke is an information security consultant with years of experience in assessing the security of networks, web applications and wireless infrastructures for large financial, retail, technology and government clients in the United Kingdom, the United States and New Zealand.

ENISA

When: Sept 09 2010

Presenting: John Walker, Expert GovCloud Panel, ENISA & MD, Secure Bastion

John is a 'proven' visionary in the field of Cyber Security. He is an ENISA Listed Expert Panel Member, the MD of Secure Bastion, and Professor & PhD Mentor at Nottingham Trent University.

OWASP

When: Sept 09 2010

Presenting: Dennis Groves, Co-founder, OWASP

This panel session will explore the impact of the cloud on web application security.

BSI

When: Sept 09 2010

Presenting: David Fatscher, British Standards Institute

Panelists:
Richard Soley, CEO, Object Management Group (OMG)
David Fatscher, ICT Sector Development Manager, British Standards Institute (BSI)

Verizon Business

When: Sept 09 2010

Presenting: Michael Dahn, Director PCI Compliance, Verizon Business

The number one question on peoples' minds is: Can I be PCI Compliant in the Cloud? Organizations are planning millions of dollars on migrating to a variety of public/private cloud combination's and the lingering question is how compliance will impact these plans.

PayPal

When: Sept 09 2010

Presenting: Eve Maler, PayPal, Identity Evangelist

Digital identities started to "move into the cloud" in the last decade, delivering on use cases such as cross-domain single sign-on and attribute-based authorization. With the rise of consumer identity providers and cloud-based software development, we face new opportunities and threats.

SonicWALL

When: Sept 09 2010

Presenting: Patrick Sweeney; SonicWALL, VP of Product Management

The ease-of-use, high scalability and low maintenance of cloud computing are just some of the benefits that are driving adoption of this new trend within the enterprise. Gartner confirms this in a recent report* that revealed that cloud computing rates as the second highest technology priority in 2010, behind only virtualization.

Forrester

When: Sept 09 2010

Presenting: Jonathan Penn; Forrester Research, Vice President

Underpinned by both technology and economic disruptions, cloud computing is a sustainable, long-term IT paradigm that will fundamentally change the way business customers and individual users engage with technology providers. At the moment, most customers are confused by the overused "cloud" term and are concerned over the risks of cloud computing.

Deloitte

When: Aug 19 2010

Presenting: Chris Burtenshaw, Information & Technology Risk Manager, Deloitte

In a challenging economic climate, delivering value from security technologies like Security Information and Event Management (SIEM) is higher up the agenda than ever before. This presentation discusses some strategies for success, with a few examples of the types of use cases which we've found most valuable to our clients.

SecureWorks

When: Aug 19 2010

Presenting: Ritesh Singhai, Senior Security Engineer, SecureWorks

To protect critical information and business processes and to comply with industry regulations, organisations can no longer rely sole on network level security. They must also monitor a myriad of application on a variety of different platforms. Doing so is a complex, labour intensive undertaking that involves more than simply purchasing security hardware and software.

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top