When: Dec 07 2010
Presenting: Derek Brink, Vice President & Research Fellow, Aberdeen Group
Worries of 2011 – What to look out for and how to tackle them.
When: Dec 07 2010
Presenting: Alwyn Nash, Endpoint Technical Director Check Point Software Technologies; Meint Dijkstra, Computerlinks
Alwyn is an experienced professional with 15 years of experience in the IT business. He has held previous positions with Pointsec Mobile Technologies, Royal London Insurance, EDS and the UK Armed Forces.
When: Dec 07 2010
Presenting: Jason Stradley; BT Global Services, US&C Security Practice Lead
Endpoint Security Management: Trust but Verify
When: Dec 07 2010
Presenting: Craig Heath, Chief Security Technologist, Symbian Foundation
Fashion accessory, personal entertainment device, social network portal and business tool. People keep their smartphones with them 24 hours a day and expect to use them in all contexts of their life, both business and personal.
When: Dec 07 2010
Presenting: Jamie Sumner, Strategic Planning Manager, Anti-Theft Services, Intel
The boundaries separating work, home and play have become more and more blurred. Mobility, once a nice-to-have capability, is increasingly important for business strategy, while, simultaneously increasing risk of theft and data loss.
When: Dec 07 2010
Presenting: Matt Dieckman; SonicWALL, Secure Remote Access, Product Manager
The proliferation of end user devices combined with the need for employees to work at any time, from any location has resulted in the mobile workforce accessing critical network resources from an unprecedented variety of end points.
When: Dec 14 2010
Presenting: Justin Clarke, London Chapter Leader, OWASP
Justin Clarke is an information security consultant with years of experience in assessing the security of networks, web applications and wireless infrastructures for large financial, retail, technology and government clients in the United Kingdom, the United States and New Zealand.
When: Sept 09 2010
Presenting: John Walker, Expert GovCloud Panel, ENISA & MD, Secure Bastion
John is a 'proven' visionary in the field of Cyber Security. He is an ENISA Listed Expert Panel Member, the MD of Secure Bastion, and Professor & PhD Mentor at Nottingham Trent University.
When: Sept 09 2010
Presenting: Dennis Groves, Co-founder, OWASP
This panel session will explore the impact of the cloud on web application security.
When: Sept 09 2010
Presenting: David Fatscher, British Standards Institute
Panelists:
Richard Soley, CEO, Object Management Group (OMG)
David Fatscher, ICT Sector Development Manager, British Standards Institute (BSI)
When: Sept 09 2010
Presenting: Michael Dahn, Director PCI Compliance, Verizon Business
The number one question on peoples' minds is: Can I be PCI Compliant in the Cloud? Organizations are planning millions of dollars on migrating to a variety of public/private cloud combination's and the lingering question is how compliance will impact these plans.
When: Sept 09 2010
Presenting: Eve Maler, PayPal, Identity Evangelist
Digital identities started to "move into the cloud" in the last decade, delivering on use cases such as cross-domain single sign-on and attribute-based authorization. With the rise of consumer identity providers and cloud-based software development, we face new opportunities and threats.
When: Sept 09 2010
Presenting: Patrick Sweeney; SonicWALL, VP of Product Management
The ease-of-use, high scalability and low maintenance of cloud computing are just some of the benefits that are driving adoption of this new trend within the enterprise. Gartner confirms this in a recent report* that revealed that cloud computing rates as the second highest technology priority in 2010, behind only virtualization.
When: Sept 09 2010
Presenting: Jonathan Penn; Forrester Research, Vice President
Underpinned by both technology and economic disruptions, cloud computing is a sustainable, long-term IT paradigm that will fundamentally change the way business customers and individual users engage with technology providers. At the moment, most customers are confused by the overused "cloud" term and are concerned over the risks of cloud computing.
When: Aug 19 2010
Presenting: Chris Burtenshaw, Information & Technology Risk Manager, Deloitte
In a challenging economic climate, delivering value from security technologies like Security Information and Event Management (SIEM) is higher up the agenda than ever before. This presentation discusses some strategies for success, with a few examples of the types of use cases which we've found most valuable to our clients.
When: Aug 19 2010
Presenting: Ritesh Singhai, Senior Security Engineer, SecureWorks
To protect critical information and business processes and to comply with industry regulations, organisations can no longer rely sole on network level security. They must also monitor a myriad of application on a variety of different platforms. Doing so is a complex, labour intensive undertaking that involves more than simply purchasing security hardware and software.
When: Aug 19 2010
Presenting: Dr. Anton Chuvakin; Security Warrior Consulting, Principle
The presentation will discuss how to bring order (in the form of standards!) to the chaotic world of logging. It will give a brief introduction to logs and logging and explain how and why logs grew so chaotic and disorganized.
When: Aug 19 2010
Presenting: Andrew Hay, CISSP Senior Analyst, Enterprise Security Practice, The 451 Group
The integration of 3rd party products within SIEM and Log Management platforms is often a race to competitive parity. Unfortunately for customers, simply having cursory integration for a product without an ongoing integration lifecycle is about as useful as the platform not supporting the device in the first place.
When: Aug 19 2010
Presenting: Raffael Marty, Chief Logger, SecViz.org
Over the past years, organizations have collected more and more data and log files within their networks, systems, and cloud environments.
When: Aug 20 2010
Presenting: Derek Brink, Aberdeen Group, VP & Research Fellow for IT Security
Companies of all sizes are trying to make sense of the incredible volume of data that is being generated by their computing infrastructure and their existing security solutions. Much like the children ice-skating game of "crack the whip", Aberdeen's research indicates that closing the performance gap between leaders and laggards in the front-end - i.e., collecting and managing the data (log management) - helps to accelerate the progress needed in the back-end - i.e., interpreting the data and taking action (security information and event management).
When: Aug 05 2010
Presenting: Scott Crawford - CISSP - CISM, Managing Research Director of Security
Third-party hosted security services have taken off in recent years, as has the technology of Data Loss Prevention. Soon, these two trends can be expected to converge, as DLP as a hosted service becomes more prevalent, complementing the established domains of hosted security for inbound messages and safe Web browsing.
When: Aug 05 2010
Presenting: Mauricio Angee; Mercantil Commercebank, N.A, VP, Information Security
Data Loss Prevention is not a fixed practice, it is very dynamic in nature and it is continuously evolving. Protecting critical information assets has become the main purpose of Information Security.
When: Aug 05 2010
Presenting: Dmitriy Ayrapetov; Network Security, Product Management, SonicWALL
The Web has become a bi-directional channel for communication where participation is highly encouraged. Ultimately, the benefits of Web and Enterprise 2.0 depend on it.
When: Aug 05 2010
Presenting: Moderated by Ron Condon, TechTarget; Guy Bunker, Jericho Forum
Ron Condon has been writing about developments in the IT industry for more than 30 years. In that time, he has charted the evolution from big mainframes, to minicomputers and PCs in the 1980s, and the rise of the Internet over the last decade or so.