IG Cyber Security Survival Guide

...
Booking Closed

Date

6 May 2019

Book Before

30 April 2019

About the Event

Cyber security, data protection, compliance with standards and our legal obligations are all high and growing priorities for our institutions. Institutional requirements for effective controls and processes along with an increasing need for certifications are already challenging many of us to improve our capabilities in this area. As competitive pressures grow across the sector our abilities to protect or improve the reputation and standing of our institutions will continue to increase. This event aims to equip attendees with the knowledge of what they should be talking and a sense of priorities for action. 

The event will present a mixture of case studies highlighting current good practice from institutions along with sessions from outside the sector in the future we need to be ready for and how to prepare. 

The case studies will chart successes, failures and the lessons learnt from our colleagues who have made a head start and have succeeded in implementing security related change in their home institution. 

It is also intended to provide keynote presentations from national cyber and information security organisations (subject to the availability of speakers). The keynotes will provide updates on the latest trends and threats in the wild as well as developments in the compliance arena. 

The event is aimed at senior managers, security managers and infrastructure professionals.

Speakers

Blank Space for Speaker Image

TBC

Will be added soon

Event Schedule

 

11:45

I Patch Pirates

Sarah Boyd, Assistant Director Information Security and IT Compliance and Andy King Associate Professor Technology and Innovation. University of the West of England
12:45

How to get Cyber Essentials as an institution

Guilherme de Sousa, Head of Infrastructure and Tricia Moscati, Head of Project Services. Heriot Watt University
13:15

Cloud Security – It’s Not Black and White

Nigel Hawthorn , EMEA Marketing Director, Cloud Business Unit (previously Skyhigh Networks)
14:45

Maturity Models for Strategic Security Improvement

Jordan Schroeder, CISO. HEFESTIS
15:15

Influencing Secure Behaviour

David Cooper, Manager, and Andrea Cullen, KPMG
11:00

The Hacker Rainbow

Zoe Rose