Infosecurity Week is a seven day city wide event bringing together Infosecurity professionals to learn, share and have fun in and around London.
Coinciding with Infosecurity Europe and Bsides London, Infosecurity Week is the definitive calendar of all things InfoSec running 5-11 June 2017.
Check out what’s on during this busy week and attend anything from specialist conferences, training courses, networking events, vendor parties, awards ceremonies and much more.
Although many of the events are in walking distance from Kensignton Olympia, some are a little further away in Knightsbridge and Soho.
During the days on Tuesday - Thursday you will find us on stand Q140 at Infosecurity Europe, and also at BSides London on Wednesday.
In the evenings we will be at the Crown & Sceptre on Holland Road from 7pm on Monday, the Buddha-Bar on Knightsbridge from 7:30pm Tuesday, The Atlas on Seagrave Road from 8pm Wednesday and the Beaconsfield on Blythe Road at 6:30pm Thursday. Join us and relax for an hour or two over a beer.
We are supporting several White Hat Rally charity fundraising events during the week in support of Barnardo's. Sign up to their news letter for more details.
There’s a whole host of reasons to make your way to London next week!
Join us for Infosecurity Week
Labels:
Charity,
Conference,
White Hat Rally
Location:
Hammersmith Rd, London W14 8UX, UK
SWIFT Premium Services Forum Europe 2016
Next week in Berlin we will be attending SWIFT's PSF EMEA forum to lead delegates in a panel discussion on developing secure culture within a business.
Whether staff are involved in reinforcing the protection of critical infrastructures and applications against evolving threats, or in meeting more demanding auditing and regulatory requirements, awareness of the important part they play is key in effective defence.
In this plenary session, we will explore how to foster a sense of ownership so that everyone involved in managing critical environments is ready to embrace their critical role.
Open exclusively to subscribers to SWIFT’s Premium suite of services, this exclusive event is an unrivalled opportunity for networking with peers, discussing challenges and exchanging experiences to continue to enhance operational excellence.
The theme for this year’s event is Operations – Collaboration – Excellence exploring through innovative and highly interactive sessions how far collaborative solutions have developed during the last year and identifying new opportunities for working together to address the issues we all face.
The need to make Security part of the corporate DNA by building a culture of security in all areas of an organisation has never been more critical.
The theme for this year’s event is Operations – Collaboration – Excellence exploring through innovative and highly interactive sessions how far collaborative solutions have developed during the last year and identifying new opportunities for working together to address the issues we all face.
Building a culture of security
Whether staff are involved in reinforcing the protection of critical infrastructures and applications against evolving threats, or in meeting more demanding auditing and regulatory requirements, awareness of the important part they play is key in effective defence.
In this plenary session, we will explore how to foster a sense of ownership so that everyone involved in managing critical environments is ready to embrace their critical role.
Labels:
Conference,
Good Practice
Cyber Crime – managing risk in an interconnected world
Next week we are at the Turnaround Management Association (TMA) UK annual conference. Presenting on the risks and disruption that today's cyber criminals, we will bring this topic to life with real life examples that will amaze you.
Disruption is changing our lives, it touches every industry, clients and customers, but the opportunities for true business leaders and criminals are immense.
Managing Disruption is the 2016 theme for this year's conference. Sign up as a delegate and join us at the magnificent lecture theatre of the British Library.
Disruption is changing our lives, it touches every industry, clients and customers, but the opportunities for true business leaders and criminals are immense.
Managing Disruption is the 2016 theme for this year's conference. Sign up as a delegate and join us at the magnificent lecture theatre of the British Library.
Labels:
Conference,
Cyber Security
A hard perimeter defence alone isn't enough
With the rapid adoption of blended on- and off-premise technology solutions, the traditional security perimeter is fast paling into insignificance. Information increasingly resides beyond the corporate boundary as data moves to mobile devices, cloud services, and other locations outside of the organisation’s network. Users are becoming more mobile and business stakeholders are increasingly specifying the shrink wrapped solutions they wish to consume.
These demands increasingly blur the corporate boundary and make management more complex, presenting an ever increasing challenge for those trying to maintain security of the organisation’s information assets. More than ever, these factors mean that the security approach now needs to be agile, layered, and responsive to users, but lets not forget that the internal threat remains.
Maintaining visibility of where data resides, how it is accessed and where it is used is key to any security strategy. In the past this was very straightforward as all data remained within an organisation on its network, PCs and servers. Even the traffic to the Internet passed through narrow choke points, but no more. Achieving the required visibility is much more complex today.
It’s impossible to adequately secure information without understanding where it rests, who has access to it, and how it is transmitted. While some visibility of data movements still exists within the corporate network, it isn’t complete. Unmanaged devices, particularly those not connecting via the corporate network, may access cloud services directly and as such data movements are largely invisible.
These demands increasingly blur the corporate boundary and make management more complex, presenting an ever increasing challenge for those trying to maintain security of the organisation’s information assets. More than ever, these factors mean that the security approach now needs to be agile, layered, and responsive to users, but lets not forget that the internal threat remains.
Maintaining visibility of where data resides, how it is accessed and where it is used is key to any security strategy. In the past this was very straightforward as all data remained within an organisation on its network, PCs and servers. Even the traffic to the Internet passed through narrow choke points, but no more. Achieving the required visibility is much more complex today.
It’s impossible to adequately secure information without understanding where it rests, who has access to it, and how it is transmitted. While some visibility of data movements still exists within the corporate network, it isn’t complete. Unmanaged devices, particularly those not connecting via the corporate network, may access cloud services directly and as such data movements are largely invisible.
While cyber threats are without doubt an important consideration, we should not forget the internal threat. A robust perimeter may be a good first line of defence, but it does little to protect against those with legitimate physical and logical access within that perimeter. Multiple levels of defence, comprehensive monitoring, alerting and timely investigation and response are now essential components necessary to complement risk and vulnerability assessments.
AgilityIS can work with you, advising on current good practice, to ensure that appropriate security is implemented in a cost effective and pragmatic manner.
Labels:
Good Practice
Subscribe to:
Posts (Atom)