Looks like this event has already ended.
Check out upcoming events by this organiser, or organise your very own event.
Enterprise Security 2012
Thursday, 14 June 2012 from 09:00 to 17:00 (BST)
London, United Kingdom
Enterprise Security 2012, Thursday 14th June 2012
Jumeirah Carlton Tower Hotel, London
Enterprise security programs are under pressure.
The corporate computing environment is undergoing an unstoppable transition. The personal computer is not the focal point of users’ information consumption anymore, and the enterprise data centre is no longer the sole repository of business critical data.
The growing use of smart mobile devices, BYOD initiatives and the advent of cloud computing mean that IT departments cannot secure business information simply by locking down PCs and servers. These technologies call for a more sophisticated approach to information security, in which access is managed according to risk, and protection is balanced with mobility and usability.
Information Age’s Enterprise Security 2012 event offers attendees an opportunity to hear case study presentations and expert advice on how organisations can navigate this transition without exposing their information assets to undue risk – or preventing users from adopting powerful innovations in the consumer technology space.
8.30 Registration, coffee and refreshments served in the networking hall
9.15 Welcome and introduction
Pete Swabey, Editor, Information Age
9.30 Keynote presentation: BYOD, The curse of the shiny shiny.
Quentyn Taylor, Director of IS, Governance and Risk, Canon EMEA
10.00 Android Security: An app level view.
Martyn Ruks, Technical Director, MWR InfoSecurity
10.30 The 10 principles of a successful BYOD programme.
Ian Evans, Managing Director, Airwatch EMEA
11.00 Morning break, coffee and refreshments served in the sponsored networking hall
11.30 Data security on the move: best practices for securing mobile devices as part of an
integrated content security plan.
Carl Leonard, Security Research Manager, Websense
12.00 10 Essential precautions for securing data in the cloud.
Professor John Walker, ISACA
12.30 Identity is the new perimeter.
Travis Spencer, Senior Technical Architect, Ping Identity
14.00 Hacking and hactavism introduction
Pete Swabey, Editor, Information Age
14.05 Keynote presentation: Inside a hacktavist attack.
Roy Scotford, Imperva
14.35 Advanced persistent threats. How the unseen APT affects business today.
Henry Harrison, Technical Director, BAE Systems Detica
15.05 Social engineering, hacking the homo-sapien.
Graeme Batsman, Ethical Hackaer & Director, Data Defender
15.35 Open discussion, security lessons for the enterprise. Full audience participation including delegates, speakers and sponsors.
*subject to change
How you could benefit from attending
- Identify new areas of risk,
- Understand how to restructure your risk program,
- Evaluate SaaS procurement
- Manage BYOD initiatives,
- Protect your organisation against hacking
Delegates- who should attend
- CIO, CSO, CISO, CTO and IT vice presidents and directors
- Governance, risk, compliance, and privacy executives
- Senior business executives
- Finance, audit, legal risk and compliance regulators
- Enterprise and operational risk managers
- Business continuity, disaster recovery managers
*Please note that registered delegates will be submitted for approval.
Call for Papers
We are interested to hear about relevant case studies, the particular areas of interest are; Mobile (BYOD), Cloud Security, Protecting against hacktivists. Please click here to submit your paper and include the subject line Paper Submission for Enterprise Security.
Event sponsors will have ownership of themes and topics in the build up to the conference, on the day and during the post event coverage. To benefit from the social media exposure, branding and opportunities to meet, please contact Michael Beech, 00 44 (0) 207 250 7953.
When & Where
Since 1995, Information Age has become the leading IT in Business brand and trusted content supplier for senior IT professionals. At the core of our brand lies leading independent editorial content, delivered via our magazine, digital magazine, app, website, social channels and bespoke roundtables and conference programmes. Our readers include IT professionals, CIO’s, CTO’s, Managers, Directors and technology champions from leading businesses.