SlideShare a Scribd company logo
1 of 9
Download to read offline
Event Brochure


Information Security Executive Summit
Ensuring Security and Compliance
in a Cloudy and Mobile World

28 – 29 February 2012
Richmond Hotel, Richmond, Surrey, UK
www.informationsecuritysummit.com
INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012




     3rd Annual Information
     Security Executive Summit
     The 3rd annual Information Security Executive Summit will cover the critical issues and considerations that
     Information Technology and Information Security Leaders need to be mindful of when planning their IT Strategy for
     2012 and beyond.
     The key focus of the 2012 Summit will look at the ever increasing threats to IT infrastructures from both internal
     and external sources. Combined with accelerating demand from business, information security will always be a
     top priority for IT Leaders. Through Keynote Sessions, Executive Round Tables and IT leader Think Tanks, case
     studies will illustrate what has worked and what hasn’t worked when deploying information security.
     The 2012 summit is critical for all CISOs, CIOs, IT Directors and Heads of Information Security and those key
     decision stakeholders with decision making authority. The lead sessions and topic focus will incorporate the major
     challenges including:
     • Risks of mobile devices and the evolving security threats of cloud computing
     • The ever-challenging compliance with data protection – taking appropriate measures to adhere to legal
       requirements but still allow for the higher demands of flexible working
     • Data leakage challenges
     • Mobile applications and security
     • Worldwide security threats and vulnerabilities
     • Modern day hackers and tackling the threats
     • Ensuring business continuity
     • Facebook and Twitter – keeping abreast of the major security issues surrounding social media
     • Ensuring supplier and internal communication relationships are watertight




     Why Attend?
     • Ensure your Information Security strategy is aligned
       with next generation IT Infrastructure and Operations
       initiatives
     • Network with peers with similar objectives and
       challenges to share experiences and best practice
     • Ensure your security and risk management strategy
       is aligned to business needs by creating an effective
       vision, strategy, and roadmap
     • Understand how to evaluate and address the
       new security risks presented by cloud computing,
       virtualisation and consumerisation of IT
     • Ready yourself for new regulatory, compliance and
       privacy regulations
     • Learn the key evaluation criteria you need to apply
       when evaluating Information Security vendors




             02
INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012




     Featured Speakers
     Tony Hird                                                     John Ross
     Chief Technologist, British Airways                           Deputy Director, ICT Strategy & FM,
                                                                   BIG Lottery Fund
     Quentyn Taylor
     Head of Information Security,                                 Julia Harris
     Canon Europe, Middle East and Africa                          Information Security Officer, Oxfam

     Michael Paisley                                               Paul Wilson
     Head of Information Risk & Business Resilience IT             Information Technology Security Manager,
     & Operational Risk, Santander UK plc                          Yorkshire Water

     Christophe Gabioud                                            Richard Bell
     Divisional Information Security Officer,                       Information Security and Audit Director,
     UBS Investment Bank                                           TFL

     Simon Rice                                                    Gordon Holmes
     Principal Policy Adviser (Technology),                        Cyber Industry Liaison Office, Policy Central e-crime
     Information Commission’s Office                                Unit, Met Police

     Andy Lee                                                      Tom McArthur
     Head of Information Technology Security,                      Director of Operations/Head of Information Security,
     BIG Lottery Fund                                              National Policing Improvement Agency




     Venue




     144-150 Richmond Hill,
     Richmond-upon-Thames,
                                                                               How to Register
     Surrey, TW10 6RW.
     T. +44 (0)20 8940 2247                                                    Request an Invitation
     F. +44 (0)20 8940 5424
     www.richmondhill-hotel.co.uk                                              Call us on 0208 1664392




             02
INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012




     Tech:Touchstone creates business to-business events for the IT sector
     where face-to-face communication is paramount to fully understand
     complex issues, solutions and value propositions.
     A critical business choice to get your organisation decision ready.
     Tech:Touchstone Executive Summits bring together senior IT executives, industry analysts and leading vendors face-
     to-face to network, discuss and learn about cutting edge technologies that will drive strategic IT initiatives in-line with
     corporate objectives.

     Delegate attendance is by invitation only and sponsors are the proven ‘best of breed’ vendors in
     their field.
     Through unbiased research, End user case studies and input from industry experts, Tech:Touchstone helps IT business
     leaders make the right decisions by providing leading edge business intelligence and real life experience from CIOs and
     Heads of Information Security who have taken their organisation to the next level in Information Security strategy.




     The Information Security Summit consists
     of a series of strategic sessions, built by our
     Programme Director and based on the individual
     delegates projects and interest areas, to ensure
     you get the most out of the 2 day summit.


     Analyst Keynote Sessions
     Industry insight by leading Analysts, providing in depth
     industry insight into the industry trends surrounding
     Information Security.

     Best Practice Case Studies
     Learn from other IT leaders who are ahead of the curve.
     Understand their completed initiatives with best practice,          Executive Roundtables
     ready to be put into action. The “how tos” and the “pit falls”      Focused round tables in a boardroom environment, driven
     to watch out for.                                                   by a “best of breed” vendor. For the vendor, an exclusive
                                                                         consultation on relevant projects and strategies with the
     IT Leader Think Tanks                                               opportunity to address individual needs and accelerate the
     Senior enterprise/public sector IT leader facilitating an           sales cycle.
     interactive peer group, providing “take-aways” from a               For the peer group of 12 enterprise and public sector IT
     strategic and/or execution perspective.                             executives, a dynamic environment to discuss with peers,
                                                                         similar challenges and discuss plans to address them,
     Peer to Peer Networking                                             guidance and direct questions about key business concerns
     A mixture of formal one to one sessions and informal                to experts in IT strategy and execution.
     networking opportunities including a gala dinner and drinks
     reception.                                                          CIO Keynote Session
                                                                         An experienced and respected CIO, delivering first-hand
     Thought Leadership Sessions                                         experience of defining the Information Security strategy in
     Visionaries from the vendor community, sharing innovative           alignment with core business drivers: Business agility, cost
     ideas and cutting edge methodologies. An information                efficiency, flexibility, scalability. Strategic insight to help with
     packed session supported by a wealth of end user                    the development and execution of the project initiatives –
     experience and real client case studies.                            “lessons learnt and issues faced”.




              03
INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012




     Day One Programme
     Tuesday 28th February 2012
                                                Registration, coffee and networking

                                                Analyst Keynote

                                                Monitoring cyber-crime – a national challenge
                                                This session will bring to the forefront some of the work undertaken by the Police
                                                Central e-crime Unit and what this is being done to meet the challenges of
                                                detecting e-crime. A designated policy approach and new initiatives are used to
                                                investigate cyber-crime and to dig deep beneath fraudulent activity, and particular
                                                emphasis is on how the team work with industry and in collaboration with other
                                                groups to monitor e-traffic and to combat threats to internet security.
                                                Speaker: Gordon Holmes
                                                            Cyber Industry Liaison Office
                                                            Policy Central e-crime Unit, Met Police

                                                Executive Round Tables

                                                Coffee, networking and 1:1 sessions

                                                Thought Leadership Session
                                                Data Leakage – a user-awareness tool?
                                                In this session, you will hear about avoiding data leakage and the tools needed to
                                                set systems in place. It will study best practice organisational set-up and some
                                                case study material. There will an opportunity to look at data leakage prevention
                                                tactics and some effective procedures and recommendations.
                                                Speaker: Christophe Gabioud
                                                            Divisional Information Security Officer
                                                            UBS Investment Bank

                                                Executive Round Tables

                                                Lunch, networking and 1:1 sessions

                                                Best Practice Case Studies
                                                Advanced Information Risk & Control Management
                                                • Strategic Alignment – linking delivery to strategic intent
                                                • Integrating security & resilience
                                                • Control Performance Management – KRI’s, KPI’s
                                                • Quantitative Risk Analysis using Monte Carlo simulations
                                                • Use of Aggregated Dashboards to communicate to senior stakeholders
                                                Speaker: Michael Paisley
                                                           Head of Information Risk & Business Resilience
                                                           IT & Operational Risk
                                                           Santander UK plc

                                                The risks and benefits of mobile devices and the cloud
                                                Mobile devices and the cloud allow for greater flexibility in the workforce but
                                                present different challenges in ensuring compliance. The Data Protection Act
                                                requires data controllers to take appropriate measures to protect personal
                                                data but how can they achieve this whilst still maintaining a mobile and flexible
                                                workforce? Can the controls applied within the corporate network be extended
                                                across the internet to mobile devices and cloud services?
                                                Speaker: Simon Rice
                                                            Principal Policy Adviser
                                                            Information Commission’s Office




             04
INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012




                                                Mobile working – case study highlighting the very real challenges of
                                                virtualisation security
                                                What challenges does the cloud provide for information security, particularly
                                                the challenges for in-house and the problems with overseas data centres?
                                                What about the increase in workforce mobility and greater decentralisation of IT
                                                processes and the growing use of social media? Is there a very real threat that
                                                there could be a loss in direct control over data and applications?
                                                Speakers: Andy Lee
                                                            Head of Information Technology Security
                                                            BIG Lottery Fund
                                                            John Ross
                                                            Deputy Director, ICT Strategy & FM
                                                            BIG Lottery Fund

                                                Executive Round Tables

                                                Coffee, networking and 1:1 sessions

                                                Executive Round Tables

                                                Best Practice Case Studies
                                                Ensuring security in remote locations – becoming aware of modern-day
                                                hackers
                                                • Remote working is the way forward but how is this possible in areas of the
                                                  world where there is little or no infrastructure?
                                                • Coping with lack of operational solutions and trying to make suitable adaptions
                                                • Supporting networks to evaluate, adapt and implement strategies to ensure
                                                  that security procedures across the organisation and across the world are
                                                  watertight when there is a lack of infrastructure in place – using Oxfam as a
                                                  case example of an organisation which is worldwide but has the same major
                                                  challenges of espionage and hacking
                                                Speaker: Julia Harris
                                                          Information Security Officer
                                                          Oxfam
                                                Business continuity – risks, threats and actions – management and
                                                technical challenges
                                                • So you think it is never going to happen to your organisation!
                                                • Finding out what major threats are likely to emerge – is information security
                                                   that important to your business for it to continue to function?
                                                • Ensuring that there is a policy and programme management plan in place
                                                • Developing and implementing a business continuity response – case example
                                                   of how Transport for London are prepared
                                                • Exercising, maintaining and reviewing – a continuous process
                                                Speaker: Richard Bell
                                                           Security Audit Manager, Security Risk and Assurance
                                                           Transport for London (TfL)

                                                Close of day one

                                                Pre-Dinner Drinks Reception and Networking

                                                Gala Dinner




             05
INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012




     Day Two Programme
     Wednesday 29th February 2012
                                                Networking breakfast

                                                Chairman’s opening session leading into a panel session

                                                Executive Round Tables

                                                Coffee, networking and 1:1 sessions

                                                Thought Leadership Session
                                                The benefit that consumerisation of IT brings but also the associated
                                                information security risks – case study from Yorkshire Water
                                                • Tackling new technology and also new user generation
                                                • The rise of the internet generation, including Facebook and Twitter: how
                                                  security issues are being tackled in this challenging area
                                                • Mobile devices including iPads and smartphones: security being one of the
                                                  major challenges of the new mobile world and ways around IT department
                                                  controls
                                                • Highlighting the risks which are sometimes not that obvious: what are others
                                                  in the industry doing to mitigate very real threats?
                                                Speaker: Paul Wilson
                                                         Information Technology Security Manager
                                                         Yorkshire Water

                                                Executive Round Tables
                                                Lunch, networking and 1:1 sessions

                                                Executive Round Tables

                                                End User Case Studies
                                                BA’s 5 year security strategy
                                                Ever since the internet revolution enterprises have been adding more and point
                                                solutions to mitigate each new threat type as it emerged, this has worked well
                                                to date, giving organisation defence in depth but the paradigm shifts relating to
                                                cloud, mobile computing and consumerism requires new thinking.
                                                Having safety and security at the heart of it’s operation, British Airways has been
                                                consolidating its 5 year IT security plans and created a vision to ensure it is in the
                                                best possible position to handle the challenges ahead.
                                                Speaker: Tony Hird
                                                         Chief Technologist
                                                         British Airways




             06
INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012




                                                Developing a secure relationship between your supplier, internal teams and
                                                customers to reduce data loss and human negligence
                                                • Knowing the questions you need to ask to minimize your risk
                                                • Understanding the current solutions that can be delivered
                                                • Who needs to be involved internally to ensure you make the most of your
                                                  chosen solution
                                                • Training your users to make them aware of the unique risks
                                                • Making the print solutions work for you, making it part of your threat defence
                                                  toolkit not a risk
                                                   Speaker:        Quentyn Taylor
                                                                   Head of Information Security
                                                                   Canon Europe, Middle East and Africa

                                                Chairman’s closing remarks and close of summit




                                               How to Register
                                               Request an Invitation
                                               Call us on 0208 1664392




                                               “Very professional. I learnt a great deal. Excellent for
                                               knowledge sharing and future proofing.”
                                               Lloyds Banking Group


                                                          “It opens the mind for new ideas/approaches on
                                                          how to address IT/Business challenges.”
                                                          SAB Miller

                                               “A great learning experience that conveyed confidence in
                                               products and technologies.”
                                               Johnson Matthey




             07
Be the                                           first to hear
Stay up to date with the latest:
      Industry news & opinion                                         Join our Group on
                                                                      Search groups for Tech: Touchstone Events
      Lively discussion and debate
                                                                      Follow us on
      Executive summit updates
                                                                      twitter.com/TechTouchstone
      Exclusive offers & invitations
                                                                      Alternatively, follow the links on
      Plus, receive complimentary                                     any of our websites, including:
      reports & white papers                                          www.techtouchstone.com


Tech:Touchstone creates business-to-business events for the IT sector where face-to-face
communication is paramount to fully understand complex issues, solutions and value
propositions.
The company’s portfolio of events focuses on areas of strategic industry debate and growth
market sectors, with the aim of creating a collaborative learning environment for time-poor IT
executives and to facilitate high value, quality interactions between all participants.




       Future Events
                                                                  09-10 MAY 2012
                                                                  Richmond Hill Hotel, Richmond,
                                                                  Surrey, UK



   For further information on sponsoring this or any of our summits, or participating as an executive delegate,
      please speak to a Tech:Touchstone team member today or email us at events@techtouchstone.com.
                         T
                         Tech:Touchstone
                              T




 Suite 8, 19-22 Victoria Villas, Richmond, Surrey TW9 2JX, UK. Phone: +44 (0) 208 166 4390 Email: events@techtouchstone.com

More Related Content

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 

Featured (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Information security executive summit brochure

  • 1. Event Brochure Information Security Executive Summit Ensuring Security and Compliance in a Cloudy and Mobile World 28 – 29 February 2012 Richmond Hotel, Richmond, Surrey, UK www.informationsecuritysummit.com
  • 2. INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012 3rd Annual Information Security Executive Summit The 3rd annual Information Security Executive Summit will cover the critical issues and considerations that Information Technology and Information Security Leaders need to be mindful of when planning their IT Strategy for 2012 and beyond. The key focus of the 2012 Summit will look at the ever increasing threats to IT infrastructures from both internal and external sources. Combined with accelerating demand from business, information security will always be a top priority for IT Leaders. Through Keynote Sessions, Executive Round Tables and IT leader Think Tanks, case studies will illustrate what has worked and what hasn’t worked when deploying information security. The 2012 summit is critical for all CISOs, CIOs, IT Directors and Heads of Information Security and those key decision stakeholders with decision making authority. The lead sessions and topic focus will incorporate the major challenges including: • Risks of mobile devices and the evolving security threats of cloud computing • The ever-challenging compliance with data protection – taking appropriate measures to adhere to legal requirements but still allow for the higher demands of flexible working • Data leakage challenges • Mobile applications and security • Worldwide security threats and vulnerabilities • Modern day hackers and tackling the threats • Ensuring business continuity • Facebook and Twitter – keeping abreast of the major security issues surrounding social media • Ensuring supplier and internal communication relationships are watertight Why Attend? • Ensure your Information Security strategy is aligned with next generation IT Infrastructure and Operations initiatives • Network with peers with similar objectives and challenges to share experiences and best practice • Ensure your security and risk management strategy is aligned to business needs by creating an effective vision, strategy, and roadmap • Understand how to evaluate and address the new security risks presented by cloud computing, virtualisation and consumerisation of IT • Ready yourself for new regulatory, compliance and privacy regulations • Learn the key evaluation criteria you need to apply when evaluating Information Security vendors 02
  • 3. INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012 Featured Speakers Tony Hird John Ross Chief Technologist, British Airways Deputy Director, ICT Strategy & FM, BIG Lottery Fund Quentyn Taylor Head of Information Security, Julia Harris Canon Europe, Middle East and Africa Information Security Officer, Oxfam Michael Paisley Paul Wilson Head of Information Risk & Business Resilience IT Information Technology Security Manager, & Operational Risk, Santander UK plc Yorkshire Water Christophe Gabioud Richard Bell Divisional Information Security Officer, Information Security and Audit Director, UBS Investment Bank TFL Simon Rice Gordon Holmes Principal Policy Adviser (Technology), Cyber Industry Liaison Office, Policy Central e-crime Information Commission’s Office Unit, Met Police Andy Lee Tom McArthur Head of Information Technology Security, Director of Operations/Head of Information Security, BIG Lottery Fund National Policing Improvement Agency Venue 144-150 Richmond Hill, Richmond-upon-Thames, How to Register Surrey, TW10 6RW. T. +44 (0)20 8940 2247 Request an Invitation F. +44 (0)20 8940 5424 www.richmondhill-hotel.co.uk Call us on 0208 1664392 02
  • 4. INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012 Tech:Touchstone creates business to-business events for the IT sector where face-to-face communication is paramount to fully understand complex issues, solutions and value propositions. A critical business choice to get your organisation decision ready. Tech:Touchstone Executive Summits bring together senior IT executives, industry analysts and leading vendors face- to-face to network, discuss and learn about cutting edge technologies that will drive strategic IT initiatives in-line with corporate objectives. Delegate attendance is by invitation only and sponsors are the proven ‘best of breed’ vendors in their field. Through unbiased research, End user case studies and input from industry experts, Tech:Touchstone helps IT business leaders make the right decisions by providing leading edge business intelligence and real life experience from CIOs and Heads of Information Security who have taken their organisation to the next level in Information Security strategy. The Information Security Summit consists of a series of strategic sessions, built by our Programme Director and based on the individual delegates projects and interest areas, to ensure you get the most out of the 2 day summit. Analyst Keynote Sessions Industry insight by leading Analysts, providing in depth industry insight into the industry trends surrounding Information Security. Best Practice Case Studies Learn from other IT leaders who are ahead of the curve. Understand their completed initiatives with best practice, Executive Roundtables ready to be put into action. The “how tos” and the “pit falls” Focused round tables in a boardroom environment, driven to watch out for. by a “best of breed” vendor. For the vendor, an exclusive consultation on relevant projects and strategies with the IT Leader Think Tanks opportunity to address individual needs and accelerate the Senior enterprise/public sector IT leader facilitating an sales cycle. interactive peer group, providing “take-aways” from a For the peer group of 12 enterprise and public sector IT strategic and/or execution perspective. executives, a dynamic environment to discuss with peers, similar challenges and discuss plans to address them, Peer to Peer Networking guidance and direct questions about key business concerns A mixture of formal one to one sessions and informal to experts in IT strategy and execution. networking opportunities including a gala dinner and drinks reception. CIO Keynote Session An experienced and respected CIO, delivering first-hand Thought Leadership Sessions experience of defining the Information Security strategy in Visionaries from the vendor community, sharing innovative alignment with core business drivers: Business agility, cost ideas and cutting edge methodologies. An information efficiency, flexibility, scalability. Strategic insight to help with packed session supported by a wealth of end user the development and execution of the project initiatives – experience and real client case studies. “lessons learnt and issues faced”. 03
  • 5. INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012 Day One Programme Tuesday 28th February 2012 Registration, coffee and networking Analyst Keynote Monitoring cyber-crime – a national challenge This session will bring to the forefront some of the work undertaken by the Police Central e-crime Unit and what this is being done to meet the challenges of detecting e-crime. A designated policy approach and new initiatives are used to investigate cyber-crime and to dig deep beneath fraudulent activity, and particular emphasis is on how the team work with industry and in collaboration with other groups to monitor e-traffic and to combat threats to internet security. Speaker: Gordon Holmes Cyber Industry Liaison Office Policy Central e-crime Unit, Met Police Executive Round Tables Coffee, networking and 1:1 sessions Thought Leadership Session Data Leakage – a user-awareness tool? In this session, you will hear about avoiding data leakage and the tools needed to set systems in place. It will study best practice organisational set-up and some case study material. There will an opportunity to look at data leakage prevention tactics and some effective procedures and recommendations. Speaker: Christophe Gabioud Divisional Information Security Officer UBS Investment Bank Executive Round Tables Lunch, networking and 1:1 sessions Best Practice Case Studies Advanced Information Risk & Control Management • Strategic Alignment – linking delivery to strategic intent • Integrating security & resilience • Control Performance Management – KRI’s, KPI’s • Quantitative Risk Analysis using Monte Carlo simulations • Use of Aggregated Dashboards to communicate to senior stakeholders Speaker: Michael Paisley Head of Information Risk & Business Resilience IT & Operational Risk Santander UK plc The risks and benefits of mobile devices and the cloud Mobile devices and the cloud allow for greater flexibility in the workforce but present different challenges in ensuring compliance. The Data Protection Act requires data controllers to take appropriate measures to protect personal data but how can they achieve this whilst still maintaining a mobile and flexible workforce? Can the controls applied within the corporate network be extended across the internet to mobile devices and cloud services? Speaker: Simon Rice Principal Policy Adviser Information Commission’s Office 04
  • 6. INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012 Mobile working – case study highlighting the very real challenges of virtualisation security What challenges does the cloud provide for information security, particularly the challenges for in-house and the problems with overseas data centres? What about the increase in workforce mobility and greater decentralisation of IT processes and the growing use of social media? Is there a very real threat that there could be a loss in direct control over data and applications? Speakers: Andy Lee Head of Information Technology Security BIG Lottery Fund John Ross Deputy Director, ICT Strategy & FM BIG Lottery Fund Executive Round Tables Coffee, networking and 1:1 sessions Executive Round Tables Best Practice Case Studies Ensuring security in remote locations – becoming aware of modern-day hackers • Remote working is the way forward but how is this possible in areas of the world where there is little or no infrastructure? • Coping with lack of operational solutions and trying to make suitable adaptions • Supporting networks to evaluate, adapt and implement strategies to ensure that security procedures across the organisation and across the world are watertight when there is a lack of infrastructure in place – using Oxfam as a case example of an organisation which is worldwide but has the same major challenges of espionage and hacking Speaker: Julia Harris Information Security Officer Oxfam Business continuity – risks, threats and actions – management and technical challenges • So you think it is never going to happen to your organisation! • Finding out what major threats are likely to emerge – is information security that important to your business for it to continue to function? • Ensuring that there is a policy and programme management plan in place • Developing and implementing a business continuity response – case example of how Transport for London are prepared • Exercising, maintaining and reviewing – a continuous process Speaker: Richard Bell Security Audit Manager, Security Risk and Assurance Transport for London (TfL) Close of day one Pre-Dinner Drinks Reception and Networking Gala Dinner 05
  • 7. INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012 Day Two Programme Wednesday 29th February 2012 Networking breakfast Chairman’s opening session leading into a panel session Executive Round Tables Coffee, networking and 1:1 sessions Thought Leadership Session The benefit that consumerisation of IT brings but also the associated information security risks – case study from Yorkshire Water • Tackling new technology and also new user generation • The rise of the internet generation, including Facebook and Twitter: how security issues are being tackled in this challenging area • Mobile devices including iPads and smartphones: security being one of the major challenges of the new mobile world and ways around IT department controls • Highlighting the risks which are sometimes not that obvious: what are others in the industry doing to mitigate very real threats? Speaker: Paul Wilson Information Technology Security Manager Yorkshire Water Executive Round Tables Lunch, networking and 1:1 sessions Executive Round Tables End User Case Studies BA’s 5 year security strategy Ever since the internet revolution enterprises have been adding more and point solutions to mitigate each new threat type as it emerged, this has worked well to date, giving organisation defence in depth but the paradigm shifts relating to cloud, mobile computing and consumerism requires new thinking. Having safety and security at the heart of it’s operation, British Airways has been consolidating its 5 year IT security plans and created a vision to ensure it is in the best possible position to handle the challenges ahead. Speaker: Tony Hird Chief Technologist British Airways 06
  • 8. INFORMATION SECURITY EXECUTIVE SUMMIT | UK | 28–29 February 2012 Developing a secure relationship between your supplier, internal teams and customers to reduce data loss and human negligence • Knowing the questions you need to ask to minimize your risk • Understanding the current solutions that can be delivered • Who needs to be involved internally to ensure you make the most of your chosen solution • Training your users to make them aware of the unique risks • Making the print solutions work for you, making it part of your threat defence toolkit not a risk Speaker: Quentyn Taylor Head of Information Security Canon Europe, Middle East and Africa Chairman’s closing remarks and close of summit How to Register Request an Invitation Call us on 0208 1664392 “Very professional. I learnt a great deal. Excellent for knowledge sharing and future proofing.” Lloyds Banking Group “It opens the mind for new ideas/approaches on how to address IT/Business challenges.” SAB Miller “A great learning experience that conveyed confidence in products and technologies.” Johnson Matthey 07
  • 9. Be the first to hear Stay up to date with the latest: Industry news & opinion Join our Group on Search groups for Tech: Touchstone Events Lively discussion and debate Follow us on Executive summit updates twitter.com/TechTouchstone Exclusive offers & invitations Alternatively, follow the links on Plus, receive complimentary any of our websites, including: reports & white papers www.techtouchstone.com Tech:Touchstone creates business-to-business events for the IT sector where face-to-face communication is paramount to fully understand complex issues, solutions and value propositions. The company’s portfolio of events focuses on areas of strategic industry debate and growth market sectors, with the aim of creating a collaborative learning environment for time-poor IT executives and to facilitate high value, quality interactions between all participants. Future Events 09-10 MAY 2012 Richmond Hill Hotel, Richmond, Surrey, UK For further information on sponsoring this or any of our summits, or participating as an executive delegate, please speak to a Tech:Touchstone team member today or email us at events@techtouchstone.com. T Tech:Touchstone T Suite 8, 19-22 Victoria Villas, Richmond, Surrey TW9 2JX, UK. Phone: +44 (0) 208 166 4390 Email: events@techtouchstone.com