IISPEastMids, profile picture

IISPEastMids

Sort by
Ransomware - Mark Chimely
How to avoid becoming the next victim of ransomware
The Impact of the General Data Protection Regulation - 10th May 2016
General Data Protection Regulation: what do you need to do to get prepared? - Helena Wootton
Be careful what you wish for: the great Data Protection law reform - Lilian Edwards
Webroot - self-defending IoT devices & gateways
Qonex - Securing the IoT
Mike Gillespie - The Internet of Everything
Econocom - identifying funding for success
Internet of Things - how secure is it?
Horizon introduction
Redscan - Insider threat case study
Insider threat event presentation
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - a risk perspective