SlideShare a Scribd company logo
IISP East Midlands forum 
18th September 2014 
Hosted by Restricted Intelligence 
“User Awareness and Engagement” 
East Midlands IISP branch sponsored by Nexor
o Introduction 
o Jim Shields - "From Awareness to Engagement" 
o Break 
o Geordie Stewart - "The Value of Generating an 
Emotional Response” 
o Q&A / Group Discussion 
o Closing remarks 
o Networking / light refreshments 
East Midlands IISP branch sponsored by Nexor 
AGENDA
INSTITUTE OF INFORMATION SECURITY PROFESSIONALS 
Regional Chair – Colin Robbins, Nexor 
East Midlands IISP branch sponsored by Nexor
CYBER-SECURITY INFORMATION SHARING PARTNERSHIP 
o www.cert.gov.uk/cisp/ 
o East Midlands group 
o Facilitated by Stuart J Green Digital 
o www.sjgdigital.com 
East Midlands IISP branch sponsored by Nexor
US-UK GLOBAL CYBER SECURITY INNOVATION SUMMIT 
o £4m competition for UK cyber businesses to 
develop ideas to tackle cyber security threats 
o The appointment of a cyber security small 
business champion 
o Regional cyber security SME clusters 
East Midlands IISP branch sponsored by Nexor
East Midlands IISP branch sponsored by Nexor 
YOUR HOT TOPICS 
Taken from the forum booking form question – “What is your hot topic at the moment?”
o Resources from the forum will be made available 
on http://www.nexor.com/iisp-east-midlands 
o Next forum early 2015 
o Looking for a host organisation 
o Get involved - sounding board? 
o Thanks for coming 
East Midlands IISP branch sponsored by Nexor 
CLOSING REMARKS

More Related Content

What's hot

Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...
Gill Hamilton
 
The Cyber Connected World
The Cyber Connected World The Cyber Connected World
The Cyber Connected World
East Midlands Cyber Security Forum
 
Detection is Dead
Detection is DeadDetection is Dead
Detection is Dead
Yul Bahat
 
201704624- e-privacy 2017 - summer edition - 24000 dati
201704624- e-privacy 2017 - summer edition  - 24000 dati201704624- e-privacy 2017 - summer edition  - 24000 dati
201704624- e-privacy 2017 - summer edition - 24000 dati
yasoiler
 
Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney
Restorative Justice Council
 
Bb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-finalBb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-final
Janne Järvinen
 
Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)
Jaba Gvelebiani
 
DHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
DHPA Techday 2015 - Marc Gauw - Trusted Networks InitiativeDHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
DHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
Splend
 
[CB20] Alliance power for Cyber Security by Kenneth Geers
[CB20] Alliance power for Cyber Security by Kenneth Geers[CB20] Alliance power for Cyber Security by Kenneth Geers
[CB20] Alliance power for Cyber Security by Kenneth Geers
CODE BLUE
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victorsegughana
 
ION Durban - MANRS Introduction
ION Durban - MANRS IntroductionION Durban - MANRS Introduction
ION Durban - MANRS Introduction
Deploy360 Programme (Internet Society)
 
KTN funding opportunities & networking events
KTN funding opportunities & networking eventsKTN funding opportunities & networking events
KTN funding opportunities & networking events
Duncan Purves
 
IoT Forum Q1 2015
IoT Forum Q1 2015IoT Forum Q1 2015
IoT Forum Q1 2015
Mirko Presser
 
Century link current solution set
Century link   current solution setCentury link   current solution set
Century link current solution set
Jim MacDuff
 
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificStockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
APNIC
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnettsegughana
 
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Arm Igf
 
Immerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing LondonImmerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing London
Creative Economy Programme
 
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI Network
 
Three Layers of Digital Governance Infographic (English)
Three Layers of Digital Governance Infographic (English)Three Layers of Digital Governance Infographic (English)
Three Layers of Digital Governance Infographic (English)
ICANN
 

What's hot (20)

Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...
 
The Cyber Connected World
The Cyber Connected World The Cyber Connected World
The Cyber Connected World
 
Detection is Dead
Detection is DeadDetection is Dead
Detection is Dead
 
201704624- e-privacy 2017 - summer edition - 24000 dati
201704624- e-privacy 2017 - summer edition  - 24000 dati201704624- e-privacy 2017 - summer edition  - 24000 dati
201704624- e-privacy 2017 - summer edition - 24000 dati
 
Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney
 
Bb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-finalBb20151019 trusted cloud-rennes-final
Bb20151019 trusted cloud-rennes-final
 
Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)
 
DHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
DHPA Techday 2015 - Marc Gauw - Trusted Networks InitiativeDHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
DHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
 
[CB20] Alliance power for Cyber Security by Kenneth Geers
[CB20] Alliance power for Cyber Security by Kenneth Geers[CB20] Alliance power for Cyber Security by Kenneth Geers
[CB20] Alliance power for Cyber Security by Kenneth Geers
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
 
ION Durban - MANRS Introduction
ION Durban - MANRS IntroductionION Durban - MANRS Introduction
ION Durban - MANRS Introduction
 
KTN funding opportunities & networking events
KTN funding opportunities & networking eventsKTN funding opportunities & networking events
KTN funding opportunities & networking events
 
IoT Forum Q1 2015
IoT Forum Q1 2015IoT Forum Q1 2015
IoT Forum Q1 2015
 
Century link current solution set
Century link   current solution setCentury link   current solution set
Century link current solution set
 
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificStockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
 
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
 
Immerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing LondonImmerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing London
 
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
 
Three Layers of Digital Governance Infographic (English)
Three Layers of Digital Governance Infographic (English)Three Layers of Digital Governance Infographic (English)
Three Layers of Digital Governance Infographic (English)
 

Viewers also liked

IISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentation
IISPEastMids
 
Managing and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveManaging and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspective
IISPEastMids
 
Econocom - identifying funding for success
Econocom - identifying funding for successEconocom - identifying funding for success
Econocom - identifying funding for success
IISPEastMids
 
Governance - the Role of the Board
Governance - the Role of the BoardGovernance - the Role of the Board
Governance - the Role of the Board
Qonex
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything
IISPEastMids
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
East Midlands Cyber Security Forum
 
Qonex - Securing the IoT
Qonex - Securing the IoTQonex - Securing the IoT
Qonex - Securing the IoT
IISPEastMids
 
Redscan - Insider threat case study
Redscan - Insider threat case studyRedscan - Insider threat case study
Redscan - Insider threat case study
IISPEastMids
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
IISPEastMids
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials
Qonex
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
IISPEastMids
 
Trustworthy Software
Trustworthy SoftwareTrustworthy Software
Trustworthy Software
Qonex
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
IISPEastMids
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
IISPEastMids
 
Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark Chimely
IISPEastMids
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
East Midlands Cyber Security Forum
 

Viewers also liked (16)

IISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentation
 
Managing and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveManaging and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspective
 
Econocom - identifying funding for success
Econocom - identifying funding for successEconocom - identifying funding for success
Econocom - identifying funding for success
 
Governance - the Role of the Board
Governance - the Role of the BoardGovernance - the Role of the Board
Governance - the Role of the Board
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Qonex - Securing the IoT
Qonex - Securing the IoTQonex - Securing the IoT
Qonex - Securing the IoT
 
Redscan - Insider threat case study
Redscan - Insider threat case studyRedscan - Insider threat case study
Redscan - Insider threat case study
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
Trustworthy Software
Trustworthy SoftwareTrustworthy Software
Trustworthy Software
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark Chimely
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
 

Similar to IISP Sept 2014 presentation

#WLEP17 Annual Conference
#WLEP17 Annual Conference #WLEP17 Annual Conference
#WLEP17 Annual Conference
Opening Doors & Venues
 
Accelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the AcceleratorAccelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the Accelerator
Heather-Fiona Egan
 
Information Security Development in Ireland
 Information Security Development in Ireland Information Security Development in Ireland
Information Security Development in Ireland
FIDO Alliance
 
Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2
Ray Bugg
 
Jisc Northern Ireland strategy forum
Jisc Northern Ireland strategy forumJisc Northern Ireland strategy forum
Jisc Northern Ireland strategy forum
Jisc
 
Parallel session: security
Parallel session: securityParallel session: security
Parallel session: security
Jisc
 
IREM AMS Conference Program
IREM AMS Conference ProgramIREM AMS Conference Program
IREM AMS Conference ProgramRyan Slack
 
Ireland Gateway To Europe | 2015 Trade Mission in Review
Ireland Gateway To Europe | 2015 Trade Mission in ReviewIreland Gateway To Europe | 2015 Trade Mission in Review
Ireland Gateway To Europe | 2015 Trade Mission in Review
Jamie Harnett
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
Ray Bugg
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
Vinoth Sivasubramanan
 
Digital DNA Show Guide
Digital DNA Show GuideDigital DNA Show Guide
Digital DNA Show GuideJohn Bell
 
Funding for Innovation - Citrus Mind, Jumpstart, Metis Partners, Lending Crowd
Funding for Innovation - Citrus Mind, Jumpstart, Metis Partners, Lending CrowdFunding for Innovation - Citrus Mind, Jumpstart, Metis Partners, Lending Crowd
Funding for Innovation - Citrus Mind, Jumpstart, Metis Partners, Lending Crowd
Scottish Digital Health & Care Innovation
 
The combined effect of the collective effort
The combined effect of the collective effortThe combined effect of the collective effort
The combined effect of the collective effort
CSSaunders
 
Strengthening Cybersecurity Collaborations: Outcomes from missions to Singapo...
Strengthening Cybersecurity Collaborations: Outcomes from missions to Singapo...Strengthening Cybersecurity Collaborations: Outcomes from missions to Singapo...
Strengthening Cybersecurity Collaborations: Outcomes from missions to Singapo...
KTN
 
Cyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsorsCyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsors
atlanticcouncil
 
NSAwards infodeck 2018
NSAwards infodeck 2018NSAwards infodeck 2018
NSAwards infodeck 2018
Global Startup Awards
 
Presentation For Nwnwsfc December 09
Presentation For Nwnwsfc December 09Presentation For Nwnwsfc December 09
Presentation For Nwnwsfc December 09kieran04
 
Cyber security awards
Cyber security awardsCyber security awards
Cyber security awardsKarla Jobling
 
Business and financial services, Fife
Business and financial services, FifeBusiness and financial services, Fife
Business and financial services, Fife
Iain Shirlaw
 

Similar to IISP Sept 2014 presentation (20)

#WLEP17 Annual Conference
#WLEP17 Annual Conference #WLEP17 Annual Conference
#WLEP17 Annual Conference
 
Accelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the AcceleratorAccelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the Accelerator
 
Information Security Development in Ireland
 Information Security Development in Ireland Information Security Development in Ireland
Information Security Development in Ireland
 
Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
Jisc Northern Ireland strategy forum
Jisc Northern Ireland strategy forumJisc Northern Ireland strategy forum
Jisc Northern Ireland strategy forum
 
Parallel session: security
Parallel session: securityParallel session: security
Parallel session: security
 
IREM AMS Conference Program
IREM AMS Conference ProgramIREM AMS Conference Program
IREM AMS Conference Program
 
Ireland Gateway To Europe | 2015 Trade Mission in Review
Ireland Gateway To Europe | 2015 Trade Mission in ReviewIreland Gateway To Europe | 2015 Trade Mission in Review
Ireland Gateway To Europe | 2015 Trade Mission in Review
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 
Digital DNA Show Guide
Digital DNA Show GuideDigital DNA Show Guide
Digital DNA Show Guide
 
Funding for Innovation - Citrus Mind, Jumpstart, Metis Partners, Lending Crowd
Funding for Innovation - Citrus Mind, Jumpstart, Metis Partners, Lending CrowdFunding for Innovation - Citrus Mind, Jumpstart, Metis Partners, Lending Crowd
Funding for Innovation - Citrus Mind, Jumpstart, Metis Partners, Lending Crowd
 
The combined effect of the collective effort
The combined effect of the collective effortThe combined effect of the collective effort
The combined effect of the collective effort
 
Strengthening Cybersecurity Collaborations: Outcomes from missions to Singapo...
Strengthening Cybersecurity Collaborations: Outcomes from missions to Singapo...Strengthening Cybersecurity Collaborations: Outcomes from missions to Singapo...
Strengthening Cybersecurity Collaborations: Outcomes from missions to Singapo...
 
Cyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsorsCyber912 student challenge_two_pager_sponsors
Cyber912 student challenge_two_pager_sponsors
 
NSAwards infodeck 2018
NSAwards infodeck 2018NSAwards infodeck 2018
NSAwards infodeck 2018
 
Presentation For Nwnwsfc December 09
Presentation For Nwnwsfc December 09Presentation For Nwnwsfc December 09
Presentation For Nwnwsfc December 09
 
Cyber security awards
Cyber security awardsCyber security awards
Cyber security awards
 
Business and financial services, Fife
Business and financial services, FifeBusiness and financial services, Fife
Business and financial services, Fife
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

IISP Sept 2014 presentation

  • 1. IISP East Midlands forum 18th September 2014 Hosted by Restricted Intelligence “User Awareness and Engagement” East Midlands IISP branch sponsored by Nexor
  • 2. o Introduction o Jim Shields - "From Awareness to Engagement" o Break o Geordie Stewart - "The Value of Generating an Emotional Response” o Q&A / Group Discussion o Closing remarks o Networking / light refreshments East Midlands IISP branch sponsored by Nexor AGENDA
  • 3. INSTITUTE OF INFORMATION SECURITY PROFESSIONALS Regional Chair – Colin Robbins, Nexor East Midlands IISP branch sponsored by Nexor
  • 4. CYBER-SECURITY INFORMATION SHARING PARTNERSHIP o www.cert.gov.uk/cisp/ o East Midlands group o Facilitated by Stuart J Green Digital o www.sjgdigital.com East Midlands IISP branch sponsored by Nexor
  • 5. US-UK GLOBAL CYBER SECURITY INNOVATION SUMMIT o £4m competition for UK cyber businesses to develop ideas to tackle cyber security threats o The appointment of a cyber security small business champion o Regional cyber security SME clusters East Midlands IISP branch sponsored by Nexor
  • 6. East Midlands IISP branch sponsored by Nexor YOUR HOT TOPICS Taken from the forum booking form question – “What is your hot topic at the moment?”
  • 7. o Resources from the forum will be made available on http://www.nexor.com/iisp-east-midlands o Next forum early 2015 o Looking for a host organisation o Get involved - sounding board? o Thanks for coming East Midlands IISP branch sponsored by Nexor CLOSING REMARKS

Editor's Notes

  1. Third regional forum Sponsored by Nexor Hosted today by Restricted Intelligence