Call for speakers: Infosecurity’s virtual conferences
This spring and summer, Infosecurity Magazine is holding two virtual conferences, one for the UK and one for a US audience.
The dates for the events are:
UK: Thursday 14th June 2012
US: Thursday 12th July 2012
Both events are pre-recorded for playback on the day.
I am moderating two sessions for each, and am currently organising speakers for the panels.
The working criteria is that each panel should have someone form the end-user security community (an IT director, chief security officer, chief information security officer, or a line of business executive who works with data security and privacy), an analyst and one other independent expert. For some panels it may be that two analysts, or two end users, works better. Please note that unfortunately, there are no openings for vendor executives to speak.
In the first instance, potential participants should email me their details, and which session(s) they could participate in – then we can discuss logistics. We want to confirm speakers by the end of April and have all sessions recorded by the third week in May for the UK conference.
The sessions I am moderating are:
Privacy, Compliance and the EU
How can information security professionals keep up with the increasingly complicated web of legislation? A desperate desire to keep their organization out of the headlines means a heightened interest in compliance for most CISOs. Join us to detangle that web.
Getting Inside the Insider Threat
It may be a cliché, but the insider threat really is one of the biggest threats to all organizations. Be it malicious, intentional, unsuspecting ignorance – you name it, it has happened and will continue to do so. Your people are your biggest asset but also your biggest threat. Join us to learn how you can seriously reduce the insider threat.
Bridging the Gap Between Security and the Business
As all information security professionals know, there is all too often a fundamental breakdown in communication and understanding between the business and information security. Getting buy-in from the Board is essential for the information security department, and succeeding in this requires the business to understand how security can work as a business enabler. This session will look at how to bridge that gap between security and the business.
Providing Smart Security for Smart Devices
Organizations are using an increasing number of tablet and mobile devices to maximize productivity, but is security paying the price? This session will discuss the current and possible threats to smart devices, and will advise on how you can choose the right mobile device management strategy for your organization
I look forward to hearing from you!