Call for speakers: Infosecurity’s virtual conferences

This spring and summer, Infosecurity Magazine is holding two virtual conferences, one for the UK and one for a US audience.

The dates for the events are:

UK: Thursday 14th June 2012

US:  Thursday 12th July 2012

Both events are pre-recorded for playback on the day.

I am moderating two sessions for each, and am currently organising speakers for the panels.

The working criteria is that each panel should have someone form the end-user security community (an IT director, chief security officer, chief information security officer, or a line of business executive who works with data security and privacy), an analyst and one other independent expert. For some panels it may be that two analysts, or two end users, works better. Please note that unfortunately, there are no openings for vendor executives to speak.

In the first instance, potential participants should email me their details, and which session(s) they could participate in – then we can discuss logistics. We want to confirm speakers by the end of April and have all sessions recorded by the third week in May for the UK conference.

The sessions I am moderating are:

Privacy, Compliance and the EU 
How can information security professionals keep up with the increasingly complicated web of legislation? A desperate desire to keep their organization out of the headlines means a heightened interest in compliance for most CISOs. Join us to detangle that web. 
Getting Inside the Insider Threat 
It may be a cliché, but the insider threat really is one of the biggest threats to all organizations. Be it malicious, intentional, unsuspecting ignorance – you name it, it has happened and will continue to do so. Your people are your biggest asset but also your biggest threat. Join us to learn how you can seriously reduce the insider threat. 
Bridging the Gap Between Security and the Business
As all information security professionals know, there is all too often a fundamental breakdown in communication and understanding between the business and information security. Getting buy-in from the Board is essential for the information security department, and succeeding in this requires the business to understand how security can work as a business enabler. This session will look at how to bridge that gap between security and the business. 
Providing Smart Security for Smart Devices
Organizations are using an increasing number of tablet and mobile devices to maximize productivity, but is security paying the price? This session will discuss the current and possible threats to smart devices, and will advise on how you can choose the right mobile device management strategy for your organization 

I look forward to hearing from you!


About stephenpritchard
Freelance journalist specialising in business and technology, based in London (UK).

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: