Speaking opportunities: Infosecurity Magazine webinar week, June 2015

Infosecurity Magazine is organising a week of webinars, starting on June 15.

These are all discussion-format sessions aimed at an audience of security professionals. I am looking for speakers for the sessions below; our ideal guests are analysts, academics, security researchers and consultants, as well as CIOs and CISOs (please note speaking slots are usually not open to those working for specialist information security companies).

The outlines for the sessions are below, please email in the first instance if you are interested in taking part:

Monday 15th June, 3pm BST:

APTs: Overhyped or Under-managed?

Moderator: Stephen Pritchard

The term ‘advanced persistent threat’ has been used (and perhaps abused) by information security vendors and professionals for years, but has the information security industry reached an accurate consensus on what an APT actually is, and how to manage one? This session will look to define the term and questions whether APTs are overhyped, or indeed under-managed, and what information security professionals should be doing about them.

Wednesday 17th June, 3pm BST:

Strengthening the Weakest Link: Securing the Supply Chain

Although third-party suppliers bring many benefits, the reality is that their systems, data management and even employee training standards may be vastly different to that of the organization receiving the services. Many organizations fail to consider whether their suppliers take the same attitude to cyber-attacks and hacking risks as they do. This session considers the questions that organizations should be asking their suppliers, and where liability lies in the event of a security incident.

Thursday 18th June, 2pm EST:

Finding Privacy and Trust in the Cloud

As organizations turn to the cloud to improve efficiency and reduce costs, information security professionals struggle to gain assurance that their organization’s data is secure. As sensitivity to privacy heightens following revelations about government surveillance, companies can’t afford to risk their critical information assets. The increased scrutiny has placed pressure on cloud providers to provide assurance around their ability to protect data. This session advises information security professionals about the questions they should be asking in order to find privacy and trust in the cloud.


About stephenpritchard
Freelance journalist specialising in business and technology, based in London (UK).

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: