Speaking opportunities: Infosecurity Magazine webinars, July 2015

We are looking for speakers for the following webinars, for Infosecurity Magazine.


These sessions are educational and widely attended by security professionals. We welcome speakers from analyst houses, independent consultants, academia and security professional bodies (not, sadly, speakers working for IT security vendors).

Please contact me if you are interested in taking part.

2 JUL 2015, 15:00 BST, 10:00 EDT
Protecting Data Across Cloud Applications: the Hidden Challenge
The rise of cloud applications in the workplace is driving the need for companies to extend existing security policies to all devices and manage access to cloud applications.

At the same time, more employees are using personally-owned devices to access, process and store corporate data.

And the ease of deploying cloud applications has increased the incidence of employees using unauthorised applications to process corporate data.

This webinar will discuss:

  • The increased adoption of cloud applications;
  • The need to deliver solutions with detailed analytics around cloud application usage;
  • How to provide robust security solutions;
  • How to protect against web-borne treats.

  • 9 JUL 2015, 15:00 BST, 10:00 EDT
    How Outsiders Become Insiders: Understanding and Combating Today’s Threats
    Today’s attackers employ a variety of deception tactics allowing them to impersonate legitimate users and bypass existing IT security defences.

    Web applications are often compromised in order to host malware or be turned into a phishing site. Users who visit these sites then become infected or have their credentials stolen, giving attackers access to your network. Once inside, attackers become insiders. They use stealthy techniques to move around the network, looking for targets, while remaining undetected for months.

    In this webinar we will examine:

  • Common tactics used by today’s attackers to target users and web assets
  • How attackers impersonate legitimate users to become “insiders”
  • Best practices for preventing, detecting and containing these threats
  • Advertisements

    About stephenpritchard
    Freelance journalist specialising in business and technology, based in London (UK).

    Leave a Reply

    Fill in your details below or click an icon to log in:

    WordPress.com Logo

    You are commenting using your WordPress.com account. Log Out / Change )

    Twitter picture

    You are commenting using your Twitter account. Log Out / Change )

    Facebook photo

    You are commenting using your Facebook account. Log Out / Change )

    Google+ photo

    You are commenting using your Google+ account. Log Out / Change )

    Connecting to %s

    %d bloggers like this: