Keeping up with upcoming commissions

I’ve moved my posts of upcoming commissions looking for PR or industry input over to my new site – please do also subscribe by email for updates. The form’s at the bottom of the page.

Thanks!

Stephen 

Moving (at least, virtually)

I’m moving my website to a new platform – please do visit over at stephenpritchard.com.

If you subscribed to updates (including updates on upcoming commissions) by email then you’ll continue to receive these by email.

But if you are a WordPress user, and subscribed that way, you’ll only see new posts in the WordPress reader. So, if you want to have email updates instead, please pop over to the new site and sign up there, on the home page or alongside any blogpost.

 

As ever, your email address will only be used for blog updates, nothing else!
Stephen

Speaking opportunity, security and virtualisation

I’ve an opening for one or two independent speakers on the topic of security and virtualisation, for an Infosecurity Magazine webinar on Thursday, 21 July.

The format is a one-hour panel discussion, with each speaker talking for around 10 minutes with a short slide deck.

The outline is below – please get in touch if you’re interested in taking part. Unfortunately, those working for security vendors — and in this case, makers of virtualisation technology — aren’t eligible, sorry!

Title: Security in an Agile Datacentre

After breaches, data loss, major bugs and now the GDPR hit the headlines, senior members of the board are becoming more interested in cyber security, and are beginning to make budget and resources available.

Unfortunately, the task of securing systems is made that much harder, because the basics are not being done. Doors are being left open for attackers to take advantage of static and perimeter-centric security architecture to infiltrate the datacentre, and proliferate “laterally” to attack sensitive assets.

Blocking these attacks needs close co-operation between information security teams, IT, and data centre managers. Only by looking at all IT assets – including on the desktop, in the datacentre and in the cloud – can organisations bolster their defences, and ensure that a flexible and cost effective IT deployment is also secure.

In this webinar we will look at:

  • The impact of security of a virtual desktop deployment;
  • How to secure applications and data on virtualised servers, in hybrid environments and in the cloud;
  • Best practices to ensure that everyone in IT balances effective security with the need for operational efficiency and reliability.

New commissions: phone and imaging tech

I’m writing a couple of features for the Financial Times looking at imaging technology, and smart phone technology.

For the first, focusing on smart phones, we’re looking at some of the innovations that could be in the next generation of phones.

Taking imaging as a standpoint – films and TV ads are now being made on iPhones – what could the next wave of innovation look like? Is there a role for 8K cameraphones, HDR screens, or surround sound microphones?

We’ll look at how manufacturers are using these innovations to convince consumers to upgrade, and how some innovations might also leave users behind. Plus, what impact have these smartphones on the market for standalone cameras?

The article will be in the July Connected Business report so the deadline for submitting leads or background information is 1600 BST, Friday 17 June.

For a follow up piece to be published later, I’m also interested in research and commentary on innovations in broadcasting, film making and imaging. Last year saw 4K come of age. What’s next for this industry?

Please send any pitches by email in the first instance.

Call for speakers: Infosecurity webinars, June 2016

I’m moderating two webinars for Infosecurity Magazine in June.

The topics and timings are below, and I have two guest spaces on each session.

As ever our preference for speakers is:

  • CIOs or IT directors
  • CISOs or heads of security
  • Academic researchers
  • Industry analysts
  • IT consultants specialising in security
  • Professional/trade/accreditation bodies

Unfortunately we can’t take speakers from vendors whose main or sole business is IT security.

The deadline to submit speaker suggestions is 1700 BST, Tuesday 24 May.

 

The Death of Passwords: The Future State of Identity

16 JUN 2016, 15:00 BST, 10:00 EDT

Logging in with a username and password is going to be a very different experience in the future, particularly for the enterprise, consumers, e-commerce and more. Compromised identities, including passwords, are now the number one way cybercriminals are accessing and breaching organisations, over the use of malware.

In this webinar, learn from industry experts and look at the future of identity and the importance of secure credentials including:

  • Identity as a Service (IDaaS): When will you be logging into your corporate network using your Facebook credentials?
  • Is the future biometric?
  • Identity assurance across cloud, mobile, web, social and legacy applications
  • Contextual authentication, or logging users in based on risk factors around geolocation, device or other characteristics
  • Strategies for your organization to align to the future of authentication

 

Shutting the Door on the Attacker

30 JUN 2016, 15:00 BST, 10:00 EDT

There’s no such thing as infallible security, and preventing every single security breach is impossible.

But when a breach does happen, the steps an organization takes next will largely determine the damage they suffer, and how the business recovers. A security team’s first reaction is often to move to eject the attackers. But is that always the right strategy? Especially when it comes to advanced threats, there is a case for biding your time, and gathering intelligence.

In this webinar, we will look at the key considerations for deciding how and when to expel attackers from the network, including:

  • Why acting too quickly might cause more disruption
  • Key points to consider when choosing an expulsion approach
  • Critical areas to focus on when expelling attackers from the network ends