TechFusion is a free business technology event for people interested in how tech can improve their business. Jason will be providing the closing keynote address at 3.15pm.
Gain valuable insights from industry experts through a variety of seminars and exhibits from leading tech companies.
Previous exhibitors included Mitel, Samsung, Canon, Gamma, Sage, Huawei, Sony, Starleaf, Plantronics, Sennheiser, Oak, Highlight, Red Box Recorders, Semafone, GCC, LifeSize, Konftel and Nokia.
Only 200 tickets available. Register for free HERE.
2018 has started off as an eventful year with data breaches at Saks Fifth Avenue, Lord & Taylor and Under Armour’s MyFitnessPal app. And it will continue to be a catalyst year for data security with the 25th of May deadline for the European Unions’ General Data Protection Regulation, which regards “privacy as a fundamental human right and to protect it as such.” Data exposed or breached is not only a headache for security teams, but also impacts brand reputation, customer confidence and stock prices.
Gemalto’s 2017 Breach Level Index found 2.6 billion records where compromised in 2017, a 88% increase from 2016. In this webinar our expert, Jason Hart, will walk attendees through the most shocking 2017 stats, new data breach tactics and how companies can manage risk by mapping out where your data resides. Join us to learn more about:
-Internal threats and misconfigured cloud databases
-Growing security threats like data integrity attacks
-Innovative technology that is solving some of these issues
-What we have in store for 2018
To register for the live webcast, or to watch a replay after the broadcast date, click here.
WED 25TH APR 13:40 – 14:10, Cyber Threat Intelligence Theatre
Digital Disruption is not a new subject but the speed of its adoption is increasing dramatically. In order to develop more efficient ways of interacting with customers and producing new services, businesses will need to build security into their digital strategies because trust will be fundamental to the success of the digital transformation revolution. As organizations transform, security must be an integral and transparent part of the process. So what does this mean for Information Security Controls . Are we going to see disruption in the Cyber Security world?
More info here.
The International Cryptographic Module Conference is the leading annual event for global expertise in commercial cryptography. At the sixth annual edition of the conference in May 8-11 in Ottawa, Ontario, Canada, over 400 industry leaders from over 22 countries will convene to address the unique challenges faced by those who develop, produce, test, specify, and use cryptographic modules, with a strong focus on standards such as FIPS 140-2, ISO/IEC 19790, and Common Criteria. The conference helps to foster a focused, organized community of users. ICMC reviews technical issues underlying cryptographic implementation including physical security, key management, side-channel analysis, open-source development, algorithm testing, quantum threats, embedded applications, standardization, validation programs, government policy, professional ethics, and more.
Jason will present a Keynote in the Plenary Session on May 9th.
More info here.
The new EU regulation of the Privacy world (the GDPR) is rapidly approaching. Jason Hart will reveal a back to basics approach in relation to GDPR. Specifically, we will identify a GDPR blueprint that tackles the privacy concerns around confidentiality, integrity and availability of sensitive data.
October 4th, 2017. Session time: 14:30-14:50
For more info. and to access to the seminar planner, click here.
ISC2 Webinar – May 25th 2017 12:00–13:00 BST
Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations and identity theft. According to Gemalto’s Breach Level Index, the number of stolen, compromised or lost records increase by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.
Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a pulse on what is going on. It seems too simple to be true, but it goes back to the age-old principle of information is power. Getting the information comes from being aware of one’s surroundings. To become situationally aware, companies need to change their mindset- building a walled garden isn’t an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness.
Join us as we cover topics like:
- What we can learn from Jason Bourne about knowing one’s surroundings
- What we can learn from hackers to better protect valuable data
- What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability and confidentiality
- How to change our mindset in a new era of a hacker driven gold rush
To register for this event, or to watch on-demand after the event click here.
The new EU regulation of the Privacy world (the GDPR) is rapidly approaching. This webinar will reveal a back to basics approach in relation to GDPR. Specifically, Jason Hart – Gemalto CTO will identify a GDPR blueprint that tackles the privacy concerns around confidentiality, integrity and availability of sensitive data.
More info here.