23rd March 2017 – Webcast – Getting started with GDPR, Privacy and Applying Appropriate Security Controls

Live webinar: 12pm (UK), 23rd March 2017, and available on-demand after this date.

 

march23webcast

In this webinar, presented by compliance experts Christine Andrews (DQM GRC), Jason Hart (Gemalto) and Becrypt you will learn:

a. The background to the new General Data Protection Regulation
b. An overview of the key areas of change from the existing Data Protection Act – and the penalties for getting it wrong
c. A focus on the information security implications and considerations for meeting compliance
d. An approach for understand the “Gaps” in your current compliance and, importantly, how best to move forwards

To register, click here.

6th December 2016 – (ISC)2 SecureLondon Conference

This conference explores the impact of the rise of the virtual organisation on security practice; the solutions that are emerging to tackle this environment; and the lessons being learned within professional practice. Acknowledging the need to step away from the technology–driven approach that often dominates traditional systems security management, delegates will explore the foundational concepts that drive security and still apply in a world that is designed to be much less defined than in the past.

Jason’s session:

15.50 – 16.10
S7: Attacker Persona Framework: A UX Approach to Identifying IOT Attack Vectors

For more information click here.

9th November Webinar – Data Breaches 2016: Make Your Data Worthless

Last year, cyber criminals started turning their focus to hacking people’s personal information. This year, more than half of all data breaches are identity theft. Hackers have been targeting government databases to get the information. It’s currently the industry with the largest number of records stolen and/or compromised. The cyber criminal’s shift from credit card and financial data to personal information begs the question “how much is your identity really worth?” While it might start as a nuisance, the true impact of identity theft to an individual can be catastrophic and costly. With the Internet of Things taking off and the number of connected devices increasing, it is important to make your data worthless to fraudsters.

This webinar looks at the major data breach trends in 2016. Who is doing the hacking, how they are doing it, what needs to be protected in the Internet of Things era and what data is under attack. In addition, listeners can get a new understanding of how to approach data security and “Secure the Breach”.

Join me on November 9th at 2pm.

REGISTER NOW

3rd November, 2016 – The Government Journey to Securing the Breach

Event: GTEC Ottawa, Canada
3rd November 2016
Today, governments need to extend their data infrastructure across business units, partners, suppliers, customers, and a growing mobile workforce. The outsider is now an insider. Because of this, governments and organizations must adopt an enterprise data protection strategy in order to effectively protect data from the core to the edge of the enterprise, but how?

A holistic security approach around protecting your data requires a vision, a plan, an understanding of best practices, managed execution, and regular oversight. This is where most organizations struggle. They know where they want to be, but how to get there is extremely challenging. Realizing the full potential of a data protection strategy requires well thought out business objectives and the involvement of multiple stakeholders across the organization, from business leaders, security officers, IT and Professional services to consultants, end users and even sales.

This presentation will discuss:

  • A blueprint to allow organizations to communicate more effectively between departments and ultimately create a systematic and lasting process or approach for securing their most sensitive data. 
  • There is a profound communication gap between the business and technical perspectives of data security. 
  • Based on encryption standards and best practices, this presentation will discuss how to build a business data security framework. Once business drivers are established, we’ll focus on security capabilities using vendor independent terms, and commonly accepted industry definitions to create a risk management blueprint. 
  • Real world business scenarios and map them to applicable solutions.