Forum: Free invitation to the SC Forum for 55 delegates
We want the Forum to work for you, so we tailor it to your needs. That is why you are able to choose which workshops you attend, which suppliers you would like to meet, and which areas you want to discuss. The excellent evening dinners and drinks receptions are a chance to discuss the highlights of your busy day, unwind with your peers and be entertained and inspired by top-name after-dinner speakers
To book your place, simply complete and submit the online form at http://www.haymarketevents.com/forumRegisterNow/249/. Remember, there are only 55 delegate places, so please book now to avoid missing out.
For further information call the Forums team on 020 8267 4542 or email firstname.lastname@example.org
Where: The Oxford Belfry
When: 7-9 July 2008
Phishing attempts continue to rise dramatically and become more sophisticated in design and execution, so what lessons can be learned from successful phishing attacks? This workshop will use real-world examples and outline the likely direction and characteristics of future attacks.
Speaker: Greg Day, McAfee
PCI DSS is a constant source of confusion to many information security professionals, yet failure to comply can carry hefty fines and disengagement from global payment schemes. This workshop will help you get up to date with PCI DSS and understand how to comply with it.
Speaker: Branko Lolich, American Express
What's next for Microsoft security?
Whatever Microsoft does, it cannot be ignored by information security professionals. One of the company's top technologists will be outlining key security applications and strategies Microsoft will be introducing in the months ahead.
Speaker: Stephen Lamb, Microsoft
Legal workshop: data protection rights and privacy
A look at some key developments in UK and EU law that impact upon the work of information security professionals with a special focus on changes to the data protection act.
Speaker: Frank Jennings, DMH Stallard
Encryption strategies to avoid data loss
Such is the complex nature of the technology that choosing an encryption solution that's right for your business can be daunting. This workshop will introduce an encryption program into your workplace that is properly understood by you and your co-workers and ensure your business stays out of the headlines.
Speaker: Richard Moles, nCipher
Googling the Web 2.0 and beyond: mastering the security challenges of a new computing paradigm
Companies like Google are changing the way we do business, but with the advantages of cloud computing come new security challenges. This session will address those issues with a special emphasis on Google innovation and its disclosure and engagement with the technical community.
Speaker: Amichai Shulman, Imperva
Understanding and implementing ISO 27001
What is the ISO standard, why is it important and how do you achieve the accreditation? This workshop will look at the requirements, the accreditation process and how ISO 27001 forms part of a suite of information security assurance standards.
Speaker: Jeff Brooker, PriceWaterhouseCooper
Risk management: understanding the basic principles
What are the fundamental principles behind risk analysis and management and how can they be applied within their own departments? Plus a look at how to advance your key information security strategies and think beyond the reactive.
Speaker: Stephen Bonner, Barclays Wealth.