The European Information Security Summit 2013
Defending your enterprise and ensuring data security for tomorrow’s technologies
6–7 February 2013 • Central London, UK
Take control: steps towards better hack-proofing of your business
Nearly 200 Information Security experts and CIOs gathered at The Mermaid Theatre in London for two days of stimulating conversations, thought-provoking presentations and interactive roundtable discussions. The highlights video captures some of the excitement of the event, including remarks from key speakers and delegates.
IT security and data privacy is at the centre for most IT and security professionals, and is of growing importance to the boardroom and business managers. Threats to the security of systems and information include everything from cyber terrorism to viruses, malware, human error, new technologies and accidental data loss.
Organisations that fail to take effective measures are courting disaster, with the danger of legal action by authorities over breaches of – and devastating damage to – brands, reputation and customer confidence.
Hear from Chris Soghoian, US privacy researcher and activist, about the looming mobile security update crisis:
Hundreds of millions of devices, many holding sensitive personal and financial data, are now running software with known, exploitable software vulnerabilities. This talk will delve into the smartphone security update problem, examine its causes, and propose a way out.
High-level end-user insight to secure your systems
This exclusive summit will bring together CEOs, entrepreneurs, CIOs, IT directors and department heads from blue chip companies together with world-leading experts in cyber security to focus on strategic solutions.
- How should organisations protect themselves, their employees and their customers from IT attacks? Stay ahead of the cyber criminals with the latest information on viruses, malware and botnets.
- What to do when under attack? Prepare for a security breach and develop an effective response plan for your business.
- What about securing data in the cloud? How do companies decide what to put in the cloud, what to keep within their systems and how to secure both? Is the scale of cloud security safer than the individual security of a proprietary system? Get to the truth about the security of cloud computing and discover the security measures the experts recommend.
- Debate the security issues around employees working on personal devices. How to deal with consumerisation of IT and BYOD (bring your own device)? How to share corporate data confidentially with secure access, backup and file sharing while retaining a flexible work environment and remaining compliant?
- Learn about the threats to social media and how to protect your business and customers.
- Prevent data loss – and if the worst happens, learn ways to mitigate the problems and heal the wounds.
- Find the middle ground – how to strike the balance between money spent on IT security, the loss of flexibility entailed by security processes and policies, and the seemingly insatiable legal demands of accommodating an open-ended set of regulations and data protection expectations.
Food for thought for strategic thinkers
This is an exclusive, by invitation only, event for the executives of major organisations responsible for information security and data privacy. The debate will be rigorous, the information invaluable, and the opportunities for networking unparalleled.
The Mermaid Theatre, London, UK
The Mermaid Theatre is breath-taking historical London venue overlooking the Thames. It is the City’s best kept secret!
The Mermaid is situated between the City and the West End. Located on the North Bank of the Thames, the building enjoys spectacular views towards the Tate Modern, Globe Theatre and the Millennium Bridge.
Transport Links are excellent too, the nearest tube stops are:
- Blackfriars – newly opened tube and train station, with direct services from Luton and Brighton. Simply turn right as you leave the Blackfriars North exit and it is just a 2 minute walk
- Mansion House – on the District/Circle line a short 6 minute walk
- St Paul’s – on the Central line, approximately a 4 minute walk.
Puddle Dock, Blackfriars, London, EC4V 3DB
Telephone: +44 (0)20 7236 1919
While striving to put on the most engaging and informative event covering all the latest issues around information security, we are also keen to make this as practical and convenient for you as possible.
With this in mind, we have secured accommodation deals to offer you the very best hotels at a short distance from our venue.
Here you have the option of a 5* star hotel or one of two 4* star hotels, all of which are a short, four minute walk from the Mermaid Theatre.
The Grange St Paul’s hotel – a 5* star venue offering luxurious deluxe bedrooms, restaurants and bars – can be booked for £329 + VAT.
There is also extra capacity at the 5* Grange City hotel, which is five minutes from the venue by taxi, for £279 + VAT.
The other options are the Crowne Plaza, costing £235 (including VAT) and the Club Quarters St Paul’s hotel, costing £179 plus VAT.
Both of these are elegant 4* star hotels and just a four minute walk from the venue.
A budget option is also available.
Grange St. Pauls 5*
Call in code: Speak directly with Nicole Belliere quoting Lyonsdown
Tel no. 0207 074 1000
Grange City 5* (St. Pauls overflow)
Call in code: Speak directly with Nicole Belliere quoting Lyonsdown
Tel no. 0207 074 1000
Crowne Plaza, The City 4*
Call in code: LD2
Tel no. +44 (0) 207 438 8040
Club Quarters, St. Pauls 4*
Call in code: LY0602
Tel no. +44 (0) 207 451 5800
Holiday Inn Express (Budget option)
12min walk (across Millenium bridge)
Call in code: Quote Lyonsdown when speaking to Elena Garcia
Tel no. 0207 401 2525
*Should you encounter any problems booking, please email firstname.lastname@example.org.
**All hotel deals are subject to availability and each hotels terms & conditions.
Speakers for this event include
The European Information Security Summit
In February 2013, business leaders, IT experts and strategic thinkers from many of Europe’s leading organisations will meet in central London to debate the latest threats to cyber security and focus on solutions to the challenges around data protection and privacy in a mobile and cloud-based environment.
Influence the business elite
The kinds of people present at an INNER CIRCLE summit include CEOs, board directors, vice presidents, department heads, and entrepreneurial business owners. It’s an opportunity to meet and influence these senior decision-makers, win their trust, have your voice heard and make a strong impression.
Reaching a wider audience
Journalists and experts from Business Technology will cover the key findings of the meeting and produce an agenda-setting report on customer strategy, to be distributed in The Sunday Telegraph. The report will reach an audience of more than 1.5 million that includes approximately 66,000 c-suite executives.
Content will also be published on biztechreport.co.uk, which provides a forum for readers, delegates, speakers and sponsors to openly debate the issues at hand.
About Cassidian CyberSecurity
Cassidian CyberSecurity’s activities protect governments, national agencies, strategic industries and critical infrastructure from increasingly sophisticated cyber threats.
Cassidian CyberSecurity’s expertise includes:
“Cyber Defence & Professional Services” focusing on high-grade professional services, dealing with Advanced Persistent Threats and establishing Security Operation Centres;
“Trusted infrastructure” aiming at cryptography, digital identity management and high-security national solutions, and
“Secure Mobility” enabling the supply of products and services for mobile device security (voice, data and applications).
Recently, Cassidian was selected for a government Cybersecurity Incident Response pilot to develop best cyber defence practices within organisations. This ensures Cassidian CyberSecurity’s place in shaping the way organisations will deal with the cyber threat in the future.
Check Point Software Technologies Ltd. worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. It continues to develop & innovate based on its Software Blade Architecture, delivering flexible & simple solutions that are customizable to meet their security needs. Check Point defines security as a business process to combine policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs.
Networks (NASDAQ: FFIV) makes the connected world run better. F5 helps organizations meet the demands and embrace the opportunities that come with the relentless growth of voice, data, and video traffic, mobile workers, and applications—in the data center and the cloud. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5’s Intelligent Services Platform to deliver and protect their applications and services while ensuring people stay connected. Learn more at www.f5.com.
Mimecast (www.mimecast.com) delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate and fragmented email environments into one holistic solution that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email. Founded in the United Kingdom in 2003, Mimecast serves more than 6,000 customers worldwide and has offices in Europe, North America, Africa and the Channel Islands.
Every day Mimecast takes care of millions of emails and documents for thousands of companies worldwide, which is why 75% of the top 100 UK law firms have switched to Mimecast.
Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years’ experience, we deliver top-ranked client, server and cloud-based security that fits our customers’ and partners’ needs, stops new threats faster, and protects data in physical, virtualised and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ cloud computing security infrastructure, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.
AirWatch is the leader in enterprise-grade mobility management and security solutions. More than 4,000 customers across the world trust AirWatch to manage their most valuable assets: their mobile devices. Our highly scalable solution provides an integrated, real-time view of an entire fleet of corporate and employee-owned Apple iOS, Android, Windows, BlackBerry and Symbian devices.
As the largest MDM provider with more than 900 employees, 300 focused on R&D, AirWatch offers the most comprehensive mobility management solution. With a proven track record of deployments larger than 100,000 devices, organizations can confidently manage every single device used across the enterprise.
HP is a leading provider of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products from ArcSight, Fortify, and TippingPoint, the HP Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and network defense technology to protect today’s applications and IT infrastructures from sophisticated cyber threats. Visit HP Enterprise Security at: http://www.hpenterprisesecurity.com.
NCC Group is a leading global information assurance firm, providing freedom from doubt that all critical material is available, protected, and operating as it should be at all times. Information assurance is delivered through escrow & verification, security testing, audit & compliance, software testing & web performance services.
NCC Group’s security testing, audit and compliance division assures the protection of your information against malicious attacks and data loss, and the compliance of your processes with legal requirements.
With the UK’s largest penetration testing team and top-level accreditations, we are the trusted advisor to over 15000 clients worldwide.
Tenable Network Security is relied on by a million security professionals at many of the world’s largest companies and governments, including the entire U.S. Department of Defense, to stay ahead of emerging vulnerabilities, threats and compliance-related risks. Its Nessus and SecurityCenter solutions continue to set the standard for identifying vulnerabilities, preventing attacks and complying with a multitude of regulatory requirements. For more information, please visit www.tenable.com.
Preventia are a leading integration specialist for compliancy-based Information Security products and services.
Preventia provides product integration and consultancy for information security management systems for clients ranging from multi-nationals to governmental bodies..
We pride ourselves on our unique product portfolio. Our technology partners are carefully selected to ensure we continue to lead the way in providing integrated, cost effective, end-to-end enterprise security solutions.
Stonesoft delivers a dynamic and flexible network security solution that secures your business and cloud deployments from Advanced Cyber Attacks whilst simplifying security management. The company’s product portfolio consists of the industry’s first transformable Security Engine, Next Generation Firewalls, Intrusion Prevention Systems, and Remote Access solutions, with Stonesoft’s Management Centre at the core.
Stonesoft serves both private and public sector organizations across the globe and are proud to have the highest customer retention rate in the industry.
Stonesoft is the world’s leading researcher of Advanced Evasion Techniques used in targeted cyber-attacks to bypass security systems.
For more information, visit www.stonesoft.com.
Bit9, the global leader in Advanced Threat Protection, protects the world’s intellectual property (IP) by providing innovative, trust-based security solutions to detect and prevent sophisticated cyber threats. The world’s leading brands rely on Bit9’s award-winning Advanced Threat Protection Platform for endpoint protection and server security.
Bit9 stops advanced persistent threats by combining real-time sensors, cloud-based software reputation services, continuous monitoring and trust-based application control and whitelisting—eliminating the risk caused by malicious, illegal and unauthorized software.
The company’s global customers come from a wide variety of industries, including e-commerce, financial services, government, healthcare, retail, technology and utilities.
Activity is an independent specialist providing expert advice on best practice information security and security penetration testing to a wide range of organisations from mid-sized companies to world-leading enterprises, government and the wider public sector. Our clients work with us because of the pragmatic and understandable expertise we provide.
Activity is a CESG CHECK penetration testing service provider and a member of the Council of Registered Ethical Security Testers (CREST). All of our services are independently certified to comply with ISO 9001 and ISO 27001.
We deliver ISO 27001 and CESG CLAS consultancy services, helping our clients meet security standards.
Tufin™ is the leading provider of Security Policy Management solutions that enable organizations to take control of their firewalls. Over 1000 customers are using the award-winning Tufin Security Suite to assess and mitigate risk in real-time, continuously comply with standards, and keep business-critical applications online.
Tufin Security Suite enables IT to manage security policy across all network devices including traditional and next-generation firewalls, routers, switches and load balancers. With a unique, application-oriented approach to policy management, Tufin simplifies and streamlines firewall operations, slashing the time spent on policy management by up to 75%.
“Metacompliance, a leading UK software company has a clear vision of making Compliance and IT Security easier for organisations. The software can ensure the active participation of all staff in compliance initiatives such as policies, e-learning and surveys, thus mitigating the risk of compliance incident and the associated fines.
The software can be used to demonstrate that staff understand content such as policies by being tested with questions. Delivering increased user participation in compliance and IT Security campaigns provides the audit information to generate reports that allow the organisation to demonstrate its “duty of care” to Regulators.”
Accellion provides enterprise mobile file sharing solutions that enable anytime, anywhere access to information while ensuring enterprise security and compliance. The world’s leading corporations and government agencies use Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT costs. Accellion secure file sharing solutions mobilize content in SharePoint and other enterprise content management systems and can be deployed on public, private and hybrid cloud environments and provide the ease-of-use business users need while giving the enterprise organization the flexibility, scalability and protection it needs. For more information please visit www.accellion.com or call (855) 485-4300.
Will your organisation be joining the debate?
If you are interested in sponsoring The European Information Security Summit, please call us on +44 (0)208 349 4363 or contact us here.
Overcome emerging challenges to information security and data protection
The summit will look at important updates in key trends, big picture strategy and technical specifics and offers an opportunity for Europe’s leading players in corporate information security to debate the most pressing issues, to network, and to identify the solutions that will protect the future of their organisations.
This event is for executives responsible for information security and data privacy strategy and decisions, including CEOs, board directors, vice presidents and department heads and senior managers. Only IT senior level applicants will be approved and the summit team will reserve the right to reject registrations.
Please note that registration will be denied to solution providers and vendors. For opportunities to get involved please contact Marc Morrow in the sponsorship team on 020 8349 6453 or email@example.com
Attending this summit will help you:
- Learn about the threat of hostile computer attacks in European cyberspace
- Keep cyber criminals at bay
- Build a secure and compliant cloud
- Make social media more secure
- Educate employees and customers in IT policies and security threats
- Ensure your security policies are up-to-date
- Keep employee personal devices secure
- Protect your systems against viruses, malware and botnets
- Prevent and mitigate data loss
- Protect your brand from information security breaches
UK business is harbouring a time bomb. Research shows that many businesses leaders are woefully ignorant of risks surrounding the security of their information. Security breaches ruin reputations, cost fortunes and end careers – but even those businesses that understand the danger they face rarely know what to do about it.
In 2013, Business Reporter aims to change that. The European Information Security Summit forms a key part of a suite of information products designed to expose the dangers businesses face and highlight the actions they can – and must – take. The end result will be a “manifesto for change” that Business Reporter will use to inform, educate and mobilise business leaders – before it’s too late.
In addition to the summit, the product suite will include:
- A print report highlighting the major risks businesses face and a call to action, distributed with the national press.
- Online coverage, including a live broadcast of the European Information Security Summit, with archive access after the event and additional video content.
- Bespoke research conducted by a leading third-party market research agency, assessing business’s readiness and ability to face, and understanding of, this major emerging risk.
Senior editorial experts from Business Reporter will combine these outputs to inform a whitepaper entitled: “Information Security: A manifesto for change”. The culmination of the campaign to raise awareness, the white paper will include a straightforward set of recommendations for the public and private sector organisations, which will achieve maximal national attention through a concerted PR campaign.
International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications and consumer technology markets. IDC helps IT professionals, business executives, and the investment community make fact-based decisions on technology purchases and business strategy. More than 1000 IDC analysts provide global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries worldwide. For more than 48 years, IDC has provided strategic insights to help our clients achieve their key business objectives. IDC is a subsidiary of IDG, the world’s leading technology media, research, and events company.
Intellect is the voice of the UK’s technology industry.
We believe that a vibrant and successful technology sector is vital to the long term economic well-being of the country. Our business services help companies of all sizes compete and innovate in a dynamic global market. We represent the views of industry to government and regulators and also provide opportunities for government and regulators to interact with industry on key policy and market issues.
Our vision for the UK To be the world leader in the development and use of technology for the benefit of its economy and citizens
Our vision for Intellect To be the go-to organisation for the technology industry in the UK that connects people, knowledge and know-how to solve problems, share understanding and cooperate responsibly for mutual benefit and the benefit of customers, citizens and the economy
Our mission as BCS, The Chartered Institute for IT, is to enable the information society. We promote wider social and economic progress through the advancement of information technology science and practice. Our 70,000 strong membership includes IT practitioners, businesses, academics and students around the world.
As the global awarding body for IT qualifications and certifications we help people, businesses and society at large to improve their skills and knowledge in the field of information technology. We do this by setting the standards of excellence for course content, training provision and examination and certification systems. We create programmes for every level, from basic computer skills to advanced niche expertise.
We partner with organisations to provide the development tools they need to get the most from their IT professionals.
Founded in 1989, the Information Security Forum (ISF) is an independent, not-for-profit association of leading organisations from around the world. It is dedicated to investigating, clarifying and resolving key issues in cyber, information security and risk management and developing best practice methodologies, processes and solutions that meet the business needs of its Members.
ISF Members benefit from harnessing and sharing in-depth knowledge and practical experience drawn from within their organisations and developed through an extensive research and work program.
For all media partner enquiries, please contact Sonja Ruetzel on +44 (0)20 8349 4363 or via email.