San Francisco, California
London, United Kingdom
Please find our member survey here: https://www.surveymonkey.com/s/CMK6X8L
Please note that guests are welcomed and are encouraged to sign up for membership if you like what you see! We are only able to accomodate one free guest visit per person to our events. Future repeat guest visits will be on a charged basis.
You are all warmly welcomed to the March 2015 ISSA-UK AGM and London Chapter Meeting. The event will feature some of the UK's top cyber security speakers and we thank Grant Thornton for sponsoring this event and 2-sec for sponsoring the drinks and canapes
4:00 - Registration and refreshments
4.30 - ISSA-UK Annual General Meeting
As a not-for-profit association governed by bye-laws, this is our only annual compliance duty - there's no security audit, no pen test, no company returns, just a mandatory Annual General Meetings where the board will be available to discuss what they've been doing and members can question what they've not been doing. This part is limited to members only, but feel free to turn up from 4, grab a coffee, network with other non-members (I should probably hint at something there!), and we'll be done as soon as we can.
5.00 - Main event - Introduction - Gabe Chomic, ISSA-UK President
5.10 - Kevin Brear, Senior Manager, Grant Thornton, '3 lines of defence model - is it still fit for purpose?'
5.25 - Aireni Omerri, Founder, Information Security for Africa
' People Centric Security (PCS) - A proof of concept'
Technology centric security solutions don't work because the underlying architecture (OSI stack, TCP/IP stack) means security is being served up in slices ie per layer. So it's time for something different
Aireni is Chief Curator|Chief Disruptor|Founder ISfA, a 5 year journey that began 30 years ago, an experienced information security practitioner who has worked on 3 continents; Africa, America & Europe
5.55 - Networking break
6.10 - Tammy Moskites, Venafi CISO
'Securing Trust: Defending Against Next-generation Attacks'
Targeted cyber-attacks are steadily increasing, and business executives face challenges with trust exploits. Bad actors will take advantage of any and every exploit that they can use to steal your data, and look for the weakest link in your security systems. Common, well-known trust exploits like digitally signed malware with stolen private keys, poor key and certificate management, fraudulent certificates, and weak outdated cryptographic methods are all still in place in many organizations.
It’s critical to have visibility and control of enterprise key and certificate inventories, especially given most other IT security technologies depend on the trust provided by keys and certificates. Cyber criminals understand that the easy targets are those organizations that have little visibility into their threat surface and cannot respond quickly. As an industry we need to gain control over trust, we need to plug the gap related to key & certificate-based exploits.
6.40 - James Blake, 'State of Security Operations'
“James Blake is the Practice Manager for HP’s Security Intelligence & Operations Centre practice where he has is responsible for building and maturing the cyber intelligence & operations capabilities for some of the World’s largest organisations. Before joining HP, James was the Chief Information Security Officer for Europe’s largest Software-as-a-Service vendor where he was responsible for securing operations over 11 data centres and 7 regional offices on 4 continents. Prior to this James held positions as an IT Operations director for a pharmaceutical, as a Security Operations Centre Manager for a national telecommunications provider and he ran technical operations across EMEA for a major software vendor.
In this session James will outline at the major findings in incident detection and response uncovered by the HP Security Intelligence & Operations Centre practice during their maturity assessments of customer’s capabilities over the past twelve months. He will discuss which vertical markets have the greatest level of maturity and discuss observed good-practice, what are the common trends and discuss why so many security operations capabilities fail to meet business objectives.
A full copy of the 2015 State of Security Operations report, the findings of which this presentation is based, can be downloaded at http://www.hp.com/go/stateofsecops”
7.10 - Closing thoughts followed by Networking Drinks at Grant Thornton kindly sponsored by 2-sec
9.00 - Event Close
Thanks to our sponsors
To join up as a member go to: www.issa-uk.org
When & Where
ISSA-UK is one of ISSA's largest chapters, and provides networking events and educational opportunities to our member base in London. Gabe Chomic was elected President in 2015, and chairs our events.
ISSA was founded in 1987 and is the longest standing association for cyber security professionals globally, with over 12,000 members.