44ConCyberSecurity 2015 April 28, 2015 to April 28, 2015, London,UK
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Opening and Keynote | Adrian | N/A | |
Not following the herd – how to make your voice matter in the corporate world. | Quentyn Taylor | In this section Quentyn will look at how to make your voice heard and relevant ... | |
Breaking In: How to hack your way to a Cybersecurity career, and how to hack it if you already have one | Steve Lord | Many people on the red side of the information security fence look at systems all ... | |
Cyber Myths and Monsters: how to raise awareness and change behaviours | Jessica Barker | Cyber insecurity often feels like a horror story, and the idea of cyber security an ... | |
Presentation and Communication Skills for Security Professionals | Jerry Gamblin | How you communicate in meetings, emails, presentations and hallway talks can make the difference between ... | |
Essentials of Incident Response | Steve Armstrong | This workshop aims to cover the three key areas required to build an effective Incident ... | |
Pitfalls of Public Cyber Data | Phil Huggins , Ernest Li | There are increasingly many data-driven cyber reports published and these are being relied upon to ... | |
Legal drivers for cyber security | Dai Davis | Legal Drivers in Cyber Security: Many or None? What are the real drivers for Cyber ... |