44ConCyberSecurity 2015 April 28, 2015 to April 28, 2015, London,UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening and Keynote Adrian N/A
Not following the herd – how to make your voice matter in the corporate world. Quentyn Taylor In this section Quentyn will look at how to make your voice heard and relevant ...
Breaking In: How to hack your way to a Cybersecurity career, and how to hack it if you already have one Steve Lord Many people on the red side of the information security fence look at systems all ...
Cyber Myths and Monsters: how to raise awareness and change behaviours Jessica Barker Cyber insecurity often feels like a horror story, and the idea of cyber security an ...
Presentation and Communication Skills for Security Professionals Jerry Gamblin How you communicate in meetings, emails, presentations and hallway talks can make the difference between ...
Essentials of Incident Response Steve Armstrong This workshop aims to cover the three key areas required to build an effective Incident ...
Pitfalls of Public Cyber Data Phil Huggins , Ernest Li There are increasingly many data-driven cyber reports published and these are being relied upon to ...
Legal drivers for cyber security Dai Davis Legal Drivers in Cyber Security: Many or None? What are the real drivers for Cyber ...