Spring conferences put the spotlight on security

The changing nature of security threats, increased liability resulting from new regulations, and the dependence of core business...

The changing nature of security threats, increased liability resulting from new regulations, and the dependence of core business on IT have meant that IT security is now too critical to be conducted on anything but a rigorously professional basis.

This spring will see considerable activity in the area of IT security, as several groups accelerate their efforts to build a common understanding of IT security professionalism.

Several conferences will give IT directors an opportunity to catch up with the developments taking place in this area and debate them with senior IT security leaders. There are three main conferences, each with a range of speakers from user organisations, government security agencies and academia.

 

E-Crime Congress

5-6 April, London

The National Hi-Tech Crime Unit's third annual E-Crime Congress will provide frank appraisals of the nature of the security challenge organisations face; the emerging threats to business reputation and the challenge of reputation management; and how to manage risk while maximising business advantage.

The 25 speakers come from a range of organisations, including Barclays Bank, HSBC, Dresdner Kleinwort Wasserstein, Mastercard, British Airways, the FBI, the National Crime Squad, eBay, the National Infrastructure Security Co-ordination Centre and the Serious and Organised Crime Agency, as well as the National Hi-Tech Crime Unit.

www.e-crimecongress.org

 

Infosecurity Europe

26-28 April, London

Although Infosecurity Europe is primarily an exhibition by IT security suppliers, showcasing new products and services, the conference that runs alongside it features many user-oriented speakers. The event, run by Computer Weekly's sister organisation Reed Exhibitions, places strong emphasis on its educational programme.

In the opening keynote Lord Harris of Haringey will ask whether the UK's critical national infrastructure can withstand a cyber attack. Other topics include cybercrime, compliance, governance, communicating security effectively to the board, strategic protection, and identity and access management.

Among the 40 speakers will be Fred Piper, who set up the Information Security Group at the Royal Holloway College and is at the heart of the push to co-ordinate IT security professionalism in the UK. Also speaking will be experts from Standard Chartered Bank, ICI, Eli Lilly, Roche, British Energy, Royal Mail, Barclays, the FBI, Dresdner Kleinwort Wasserstein and Reed Elsevier.

www.infosec.co.uk

 

Security: The New Enigmas

18-20 May, Bletchley Park, Herts

Experts from industry, universities and the security forces will meet at a high-level event at Bletchley Park, where the German enigma codes were broken during the Second World War.

The keynote speaker will be David Omand, security and intelligence co-ordinator and permanent secretary at the Cabinet Office, who is the UK's counter-terrorism co-ordinator, overseeing the Civil Contingencies Sec- retariat. Other speakers include Fred Piper, James Hart, commissioner of police for the City of London, and Phil Venables, chief security officer at Goldman Sachs.

www.bletchleypark.org.uk

 

More security events     

FEBRUARY

23 Edinburgh

Computer Forensics www.ncc.co.uk   

MARCH

14 London

Electronic War Against Terrorism, Parliamentary IT Committee www.pitcom.org.uk   

16 Reading

Security on HP Platforms, The HP User Group www.hpug.org.uk 

16-17 London 

Business Continuity Expo www.businesscontinuityexpo.co.uk   

19-23 London 

EuroCACS, Information Systems Audit & Control Association Conference www.isaca-london.org   

ARIL

26 London 

Safety Engineering & Management, Safety-Critical Systems Club www.safety-club.org.uk                         

6-28 London 

Infosecurity Europe 2005 www.infosec.co.uk

MAY

18-20 Bletchley Park 

Security: The New Enigmas, Three day security conference www.bletchleypark.org.uk 

Read more on Hackers and cybercrime prevention

SearchCIO
SearchSecurity
SearchNetworking
SearchDataCenter
SearchDataManagement
Close