London Breakfast – Cyber Resilience: Optimising Cyber Processes

Events

18th Nov 2015 from 8am

HQS Wellington, River Thames (nearest tube: Temple)

Register Now

Huntsman Security and Protection Group International are pleased to offer you this exclusive invitation to a joint breakfast briefing we are hosting.

This is the latest in our “From the War room to the Board room” programme and will focus on threat verification, automation and the end-to-end cyber threat detection and response process.

Building on previous sessions on cyber resilience for senior managers, Huntsman Security is now delighted to bring together industry leaders to share their views and strategies on the new reality of cyber resilience.

Our keynote speaker for the November event is:

  • Brian Lord, Managing Director, PGI Cyber and former Deputy Director at GCHQ
    “Learning lessons from counter-terrorism, counter-insurgency and serious crime prevention”

Prior to PGI, Brian was the Deputy Director of GCHQ for 21 years, wherein he was responsible for Classified Intelligence and Cyber Operations. He directed departmental capability against emerging threats; and planned and ran defensive and active Cyber operations using his unparalleled experience of cyber threats and effective mitigation strategies.

From Huntsman Security you will hear from:

  • Peter Woollacott, CEO and Founder
    “Optimising cyber security: Automating Threat Verification”

UPDATE: Huntsman are able to announce an extra speaker for this event:

  • Craig Rattray, Partner at law firm Gateway plc
    “Cyber-theft of personal data: What is your legal risk exposure and how can you mitigate it?”

The event will include a panel session to follow the main presentations – giving attendees a unique opportunity to ask their own questions of the speakers and to share experiences with the audience.

We would love you to attend along with other confirmed delegates from Barclays, NatWest, Visa, BT, Goldman Sachs, MOD, T-Systems, Canon Europe, CERT-UK, EY and Lloyds.

Come and learn real strategies to enhance your knowledge of cyber security threat management and resilience.

Registration is essential

Register Now

 

SIGN UP TO RECEIVE CYBER SECURITY INSIGHTS

Read by directors, executives, and security professionals globally, operating in the most complex of security environments.