Stuart O'Brien, Author at Security IT Summit | Forum Events Ltd
  • Covid-19 – click here for the latest updates from Forum Events & Media Group Ltd

Security IT Summit Security IT Summit Security IT Summit Security IT Summit Security IT Summit

Posts By :

Stuart O'Brien

Experts reflect on how you can be cyber smart for Cybersecurity Awareness Month 2021

960 640 Stuart O'Brien

The overarching theme of this year’s Cybersecurity Awareness Month is “Do your part. #BeCyberSmart.” The pandemic has made the line between our online and offline lives indistinguishable. Everything we do is fuelled by technology. Our homes, our economy, the entire country. Everything is impacted by, but also at risk of, the internet.

By now, everyone and every business has a basic understanding of the threats the online world presents. Most if not all organisations will also have some level of cybersecurity in place. But most of the time it’s not good enough. Stronger security practices and more education about the risks we are all vulnerable to is absolutely vital if we are to be resilient enough to withstand a technology-driven future.

So, we spoke to some of the industry’s experts to learn how businesses and individuals can play their part in keeping our cyberspace secure.

Knowing and how and where to spend your budget

There are three key areas that the experts we chatted with believe need to be revaluated. The first comes as no surprise: technology. That’s because “opportunistic cybercriminals continue to take advantage of the evolving digital environments that individuals, governments, and organisations have embraced,” according to Chris Huggett, SVP EMEA, Sungard Availability Services.

Raymond Pompon, Director, F5 Labs, added that “web application exploits are the biggest cybersecurity risk facing organisations today. In fact, recent research has shown 56% of the biggest cybersecurity incidents over the past five years were related to web application security issues, constituting 42% of all financial losses recorded for these extreme events. The pandemic has also thrown significant challenges at our defences and now, as employees shift to hybrid working models, another layer of complexity is added to the mix.”

In light of this landscape, Huggett believes “[Cybersecurity Awareness Month] should act as a timely reminder to organisations, both big and small, to review their security processes. In their hunt for ‘big game’ enterprises, threat actors are holding third-party vendors hostage to reach their ultimate targets. Organisations need a holistic view of their entire infrastructure to make sure that every touch point is secure.”

This can, of course, be challenging at a time when businesses are doing their best to make a comeback from the pandemic, but Rob Treacey, Head of Security, Professional Services, EMEA at Rackspace Technology, says “organisations should be looking to spend between 15-20% of their budget on cybersecurity.” That’s compared to the “7-15% of their IT budgets [that is currently being spent] on cyber security.” Treacey advises that “the best way to decide what you spend is to figure out what percentage of your budget is proportionate to the information assets you are protecting. If a breach within your organisation would result in irreparable reputational damage, significant customer loss or regulatory non-compliance, then you probably require a healthy security budget to prevent any of those consequences from becoming a reality.”

One of the biggest priorities to review when deciding where to spend cybersecurity budget, according to David Higgins, EMEA Technical Director, CyberArk, are “innovations like machine learning, [which] are making organisations more cyber smart because they eliminate excess login requests.” He warned that “cyber criminals know [our] dirty little password secrets and target weak passwords as an easy way to steal information and even get rich quickly, often via common methods like phishing and impersonation. That’s why 80% of hacking-related breaches can be linked to stolen or brute-forced credentials.”

Gareth Jehu, CTO, Com Laude believes that cyber security practices around domain names are another thing that can often be overlooked. He advises, “one of the first places to start is implementing an up-to-date TLS encryption protocol. This protects the confidentiality and integrity of data in transit and authenticates the parties that are exchanging information. Adopting a robust domain lock solution such as Registry or Super Lock can also provide protection by implementing a domain specific approval handshake for any modification to domain name settings such as name servers. An organisation should also manage its domain assets carefully, ensuring it has appropriate and active SSL certificate coverage. Mismanagement of these certificates can lead to erroneous expiration, opening the door to disruption of critical services”

Addressing one of the biggest problems in cyber: human error

The second element to reviewing a business’ cyber practises comes down to its people. Mark Belgrove, Head of Cyber Consultancy, Exponential-e, told us that “most businesses, despite having access to advanced protections and the best threat intelligence on offer, remain vulnerable to one key factor: human error. It is a constant vulnerability that can never be fully eradicated. The remote working whirlwind brought on by the pandemic, and the use of corporate devices on less secure home networks, often for personal use, means human error has left organisations vulnerable to even more threats in the last 18 months too.”

The problem stems down to the fact that, “while most organisations want to increase security awareness among their employees, the stark reality is that many don’t know where to begin,” explained Erez Yalon, Head of Security Research at Checkmarx. He added that “fundamentally, implementing a shared cybersecurity responsibility boils down to two tactics; increasing awareness, and providing training. Without awareness, change can’t happen. It’s the first step in helping notice a problem exists, hasn’t been addressed, and that action is needed. Staff must be made aware of their security responsibilities and there needs to be concrete alignment across departments to create a comprehensive and cohesive security program. To further this, ongoing training programs must be implemented as a priority. Often, such training sessions can be tedious, and so organisations should conduct bitesize, interactive lessons, not extensive monotonous ones.”

Jonathan Smee, Information Security Consultant & Technical coach at Grayce, echoes this message, highlighting that “there is a widening skills gap in IT security, with research from Department for Digital, Culture, Media & Sport (DCMS) stating that two-thirds (64%) of cyber firms have faced problems with technical cyber security skills gaps, either among existing staff or among job applicants.” Smee believes “organisations should therefore look to provide continuous learning opportunities and adequate training to keep their employees up to date with the latest cyber threat trends.”

Getting the foundations of your digital business right

The final element we must consider, according to Rick McElroy, principal cybersecurity strategist, VMware and Bill Mason, Senior Project Manager, Distributed, is the foundation on which most of our businesses are now built – software – and the people that build it.

Mason explains that “with the mass transition to remote and hybrid working comes a growing reliance on software to keep us connected and productive, no matter where we’re working from. But as organisations continue to integrate new tools to future proof themselves, they need to consider the security implications. Businesses should be thinking about track and trace – but not as we know it. What this means in the context of distributed workforces is tracking any potential vulnerabilities that are incorporated into third party and open-source libraries when developing software, as well as scanning code and fixing all security issues that are identified to a requisite level.” He adds, “cybersecurity is complex, and one of the best pieces of advice I have received is to ensure that your developers are following appropriate standards. They exist for a reason. They make developers’ lives easier because they give them a framework for reference.”

In McElroy’s opinion, “a lack of common goals between security, IT and developers has long been an issue, one being exacerbated by the potential complexity of today’s multi-cloud, modern app world. Teams are working in silos, and this is having a detrimental impact on a business’ security and its ability to meet objectives.” He believes, one of the biggest problems is that “security is being considered a barrier to developers and IT. We need to move from this towards a scenario where security as a technology is thought of differently. It is there to support the brand, build trust, and optimise app delivery for developers. It’s there to eliminate the false choice between innovation vs. control. This culture shift will enable stronger collaboration between security, developer and IT teams.”

Are you cyber smart?

Cybersecurity is a constantly evolving entity. Hackers are always on the move and it’s common knowledge that they’ll always be on the front foot in one way or another – the best we can do is try and keep up. Taking on board the insights from these industry experts might just ensure you can.

INDUSTRY SPOTLIGHT: HANDD Business Solutions

960 640 Stuart O'Brien

HANDD Business Solutions (HANDD) are a data centric cyber security service partner. We work within the IT security channel marketplace to provide software and the services required to address your business security needs.

As a result, we do not author our own product sets and instead offer consultancy, sales and aftersales support for the product offerings provided by our vendors.

The simplest way to think of the services a channel partner or Value-Added Reseller provides is that we go over and above what the vendors will provide themselves;

  1. Local Support; lots of technology vendors are based in the United States. If you’re elsewhere in the world you don’t want to wait for the west coast to wake up to get a major issue fixed. Here at HANDD we provide follow-the-sun support enabling our customers to get prompt resolution when experiencing issues regardless of their location.
  2. Agnostic Approach; we’re not tied to one solution, and as such focus solely on providing the right fit for your business challenge. This could encompass X number of solutions to get the job done.
  3. Services; because we’re vendor agnostic we’ve experience of engineering different solutions together, migrating from one or another and integrating existing pieces of technology which may exist already in your business.

Fundamentally, using HANDD to deploy your project you’re going to get more for your money! More time, care and attention discover more at https://www.handd.co.uk/data-services/.

Do you specialise in Malware protection solutions? We want to hear from you!

960 640 Stuart O'Brien

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in November we’re focussing on Malware solutions.

It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today.

So, if you’re a Malware solutions specialist and would like to be included as part of this exciting new shop window, we’d love to hear from you – for more info, contact Chris Cannon on c.cannon@forumevents.co.uk.

Here’s our full features list:

Nov – Malware
Dec – Network Security Management
Jan – Anti Virus
Feb – Access Control
Mar – Intrusion Detection & Prevention
Apr – Phishing Detection
May – Advanced Threat Dashboard
Jun – Browser/Web Security
July – Authentication
Aug – Penetration Testing
Sep – Vulnerability Management
Oct – Employee Security Awareness
Nov – Malware
Dec – Network Security Management

Security IT Summit is just TWO weeks away – Secure your place!

960 640 Stuart O'Brien

Don’t forget to claim your complimentary guest pass to the Security IT Summit and gain access to insightful seminar sessions from industry thought leaders.

The event takes place November 4th at the Hilton London Canary Wharf, providing a platform for senior IT/cyber security professionals and their suppliers – for one-to-one business meetings, learning and networking.

Confirmed seminar sessions include:-

“Counter Terrorism Top Tips for Business”
Presented by: Chris Phillips, CEO, The International Protect and Prepare Security Office

“Lessons from Sport for Security leaders”
Presented by: Rob Mukherjee, Director of Transformation, EveryCloud

“Peaks and Pitfalls – 3 decades of IT, InfoSec and Data Protection”
Presented by: Tim Burnett, Security & Compliance Manager / DPO, Sykes Holiday Cottages

You can view the full seminar details here.

Your place is entirely free and includes benefits such as;

– An itinerary of one-to-one meetings with solution providers
– A seat at our industry seminar sessions (included within your itinerary)
– Lunch and refreshments are complimentary throughout
– Networking breaks to make new connections in your field

Join representatives including: BNP Paribas, CSL, Family Action Charity, HMRC, Kaplan International, Leadec and more!

Here is some delegate feedback from our last Summit:

“Excellent engaging seminars with a great list of suppliers to network with.” – AB Agri

“An extremely well planned event clear guidance on joining, good background info and flawless technology.” – Johnnie Johnson Housing Ltd “Worthwhile attending and good insight into the latest innovations.”GDC

“Very good event, well managed and run with a good selection of 3rd parties.”AB World Foods

Book your place here* (booking form takes less than two minutes to complete!).

5 Minutes With… HANDD Business Solutions’ Sam Malkin

480 320 Stuart O'Brien

In the latest instalment of our IT security industry executive interview series we spoke to Sam Malkin (pictured, right), Lead Solutions Architect at HANDD Business Solutions, about the company, the security challenges presented by the shift to home working, the opportunities it also creates and the potential of Gaia-X…

Tell us about your company, products and services.

HANDD Business Solutions, a data-centric cyber security service partner. Headquatered in the UK providing services globally to protect and manage data throughout it’s lifecycle, At-Rest, In-Transit, In-Use and when it’s created.

What have been the biggest challenges the IT security industry has faced over the past 12 months?

Without a doubt the obvious challenge is the shift to remote and hybrid working. Many different areas arise because of this, securing BYOD, understanding privilege access, accelerated cloud adoption, data proliferation. The list is enormous, many organisations were forced to adopt new technologies to protect the health of their workforce. This meant forgoing the usual processes around procurement, security, privacy etc just in order to keep the lights on. We also saw Brexit and things like the Schrems II which always keeps us on our toes.

And what have been the biggest opportunities?

Ironically enough the shift to remote and hybrid working. New technology adoption and moves into as-a-Service type models give lots of flexibility and quite often cost savings. People can realise opex-v-capex models. Luckily for us regardless of the location data needs managing and securing.

What is the biggest priority for the IT security industry in 2021?

Unfortanately I think it’s probably still going to be around remote working and transitioning back into the office. Safe collaboration platforms and things like CASB, Zero Trust Networks and Identity management platforms for me. VDI vendors are probably going to do alright again.

What are the main trends you are expecting to see in the market in 2022?

I’m expecting new legislation across the world around data privacy, data residency etc. Insider threat and accidental data loss safeguarding will no doubt feature as folk continue to resist going back to the traditional workplace. I’d love to see some organisations develop a dedicated privacy function within their organisation, taking data privacy seriously and running it alongside a traditional SoC.

What technology is going to have the biggest impact on the market this coming year?

Edge Computing is something I’m very intriqued by. I’m looking forward to seeing how enterprises can adopt this and the challenges in securing that. I’m also hearing lots of good things from analysts about Privalege Access Management. With administrators being outside the office understanding what and who are making changes is going to be crucial.

In 2025 we’ll all be talking about…?

Gaia-X hopefully – it aims to create a federated open data infrastructure based on European values regarding data and cloud sovereignty. https://www.gaia-x.eu/

Which person in, or associated with, the IT security industry would you most like to meet?

Linus Torvalds.

What’s the most surprising thing you’ve learnt about the IT security sector?

I’m often surprised by the lack of security in some organisations. And where those organisations prioritise spending.

You go to the bar at the Security IT Summit – what’s your tipple of choice?

An IPA, the quirkier the better. I’ve been referred to as a “craft beer snob” on more than one occasion!

What’s the most exciting thing about your job?

Without a doubt meeting customers, understanding how they’re using the technology and ultimately solving their problems. Pre-pandemic, actually visting a customer site always gave me a buzz, shaking hands and having a coffee whilst talking data security. Perhaps that makes me a little sad?

And what’s the most challenging?    

No customer environment is the same. We’re fortunate enough to work with very flexible software which means I’m often trying to swot up on something to integrate with. It means I never stop learning though which is something I also get a buzz about. Particularly if it means doing some engineering in a lab or testbed. 

What’s the best piece of advice you’ve ever been given?

No one ever got fired for being early.

Succession or Stranger Things?

I had to Google this to work out what I was being asked, so neither. We do watch a lot of Paw Patrol and Cricket in my house!

Synack works with Microsoft to provide a one-stop shop for Microsoft Azure-based cloud security

960 640 Stuart O'Brien

By Synack

Microsoft Azure comes equipped with all the right security controls, but effective deployment and management of these controls is an ongoing process, driven by evolution and risk tolerance . Proper implementation of cloud rollouts and ongoing maintenance can be a challenge, even for large organizations, leading to a lack of protections such as least privilege for access controls. And attacks on the cloud appear to be growing. Verizon’s 2021 Data Breach Investigations Report found that “external cloud assets were more common than on-premises assets in both incidents and breaches.”

Security teams are left responsible for not only securing cloud assets, but also for ongoing cyber hygiene training and developing common sense policies to protect an organization’s assets. It can be an overwhelming task. Based on an increase in cloud misconfiguration vulnerabilities reported by the Synack Red Team in 2020, it is clear the existing solutions and frameworks are fragmented—leaving ample room for malicious exploits.

But now, finally, there is a better way!

By combining the power of Synack, the premier crowdsourced platform for on-demand security expertise, with Microsoft’s Azure Security Modernization (ASM) solution, enterprise and government organizations now have a scalable solution for cloud security planning, management, and improvement.

Per a Microsoft Blog Post from earlier this year, Microsoft Azure applications and infrastructure deployments have grown at leaps and bounds for nearly 20 years. In parallel, Microsoft has emerged as a cybersecurity leader—recently announcing a whopping $10 billion in revenue for its security business over the past 12 months. This represents more than 40 percent year-over-year growth (Vasu Jakkal, 2021). Microsoft security experts have deployed Microsoft services and solutions to secure 400,000 customers across 120 countries, including 90 of the Fortune 100. Integrations such as the one with Synack amplify Microsoft’s ability to continue to grow and innovate across all types of organizations.

Microsoft ASM solution  helps its clients stay ahead of adversaries. It deploys a Microsoft Azure-centric, continuous approach to security (see chart below), led by Microsoft security experts, and powered by the Synack Platform. Microsoft ASM includes a four-phase continuous security model: Plan, Develop, Deliver, and Measure which programs, implements, and tests Microsoft Azure security requirements and controls.

Synack’s unique combination of a continuous, crowdsourced platform and smart vulnerability detection technology makes the discovery of security vulnerabilities easy, fast, and actionable! Synack-found vulnerabilities are reported and fed into Microsoft ASM’s “Measure” phase to enable future “Planning” phases with real-world security testing data. Synack’s controlled and 24/7 testing, alongside its Azure integrations, ensures the changing boundaries and assets of today’s dynamic environments are tested safely and comprehensively.

“Thanks to our integration with Synack, we can now go beyond reviewing security configurations against recommended practices to include real time scanning of an environment against known security vulnerabilities. This allows us to help our customers further reduce risk by having a more comprehensive and tailored remediation plan fit to their needs.” says Heath Aubin, Director of Business Program Management, Security Strategy and Solutions at Microsoft Corp.

Synack’s cloud integrations allow for quick deployment of a variety of testing methodologies within a Microsoft Azure environment based on an organization’s goals and requirements. The first is open vulnerability discovery to uncover and report exploitable issues within a Microsoft Azure environment. The second includes targeted, offensive assessments aligned to the Microsoft Azure Security Benchmark.

Synack designed these targeted tests alongside the Microsoft ASM Solution Owners for an on-demand mechanism to quickly highlight areas of weakness within a Microsoft Azure environment.

Leveraging the integration between Synack and Microsoft ASM customers can experience a comprehensive testing and mitigation sequence to support compliance, asset management and planning, and expert level insight into the security of their Microsoft Azure assets.

To find out more, download our datasheet here.

5 Minutes With… Tenfold Security’s Helmut Semmelmayer

960 640 Stuart O'Brien

Helmut Semmelmayer currently heads channel sales at the software company tenfold software. Having worked on countless customer projects, he has extensive knowledge of the challenges that organizations face when it comes to protecting data from unauthorized access. His goal is to educate businesses and build awareness for current and future access-based attack patterns…

Tell us about your company, products and services

tenfold Software is a pioneer in the identity access management market by catering specifically to midmarket businesses. Our IAM solution provides a wide range of tools and out-of-the-box plugins at a fraction of the cost or complexity of enterprise IAM suites. By focusing on the features that mid-sized organizations actually need, we are able to offer a fast setup, intuitive interface and easy-to-use automation options. 1,000 satisfied clients and counting show that businesses want solutions that fit their scope and needs.

What have been the biggest challenges the IT security industry has faced over the past 12 months?

The COVID-19 crisis forced companies to adapt and either implement or radically scale up remote work. Employees needed additional equipment, schedules had to be adjusted, VPNs had to be set up, etc.

Obviously, business continuity was the first priority for organizations adjusting to the new normal. However, this meant that IT security concerns were often lost in the shuffle. For example: With many employees being furloughed or working reduced hours, the remaining staff members needed additional access rights to cover for their colleagues. Companies did not stop to think about how to assign these permissions correctly or ensure they are revoked later on.

And what have been the biggest opportunities?

Every crisis is also an opportunity, in this case by massively speeding up the digital transformation of our economy. By adopting remote work solutions, businesses are able to offer flexible hours and bring in new talent, both locally and from around the globe. Collaborating across vast distances is the future of work and will play a crucial part in solving the global challenges of the future.

What technology is going to have the biggest impact on the market this coming year?

It’s clear that traditional IT security approaches are no longer enough to protect companies from increasingly sophisticated targeted attacks, from complex social engineering campaigns to dedicated malware and ransomware attacks.

With cybercrime on the rise, zero trust architecture is becoming more important than ever. It also marks a key shift from securing the network perimeter to securing user identities. The default tools available in Microsoft are not up to the task, so more and more businesses are looking for ways to manage users and permissions in complex hybrid and cloud environments.

In 2025 we’ll all be talking about…?

Let me put it like this: If I look back five years and think about what we were working on back then, it’s clear that the present is completely different from any prediction I would have made at the time. By that logic, any prediction I could make about 2025 is going to fall short of the massive changes we are likely to see in that timeframe.

That being said, the pace of new developments in IT security has been increasing for decades and I’m certain that trend will hold for the next five years and beyond. The arms race between bad actors and cybersecurity firms will continue. Keeping companies and public institutions safe from new modes of attack will require research, monitoring and dedicated new technologies. 

What’s the most surprising thing you’ve learnt about the IT security sector?

One thing that continues to shock me is the lack of awareness for IT security, even in large companies. Security by design should be the general approach, but in reality, it tends to be an afterthought or ignored completely, even as digital threats become more and more dangerous. Recent examples like the Colonial Pipeline hack show that cyberattacks affect more than just computers; they affect the physical world and can have a massive impact on society. As IT security professionals, it’s our job to not just offer solutions, but also educate the public on the importance of cybersecurity.

What’s the most exciting thing about your job?

I work in an industry that is constantly changing and adapting to new problems and threats. It’s a very exciting and dynamic environment. As recent attacks and new cybersecurity laws show, the question of how to protect IT infrastructure is becoming increasingly mainstream. Helping organizations navigate these challenges and providing them with the right tools to manage these threats is incredibly rewarding.

What’s the best piece of advice you’ve ever been given?

When I first started in the industry, I was trying to read up on a broad range of topics that touched on our field of work. I quickly realized that this strategy doesn’t work in an industry as highly specialized as tech. My mentor opened my eyes to the fact that I had to choose certain topics to focus on and leave the rest to someone else. I still follow this approach in my current role at tenfold by focusing the organization entirely on IAM for midmarket businesses.

eBOOK: How to get started with Zero Trust Network Access (ZTNA)

960 640 Stuart O'Brien

By Censornet

Zero Trust is a paradigm that is becoming a guiding philosophy for the cybersecurity industry. But the technology that will turn the thinking into a reality is Zero Trust Network Access (ZTNA).

By 2023, 60% of enterprises will have phased out VPNs (virtual private networks) and replaced them with ZTNA, Gartner has predicted.

Even if an organisation has not yet considered moving to a Zero Trust model and implementing ZTNA, it should be laying the groundwork to ensure the changes happen as smoothly as possible. Censornet can help you on this journey, which we’ll start by explaining a little more about Zero Trust and ZTNA.

Goodbye VPN, hello ZTNA

Zero Trust and ZTNA turn the familiar mantra of ‘connect then authenticate’ on its head. Instead, Zero Trust demands a security approach where users must ‘authenticate, then connect’ and reminds security teams to ‘never trust, always verify’. In short, context – including identity – is everything.

ZTNA isolates systems from potential trespassers and hides applications from the internet. This makes applications more resilient to many forms of network-based attack including scans, vulnerability exploits, DoS and DDoS attacks.

Before letting anyone into a network, they should first be identified.  Risk should be assessed at that point, based on context, but also continually throughout the session. It is no longer enough for a user to simply fire up a VPN and connect. Identity, along with other contexts such as time and day must be considered, as well as other data points such as device, location, and even geo-velocity.

First steps to Zero Trust

For many organisations adopting a Zero Trust model, using ZTNA, is the first stage on the road to the next great paradigm: Secure Access Service Edge (SASE). Censornet’s guide will help you understand Zero Trust, discover how it can benefit your organisation, and assist you with taking those crucial first steps towards the future of your own cloud security.

Download your free copy now!

Industry Spotlight: tenfold Software

960 640 Stuart O'Brien

tenfold is an Identity and Access Management solution designed to meet the needs of mid-market organizations. Thanks to a data importing tool and a large set of out-of-the-box plugins, tenfold can be set up quickly and easily, providing businesses with a central platform for managing users and permissions across all their systems.

The ability to automate routine tasks like user provisioning and joiner-mover-leaver processes not only lowers your IT workload, but also makes user management more secure. Eliminating outdated and unnecessary permissions helps businesses avoid security risks and meet compliance standards

More and more laws and regulations, including the UK’s own NIS directive, demand that companies take control of access rights by restricting them to a need-to-know-basis and regularly reviewing all existing permissions. Without proper support, keeping track of the hundreds and thousands of permissions used in mid-market organizations is next to impossible!

tenfold provides you with the tools needed to face cybersecurity and compliance challenges head on. With automatic notifications for access reviews and full documentation of every change made to user accounts, preparing for audits has never been easier.

Twitter – @tenfoldsecurity

Facebook – https://www.facebook.com/tenfoldsoftware

LinkedIn – https://www.linkedin.com/company/tenfold-software-gmbh/

Visit our website to sign up for a free trial and find out more about tenfold’s wide range of powerful features.

Security IT Summit is just weeks away – Secure your place!

960 640 Stuart O'Brien

Don’t forget to claim your complimentary guest pass to the Security IT Summit and gain access to insightful seminar sessions from industry thought leaders.

The event takes place November 4th at the Hilton London Canary Wharf, providing a platform for senior IT/cyber security professionals and their suppliers – for one-to-one business meetings, learning and networking.

Confirmed seminar sessions include:-

“Counter Terrorism Top Tips for Business”
Presented by: Chris Phillips, CEO, The International Protect and Prepare Security Office

“Lessons from Sport for Security leaders”
Presented by: Rob Mukherjee, Director of Transformation, EveryCloud

“Peaks and Pitfalls – 3 decades of IT, InfoSec and Data Protection”
Presented by: Tim Burnett, Security & Compliance Manager / DPO, Sykes Holiday Cottages

You can view the full seminar details here.

Your place is entirely free and includes benefits such as;

– An itinerary of one-to-one meetings with solution providers
– A seat at our industry seminar sessions (included within your itinerary)
– Lunch and refreshments are complimentary throughout
– Networking breaks to make new connections in your field

Join representatives including: BNP Paribas, CSL, Family Action Charity, HMRC, Kaplan International, Leadec and more!

Here is some delegate feedback from our last Summit:

“Excellent engaging seminars with a great list of suppliers to network with.” – AB Agri

“An extremely well planned event clear guidance on joining, good background info and flawless technology.” – Johnnie Johnson Housing Ltd “Worthwhile attending and good insight into the latest innovations.”GDC

“Very good event, well managed and run with a good selection of 3rd parties.”AB World Foods

Book your place here* (booking form takes less than two minutes to complete!).