Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Events Calendar

Cyber Security Summit 2014

Thursday, 20 November 2014

W1siziisijiwmtqvmtavmjmvmtqvmtivmdmvnjavy3lizxjfc2vjdxjpdhlfbg9nb18xlmdpzijdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

Cyber Security Summit 2014 will bring together over 350 cyber security experts, senior officials and policy-makers from across public sector and industry to discuss the ever-changing threats posed by cyber-crime and share best practice strategies to help the UK effectively combat these threats.

Central to the discussion will be:

  • Ensuring Businesses are Safe in Cyberspace by 2016
  • Protecting the UK’s Critical National Infrastructure
  • Collaboration to Identify & Tackle the Cyber Crime Threat 
  • Investing in Tomorrow’s Cyber Security Workforce
  • Successfully Managing Cyber Security as part of the Digital Transformation
comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...