Please note: this event has unfortunately been postponed until September.
This Thursday 27 July, Kurtosys Co-Founder and Chief Information Security Officer (CISO) Harry Thompson will be giving at talk entitled How to build an effective insider threat strategy, telling of his own experiences in adopting cybersecurity measures at Kurtosys, and giving guidance to other cybersecurity professionals.
With incidents of hacking and malware hitting the news in recent times, the hiring of cybersecurity professionals within businesses, and the need for a counter-threat strategy, is now of greater importance than ever before. Yet whilst there is often a focus to combat external hacking attempts, this roundtable meeting will instead focus on the ‘Internal Threat’; 58% of all security incidents can be traced to employees (former and current), customers, partners and suppliers.
This event will be hosted as a collaboration between Nettitude and Avecto.
Nettitude is a global leader in security consultancy, protecting an organisation’s technology and people by mitigating cyber risk. It serves organisations from the United States to the Asia Pacific Region to the Middle East, and its EMEA headquarters are based in Warwickshire, England.
Avecto is a software company which develops protective solutions for advanced security threats. Its offices are based in Manchester, UK; Massachusetts, USA; and Merkurhaus, Germany.
The discussion will start at 5pm, with Harry’s talk starting at 5.50pm. It will take place at the following address:
Wolfgang’s Beer Haus, 2/3 Creed Lane, London, EC4V 5DY
The event will provide refreshments in a relaxed atmosphere, and is thus a perfect way to discuss the Insider Threat with other cybersecurity professionals.
The event is only two days away, so do not hesitate to sign up to save you place.
The threat landscape for financial institutions has changed considerably since the DDoS attacks of 2012. Watch this webinar with Rich Bolstridge, Chief Strategist, Financial Services, at Akamai Technologies for an overview of how the definition of “adequate cybersecurity” has shifted.