Cyber Risk & Insurance

Size: px
Start display at page:

Download "Cyber Risk & Insurance"

Transcription

1 Cyber Risk & Insurance The Risk Managers Forum Thursday 27 November 2014 One-day conference Grange City Hotel, 8-14 Cooper s Row, London EC3N 2QB Event sponsor Headline sponsor

2 Cyber Risk & Insurance The Risk Managers Forum More than 80% of UK organisations have no cyber insurance at all, despite over 70 new cyber insurance products being launched in the last two years. The rapid evolution of cyber threats has created gaps in existing products and uncertainty around policy wording, leaving many insurance holders unwittingly under-insured. Risk managers need to stay fully up-to-date to safeguard business continuity, reputation, finances and the safety of staff and clients alike. Cyber Risk & Insurance, run by the world s leading body for risk management, will help risk professionals understand what more they can do both internally, and when selecting insurance policies to better manage their organisation s cyber risk. This event focuses on practical guidance from industry leaders and provides plenty of networking opportunities. It includes a problem-solving roundtable forum and a panel discussion to enable you to fully participate and get the answers you need. Event sponsor Headline sponsor Event supporters Who should attend: n Chief risk officers n Heads of risk and risk managers from all sectors and types of organisation n Operational risk managers n Risk and insurance managers n Internal audit and control professionals n Risk advisors and consultants n Insurance buyers within organisations n Insurance industry professionals Benefits for attendees: n Network with leading cyber risk professionals n Learn what you are, and aren t, covered against n Understand the range of policies available, their wording and gaps n Take key learning points back to your organisation and implement them n Bring your specific questions to the dynamic roundtable discussion forum Benefits for the business: n Understand your level of coverage for cyber threats including mobile devices and bring your own device policies n Protect your reputation by ensuring that your insurance offers business-continuity assurances in the event of a cyber breach n Equip your risk professionals and insurance buyers with the know-how to protect your business n Gain operational confidence through knowledge of current cyber threats and the relevant risk transfer options SPONSORSHIP & EXHIBITION Building on your current market position, sponsorship will significantly increase your brand awareness whilst highlighting your company s knowledge and expertise. Please contact Murray Barber on +44 (0) (Ext 206), or murray.barber@theirm.org BOOK YOUR PLACE TODAY at For all event queries contact: jason.williams@theirm.org or +44 (0)

3 CONFERENCE Speakers Ciaran Martin Director General for Government & Industry Cyber Security, GCHQ Ciaran joined GCHQ in February 2014, and is a member of the GCHQ Board and SIRO. Prior to his current position, Ciaran s previous roles have been at the Cabinet Office, as lead official negotiator for the Prime Minister and Secretary of State for Scotland in the run-up to the Scottish independence referendum, and at HM Treasury and the National Audit Office. Peter Hacker CEO Global Communications, Technology and Media Practice, JLT Management Services Peter has over 20 years experience in the risk management and risk financing area for Fortune 500 CTM clients. Peter's role at JLT includes developing sophisticated, tailor-made conventional and alternative risk financing solutions for communication, technology and media clients, assessing clients' objectives in terms of risk retention, risk landscape and cost of capital, and managing the transaction, placement and servicing duties successfully. Andrew Rogoyski Head of Cyber Security Services, CGI Andrew is a member of CGI s Cyber Security Global Leadership with colleagues from US, Canada, and Europe. Andrew chairs TechUK s Cyber Security group which he created in 2008 and is an active member of the RISC council. INSURER PERSPECTIVE (Speaker TBC) Kevin Williams Partnership Engagement and National Cyber Crime Capabilities, National Cyber Crime Unit, National Crime Agency Tom Thackray Head of Enterprise Policy - Competitive Markets Directorate, CBI Kevin began his current role in 2013 and leads, on behalf of the head of the National Cyber Crime Unit, on building the UK s law enforcement capability to respond to cybercrime. Tom looks after CBI s policy on the digital economy, which includes data and information security, the EU digital agenda and cyber security. Tom also has oversight of CBI s work on the creative industries and intellectual property, as well as small and medium sized enterprises Participate in roundtable discussions hosted by: Tim Hill Technology Policy Advisor, The Law Society Tim has been in his current role for 12 years and works on Ian McCormack, Andrew Rogoyski, Peter Hacker, Simon Kendall, technical, business and regulatory guidance Technical Director, Head of Cyber Security Partner & CEO Global Head of Private for law firms on cloud computing; online Public Sector Services, CGI Communications Sector Engagement, legal services and cyber security. Tim is a Services, GCHQ l Media and Technology Department for barrister and was Called to Bar by the Inner CESG Practice, JLT Business Innovation Temple in *Further hosts to be announced Specialty Limited & Skills (BIS) *Additional speakers and roundtable hosts to be announced soon. Check the website for more details:

4 08:30 09:25 09:30 10:00 10:30 11:00 11:30 *Additional roundtables will be announced. If you interested in hosting a roundtable please contact: jason.williams@theirm.org CONFERENCE PROGRAMME REGISTRATION AND REFRESHMENTS CHAIRMAN S OPENING ADDRESS DEVELOPMENTS IN CYBER THREATS TO BUSINESSES The cyber threat to businesses How GCHQ is working with industry to tackle cyber threats GCHQ s drive to improve the provision of skilled cyber professionals in the UK Ciaran Martin, Director General for Government & Industry Cyber Security, GCHQ THE CONSEQUENCES OF A VIBRANT CYBER INSURANCE MARKET Cyber security as a board-level topic what works and what doesn t The emerging cyber insurance market early providers and adopters Driving security-aware behaviours in the customer space Security suppliers and cyber insurers partners or competitors? Andrew Rogoyski, Head of Cyber Security Services, CGI Intangible Incident Simulation Presentation What is the responsibility and role of the top management in preventing and responding to cyber attacks What are corporations key assets that are at risk What are benchmarks and best practices in board response supported by risk management and insurance advice How can corporations identify the strength or weakness of their corporate governance, risk management, IT-security and insurance approach? Peter Hacker, CEO Global Communications, Technology and Media Practice, JLT Management Services NETWORKING & REFRESHMENTS ROUNDTABLE DISCUSSION FORUM This session gives delegates the opportunity to informally debate the topics led by each roundtable host, who sets the agenda and facilitates discussion. Delegates will be invited to change tables every 30 minutes, and can therefore join 3 table discussions. Roundtable 1: GOVERNMENT GUIDANCE ON CYBER THREATS: NEW TECHNOLOGIES AND ENTERPRISE RISK Host: GCHQ l CESG & CPNI Ian McCormack, Technical Director, Public Sector Services, GCHQ l CESG Roundtable 2: CYBER SECURITY AS A BUSINESS ENABLER Host: Andrew Rogoyski, Head of Cyber Security Services CGI Roundtable 3: Phil Benedict Ian Simon Roundtable 4: INTANGIBLE ASSETS SOLUTIONS AN APPROACH BEYOND THE OBVIOUS Hosts: Peter Hacker, CEO, Global Communications, Technology and Media Practice, JLT Management Services Phil Huggins, Vice President Security Science, Stroz Friedberg Benedict Burke, Senior Vice President, Global Markets, Crawford & Company Ian Hasson, Head of Forensic Accounting, Continental Europe, Middle East & Africa, Crawford & Company Simon Shooter, Partner, Bird & Bird GOVERNMENT GUIDANCE ON COMBATING CYBER THREATS: CYBER ESSENTIALS AND BEYOND Hosts: Department of Business, Innovation & Skills (BIS) Simon Kendall, Head of Private Sector Engagement, Department for Business Innovation and Skills (BIS)

5 13:00 14:00 14:30 15:00 15:30 16:00 16:30 NETWORKING LUNCH LAW ENFORCEMENT LANDSCAPE: WHAT TYPES OF THREATS ARE WE SEEING REPORTED? (TBC) Strategic overview of the cybercrime threats to organisations Emerging issues and threats to businesses The NCA response to the growing threat of cyber risk Kevin Williams, Partnership Engagement and National Cyber Crime Capabilities, National Cyber Crime Unit, National Crime Agency INSURER PERSPECTIVE Speaker TBC CYBER SECURITY AS A BOARD-LEVEL ISSUE Protecting your brand, reputation and trust as well as fiscal and IP How boards can be implementing a robust cyber security regime What is the future for board-level cyber risk strategy? Tom Thackray, Head of Enterprise Policy - Competitive Markets Directorate, CBI NETWORKING & REFRESHMENTS CYBER RISK AND COMPLIANCE Assessing your organisation s compliance regarding cyber threats and insurance The cyber essentials scheme and how organisations can help protect themselves from cyber attacks Cyber security and corporate finance what your organisation needs to know Tim Hill, Technology Policy Advisor, The Law Society PANEL DISCUSSION: WHAT DOES EFFECTIVE INSURANCE AGAINST CYBER RISK LOOK LIKE IN THE FACE OF THE EVOLVING THREATS TO BUSINESSES? Featuring leading insuring cyber risk experts, including: Andrew Rogoyski, Head of Cyber Security Services, CGI Kevin Williams, Partnership Engagement and National Cyber Crime Capabilities, National Cyber Crime Unit, National Crime Agency Tom Thackray, Head of Enterprise Policy - Competitive Markets Directorate, CBI 17:00 17:10 CHAIRMAN S CLOSING REMARKS CLOSE OF CONFERENCE This programme is subject to change. Please check the website for more details. BOOK YOUR PLACE TODAY at For all event queries contact: jason.williams@theirm.org or +44 (0)

6 BOOK NOW for Cyber Risk & Insurance RATE IRM member 300 Member of supporting organisation 300 Non-member 350 Build your CPD: This event will give you 20 IRM CPD points Low GDP / Academic 250 Group booking discount (3+ delegates) 250 pp BOOK YOUR PLACE TODAY at For all event queries please contact: jason.williams@theirm.org OTHER EVENTS TO LOOK OUT FOR Risk Leaders Practical Strategies for Risk at Board Level 2014 Sky s the limit Risk leaders is the annual event for board members and senior executives responsible for risk. 1-day conference 11 November 2014 London IRM s Global Risk Awards provide unique international recognition of risk management excellence. Awards night: 19 February 2015 London For further info, please contact: jason.williams@theirm.org For bookings and further information visit: global-risk-awards-2015 About the IRM and becoming a member: IRM is the leading professional body for risk management. We are an independent, not-for-profit organisation that champions excellence in managing risk to improve organisational performance. We do this by providing internationally recognised qualifications and training, publishing research and guidance and raising professional standards across the world. Our members work in all industries, in all risk disciplines and across the public, private and not-for-profit sectors. To apply for membership please visit: or call +44 (0) Institute of Risk Management, 2nd Floor, Sackville House, Fenchurch Street, London, EC3M 6BN T +44 (0)

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

CYBER-ATTACKS THE GLOBAL RESPONSE

CYBER-ATTACKS THE GLOBAL RESPONSE R E P R I N T CYBER-ATTACKS THE GLOBAL RESPONSE REPRINTED FROM: Risk, Governance & Compliance for Financial Institutions 2015 RISK GOVERNANCE & COMPLIANCE for F I N A N C I A L INSTITUTIONS 2 0 1 5 Visit

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack A New Security Publication About Risk and Security for Business Leaders Sponsorship & Advertising Media Pack Introduction from the Team All organisations need to manage and protect their information effectively,

More information

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical

More information

REPORT. Next steps in cyber security

REPORT. Next steps in cyber security REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15

More information

How To Protect Your Business From A Cyber Attack

How To Protect Your Business From A Cyber Attack Intelligence FIRST helping your business make better decisions Cyber security Keeping your business resilient Cyber security is about keeping your business resilient in the modern technological age. It

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Targeting the problem together

Targeting the problem together 18 October, Marriott Grosvenor Square, London postevents.co.uk/fraud Targeting the problem together Associate Sponsor Media Partner Fraud 2012 has been accredited by the CII and can be included as part

More information

CYBER RISK INTERNATIONAL COMPANY PROFILE

CYBER RISK INTERNATIONAL COMPANY PROFILE CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

National Approach to Information Assurance 2014-2017

National Approach to Information Assurance 2014-2017 Document Name File Name National Approach to Information Assurance 2014-2017 National Approach to Information Assurance v1.doc Author David Critchley, Dave Jamieson Authorisation PIAB and IMBA Signed version

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

LONDON BUSINESS SURVEY

LONDON BUSINESS SURVEY LONDON BUSINESS SURVEY SEPTEMBER 2015 Sponsored by London s business climate Business concerns include: 1st Retaining key talent 2nd Uncertainty over the UK s role in Europe 3rd Lack of economic growth

More information

Cyber Security Trends 2016. Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK

Cyber Security Trends 2016. Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK Cyber Security Trends 2016 Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK December, 2015 Cyber security Trends 2016 What do new technologies and

More information

PRIORITIZING CYBERSECURITY

PRIORITIZING CYBERSECURITY April 2016 PRIORITIZING CYBERSECURITY Five Investor Questions for Portfolio Company Boards Foreword As the frequency and severity of cyber attacks against global businesses continue to escalate, both companies

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS QUESTION General What is the Cyber Security Incident Response (CSIR) Scheme? What is the Cyber Incident Response (CIR) scheme? Why have

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days) Course introduction It is vital to ensure that your business is protected against the threats of fraud and cyber crime and that operational risk processes are in place. This three-day course provides an

More information

Regulation Regulation Regulation. Conference Programme 2013. 02/07/13 America Square Conference Centre, London www.insuranceage.co.

Regulation Regulation Regulation. Conference Programme 2013. 02/07/13 America Square Conference Centre, London www.insuranceage.co. 02/07/13 America Square Conference Centre, London www. Conference Programme 2013 #iaregulation Dear colleague, I am delighted to announce the launch of an Insurance Age specific event: The Three R s. Join

More information

Tackling fraud in the charity sector Making your money count

Tackling fraud in the charity sector Making your money count Supported by Tackling fraud in the charity sector Making your money count Friday 30 October 2015 Royal College of Physicians, London A conference run by the charity sector for the charity sector About

More information

TRAINING PROGRAMME COURSES - APRIL TO JUNE 2015

TRAINING PROGRAMME COURSES - APRIL TO JUNE 2015 TRAINING PROGRAMME COURSES - APRIL TO JUNE 2015 TAILORED FOR IN-HOUSE LAWYERS BY IN-HOUSE LAWYERS NEW COURSES FOR 2015 TRAINING COURSES: APRIL - JUNE 2015COURSES - MARCH TO - Disclosure: The definitive

More information

REGISTER AT IIF.COM/TRAINING

REGISTER AT IIF.COM/TRAINING IIF EXECUTIVE PROGRAM ON PRIVATE BANKING AND WEALTH MANAGEMENT Evolving Wealth Transformation in Dynamic Growth Markets November 16-17, 2015 Singapore IN COOPERATION WITH COURSE DESCRIPTION IIF EXECUTIVE

More information

What is Cyber Security? Why work with us?

What is Cyber Security? Why work with us? & Cyber Security The threat: trojans, trap doors malware, packet sniffers, worms, viruses, hacking and denial of service. Physical security is insufficient protection against these new forms of threat.

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

The 2nd Annual Middle East & North Africa Spectrum Management Conference

The 2nd Annual Middle East & North Africa Spectrum Management Conference Organised by The 2nd Annual Middle East & North Africa Spectrum Management Conference The meeting point for the MENA spectrum community! Sponsorship and Exhibition Prospectus About the Event Taking place

More information

The 2013 European Cloud Computing Conference. Sponsorship & Exhibition Prospectus. 7th March 2013 / Central Brussels

The 2013 European Cloud Computing Conference. Sponsorship & Exhibition Prospectus. 7th March 2013 / Central Brussels The 2013 European Cloud Computing Conference Sponsorship & Exhibition Prospectus / P02 Contents P 3 P 4 P 5 P 6 P 7 P 9 Details of last year's event Sponsorship of this Conference Sponsorship Packages

More information

CONFERENCE & EXHIBITION

CONFERENCE & EXHIBITION CONFERENCE & EXHIBITION Tuesday 5 July 2016 An event by Manchester Hilton Deansgate Hotel WELCOME Roy Cooper, Managing Director of Professional Security Magazine, welcomes you to Security TWENTY 16 North

More information

Sponsorship Opportunities 5-2016. Thomas Odams. Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents.

Sponsorship Opportunities 5-2016. Thomas Odams. Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents. Sponsorship Opportunities 5-2016 Thomas Odams Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents.com About The RANT Forum (Risk and Network Threat Forum) The RANT Forum

More information

MEDIA INFORMATION PACK

MEDIA INFORMATION PACK The official magazine of the Institute of Risk Management MEDIA INFORMATION PACK ABOUT THE INSTITUTE OF RISK MANAGEMENT The Institute of Risk Management (IRM) is the world s leading enterprise-wide risk

More information

THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world

THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world THE NEW INTERNATIONALS Updating perceptions of SMEs in an increasingly globalised world Contents Introduction 5 Born Global 6 International Futures 7 Supporting UK SMEs 8 UK Regions 9 Conclusion 10 About

More information

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015 Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key

More information

Australian Government Cyber Security Review

Australian Government Cyber Security Review Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and

More information

Information governance strategy 2014-16

Information governance strategy 2014-16 Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope

More information

Audit, Risk Management and Compliance Committee Charter

Audit, Risk Management and Compliance Committee Charter Audit, Risk Management and Compliance Committee Charter Woolworths Limited Adopted by the Board on 27 August 2013 page 1 1 Introduction This Charter sets out the responsibilities, structure and composition

More information

SMALL BUSINESS REPUTATION & THE CYBER RISK

SMALL BUSINESS REPUTATION & THE CYBER RISK SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to

More information

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC Business Improvement in Universities Realigning services to drive efficiency 15th & 16th June 2016, CQ Functions Melbourne Key Speakers Benefits of attending Paul Duldig Head of University Services THE

More information

IT-Security Summit - 2004

IT-Security Summit - 2004 IT-Security Summit - 2004 24 25 May, 2004 The Knowledge Village, Dubai Internet City, UAE Sponsorship, Marketing & Exhibition Opportunities For further information, or to reserve your Sponsorship Package/Exhibition

More information

Information for Summit sponsors. http://summit.privatehealthcare.co.uk/

Information for Summit sponsors. http://summit.privatehealthcare.co.uk/ Information for Summit sponsors Introduction Agenda On June 23rd 2015 at the Kings Fund in London, Intuition Communication will be holding our second Private Healthcare Summit. Last year s event at the

More information

CYBER ZONE INTRODUCING THE 10% CALL FOR EXHIBITORS

CYBER ZONE INTRODUCING THE 10% CALL FOR EXHIBITORS CALL FOR EXHIBITORS 10% DISCOUNT FOR FIRST TIME EXHIBITORS* INTRODUCING THE CYBER ZONE Get ready to really showcase your products and services to a specific and vetted audience in a distinctive, dedicated

More information

What is Cyber Security?

What is Cyber Security? & Cyber Security The threat: trojans, trap doors malware, packet sniffers, worms, viruses, hacking and denial of service. Physical security is insufficient protection against these new forms of threat.

More information

A FORUM FOR DEBATE, A CATALYST FOR CHANGE

A FORUM FOR DEBATE, A CATALYST FOR CHANGE 7 March 2013 Renaissance Hong Kong Harbour View Hotel Hong Kong A FORUM FOR DEBATE, A CATALYST FOR CHANGE 2013 conference highlights: The impact of the increasing frequency and severity of natural catastrophes

More information

The UK Cyber Security Strategy. Report on progress December 2012. Forward Plans

The UK Cyber Security Strategy. Report on progress December 2012. Forward Plans The UK Cyber Security Strategy Report on progress December 2012 Forward Plans We are at the end of the first year of meeting the objectives outlined in the National Cyber Security Strategy. A great deal

More information

Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda

Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda The East Africa Economic & Hi-Tech Crime Forum, Uganda, 2011 (the Forum), is an

More information

Employee Surveillance and the Law

Employee Surveillance and the Law One day conference Employee Surveillance and the Law Understanding the challenges posed by surveillance and monitoring in the workplace Supported by 4 November 2015 Central London Book online at www.regonline.com/employeesurveillance

More information

Medical leadership for better patient care: Support for healthcare organisations 2015

Medical leadership for better patient care: Support for healthcare organisations 2015 Medical leadership for better patient care: Support for healthcare organisations 2015 1 Our vision is to see and inspire excellence in medical leadership and drive continuous improvement in health and

More information

Highlights from the Security Awareness Special Interest Group (SASIG) New Year 2014 event:

Highlights from the Security Awareness Special Interest Group (SASIG) New Year 2014 event: Highlights from the Security Awareness Special Interest Group () New Year 2014 event: Cyber security adopting a new approach to answer the Board s concerns Hosted by EY: 14th January 2014 The Security

More information

Risks and uncertainties

Risks and uncertainties Risks and uncertainties Our risk management approach We have a well-established risk management methodology which we use throughout the business to allow us to identify and manage the principal risks that

More information

Playing Our Part in Responding to National Threats

Playing Our Part in Responding to National Threats Agenda Item 7 Report of: The Secretary of the Police and Crime Panel Date: 1 February 2016 1. Purpose of Report Playing Our Part in Responding to National Threats 1.1 This report provides Members with

More information

SECURITY & RISK MANAGEMENT CONSULTANTS COURSE (SRMC)

SECURITY & RISK MANAGEMENT CONSULTANTS COURSE (SRMC) SECURITY & RISK MANAGEMENT CONSULTANTS COURSE (SRMC) Protesters enter the Parliament in Ouagadougou, the capital of Burkina Faso Source: Issouf Sanogo, Getty Images Course Overview PGI s Security Risk

More information

Leadership for the future 2015 National Conference

Leadership for the future 2015 National Conference Leadership for the future 2015 National Conference FMLM works to promote the advancement of medical leadership, management and quality improvement at all stages of the medical career for the benefit of

More information

SPONSORSHIP PROSPECTUS mpower YOUR BRAND SPONSOR OR EXHIBIT

SPONSORSHIP PROSPECTUS mpower YOUR BRAND SPONSOR OR EXHIBIT by innovation SPONSORSHIP PROSPECTUS mpower YOUR BRAND SPONSOR OR EXHIBIT PCMA.ORG/CIC 2014 SPONSORSHIP, LEARNING LOUNGE TECHNOLOGY DEMONSTRATION BOOTHS & COMMERCIAL SESSION PROSPECTUS The PCMA Canada

More information

The 2012 European Cloud Computing Conference

The 2012 European Cloud Computing Conference The 2012 European Cloud Computing Conference Sponsorship & Exhibition Prospectus T. +44 (0) 29 20 783 023 Contents Page P 3 P 4 P 5 P 7 Sponsorship Packages Sponsored Catering Packages Product Opportunities

More information

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

Overview of GFSI and Accredited Certification

Overview of GFSI and Accredited Certification Overview of GFSI and Accredited Certification Overview of GFSI and Accredited Certification Introduction Global food trade is expanding and providing consumers with access to a wider variety of foods all

More information

JOB DESCRIPTION. Head of Learning and Standards. Salary grade: Management Scale 2 + 1

JOB DESCRIPTION. Head of Learning and Standards. Salary grade: Management Scale 2 + 1 JOB DESCRIPTION Job Title: Responsible to: Head of Learning and Standards Director of Faculty Salary grade: Management Scale 2 + 1 Hours per week: 21.6 hours per week Main Purpose of the Role 1. To manage

More information

MANAGING CYBERSECURITY INVESTIGATIONS

MANAGING CYBERSECURITY INVESTIGATIONS MANAGING CYBERSECURITY INVESTIGATIONS Tara Swaminatha, Of Counsel, Washington, DC Sam Millar, Partner, London May 12, 2016 If you cannot hear us speaking, please make sure you have called into the teleconference

More information

Sponsorship Opportunities

Sponsorship Opportunities Sponsorship Opportunities Thomas Odams Events Manager EMEA, RANT Events t: 0207 510 9039 m: 07827 870 359 todams@rantevents.com Sponsorship Opportunities About The Risk and Network Threat Forum (RANT)

More information

Committees Date: Subject: Public Report of: For Information Summary

Committees Date: Subject: Public Report of: For Information Summary Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security

More information

Good Practice Guide: the internal audit role in information assurance

Good Practice Guide: the internal audit role in information assurance Good Practice Guide: the internal audit role in information assurance Janaury 2010 Good Practice Guide: the internal audit role in information assurance January 2010 Official versions of this document

More information

Rolls Royce s Corporate Governance ADOPTED BY RESOLUTION OF THE BOARD OF ROLLS ROYCE HOLDINGS PLC ON 16 JANUARY 2015

Rolls Royce s Corporate Governance ADOPTED BY RESOLUTION OF THE BOARD OF ROLLS ROYCE HOLDINGS PLC ON 16 JANUARY 2015 Rolls Royce s Corporate Governance ADOPTED BY RESOLUTION OF THE BOARD OF ROLLS ROYCE HOLDINGS PLC ON 16 JANUARY 2015 Contents INTRODUCTION 2 THE BOARD 3 ROLE OF THE BOARD 5 TERMS OF REFERENCE OF THE NOMINATIONS

More information

Sponsor Kit. 14 - July - 2015 University of Manchester. www.dtmanchester.com. In association with

Sponsor Kit. 14 - July - 2015 University of Manchester. www.dtmanchester.com. In association with Sponsor Kit 14 - July - 2015 University of Manchester www.dtmanchester.com In association with OVERVIEW The 2015 edition of DataCentre Transformation Manchester aims to build on the success of previous

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

South East Water Corporation Finance Assurance and Risk Management Committee Charter

South East Water Corporation Finance Assurance and Risk Management Committee Charter South East Water Corporation Finance Assurance and Risk Management Committee Charter Created: October 2012 Document number: BS 2359 Last reviewed: May 2015 1. Purpose The South East Water Corporation Board's

More information

CITYACTION EMPLOYABILIT HEART OF THE CITY A THE BARBICAN THE LORD MAYOR SOCIAL INVESTMENT INVOLVEMENT GUIDE THE CITY OF LONDON ECONOMIC RESEARCH

CITYACTION EMPLOYABILIT HEART OF THE CITY A THE BARBICAN THE LORD MAYOR SOCIAL INVESTMENT INVOLVEMENT GUIDE THE CITY OF LONDON ECONOMIC RESEARCH THE CITY OF LONDON HEART OF THE CITY T CITYACTION RESPONSIBLE PROCUREMENT SOCIAL INVESTMENT EMPLOYABILIT Y Y AND LOCAL RECRUITMENT CORPORATE COMMUNITY INVOLVEMENT GUIDE RESPONSIBLE CONSTRUCTION ARTS PA

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

Corporate Security in 2016.

Corporate Security in 2016. Corporate Security in 2016. A QA Report Study Highlights According to ThreatMetrix, businesses in the UK are at greater risk of cybercrime than any other country in the world. In a recent survey carried

More information

Seven Challenges Facing The Public Sector Procurement Community

Seven Challenges Facing The Public Sector Procurement Community Seven Challenges Facing The Public Sector Procurement Community Introduction The second CIPS Public Sector Procurement Forum (PSPF2), held at the Hyatt Hotel, Canberra on 16-17 May 2007, was a resounding

More information

Sponsorship Pack 2015. Sponsorship Pack. www.agi.org.uk

Sponsorship Pack 2015. Sponsorship Pack. www.agi.org.uk Sponsorship Pack 2015 Contents Introduction by the Chair of the AGI, Dr Anne Kemp...3 AGI s 2014 Achievements...4 AGI Membership Breakdown...5 2015 Geo: The Big 5 event programme...6 Sponsorship Opportunities

More information

Health and Safety Policy and Procedures

Health and Safety Policy and Procedures Health and Safety Policy and Procedures Health & Safety Policy & Procedures Contents s REVISION AND AMENDMENT RECORD : Summary of Change Whole Policy 4.0 05 Nov 08 Complete re-issue Whole Policy 4.1 10

More information

The Transatlantic Trade & Investment Partnership Where now for the EU-US trade deal?

The Transatlantic Trade & Investment Partnership Where now for the EU-US trade deal? Organised by The 2nd Annual EU-US Trade Conference 5th February 2015 / Brussels Sponsorship & Exhibition Prospectus Contact - Jessie Atkinson T. Contents P 3 P 4 P 5 P 6 P 7 Introduction Sponsorship Packages

More information

The centre of government: an update

The centre of government: an update Report by the Comptroller and Auditor General Cabinet Office and HM Treasury The centre of government: an update HC 1031 SESSION 2014-15 12 MARCH 2015 4 Overview The centre of government: an update Overview

More information

North East Regional Bias Against Information Security Threat

North East Regional Bias Against Information Security Threat Summary Information Security North East () is a forum for council and public service information security managers from Northumberland, Tyne and Wear, Durham and the Tees Valley 1. is also the Warning,

More information

Making every child matter... everywhere. Preparing a European response to combat the commercial distribution of child abuse images

Making every child matter... everywhere. Preparing a European response to combat the commercial distribution of child abuse images Making every child matter... everywhere An indecent profit Preparing a European response to combat the commercial distribution of child abuse images A two-day conference Tuesday 3 March - Wednesday 4 March

More information

Agency Board Meeting 28 July 2015

Agency Board Meeting 28 July 2015 SEPA 22/15 Agency Board Meeting 28 July 2015 Report Number: SEPA 22/15 Audit Committee Annual Performance Report 2014-2015 Summary: Risks: Resource and Staffing Implications Equalities: Environmental and

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

The 2013 European Cyber Security Conference

The 2013 European Cyber Security Conference Organised by The 2013 European Cyber Security Conference Securing the Internet Economy Sponsorship & Exhibition Prospectus Contact Contact - - Anne-Lise Simon Simon www. T. +44 T. +44 (0) 29 (0) 20 29783

More information

THINK. CLOUD VENDORS. December 9 th 2014. Level39 One Canada Square Canary Wharf London E14 5AH. Venue: Tele: www.thinkcloudvendors.

THINK. CLOUD VENDORS. December 9 th 2014. Level39 One Canada Square Canary Wharf London E14 5AH. Venue: Tele: www.thinkcloudvendors. THINK. CLOUD VENDORS December 9 th 2014 Venue: Tele: Level39 One Canada Square Canary Wharf London E14 5AH 0203 668 3600 www.thinkcloudvendors.com Day Summary 08:30-09:00 Coffee, Registration & Networking

More information

Securing the Nation: Creating cyber security, resilience and readiness

Securing the Nation: Creating cyber security, resilience and readiness NZTech Developing a National Technology Strategy NZTech Developing a National Technology Strategy A Cyber-Secure New Zealand The Role of Government Procurement B R I E F I N G P A P E R Securing the Nation:

More information

January 2016. Communications Manager: Information for Candidates

January 2016. Communications Manager: Information for Candidates January 2016 Communications Manager: Information for Candidates Thank you for expressing interest in the role of Communications Manager. We have compiled this information pack to tell you more about The

More information

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow 2015 Cybersecurity Campaign Improving Today, Protecting Tomorrow THE STATE OF U.S. CYBERSECURITY: OUR NATION S ECONOMIC AND NATIONAL SECURITY ARE AT SIGNIFICANT RISK Hackers have breached the computer

More information

Information Governance Management Framework

Information Governance Management Framework Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date

More information

Standing Council on Police and Emergency Management

Standing Council on Police and Emergency Management Standing Council on Police and Emergency Management Communiqué 29 June 2012 The Standing Council on Police and Emergency Management (SCPEM) met in Melbourne today, chaired by the Hon Peter Ryan MLA, Deputy

More information

Partnership, support and exhibition opportunities

Partnership, support and exhibition opportunities Partnership, support and exhibition opportunities The Health and Care Innovation Expo, hosted for the third year by NHS England, is a unique celebration of innovation, enterprise and collaboration - and

More information

About the Survey Respondents

About the Survey Respondents SPECIAL REPORT Information Security & Cyber Liability Risk Management The Second Annual Survey of Enterprise-wide Cyber Risk Management Practices in Europe February 2013 SPECIAL REPORT Information Security

More information

Manager for Social Sciences - 42897. External Relations. Full time. Permanent. External and internal candidates

Manager for Social Sciences - 42897. External Relations. Full time. Permanent. External and internal candidates Job Description Post Title and Post Number Organisation Advertising Description College Marketing and Communications Manager for Social Sciences - 42897 External Relations Post Number 42897 Full Time/Part

More information

Compliance Summit. Corporate Parity Presents... key topics to be discussed: Speakers:

Compliance Summit. Corporate Parity Presents... key topics to be discussed: Speakers: Corporate Parity Presents... 21st - 22nd a p r i l 2016 key topics to be discussed: THE LATEST ON ENCRYPTION AND CYBER SECURITY MANAGING US COMPLIANCE IN EUROPE IRAN UPDATE AND SANCTIONS MANAGEMENT EXPORT

More information

ACE European Risk Briefing 2012

ACE European Risk Briefing 2012 #5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs

More information

South East Water Corporation Finance Audit and Risk Management Committee Charter. October 2012

South East Water Corporation Finance Audit and Risk Management Committee Charter. October 2012 South East Water Corporation Finance Audit and Risk Management Committee Charter October 2012 Version: 1.0 Page 1 of 6 DOCUMENT NUMBER BS 2359 1. Purpose The South East Water Corporation Board's Finance

More information

Forensics Europe Expo 2015 Conference Programme

Forensics Europe Expo 2015 Conference Programme Book before 20 February 2015 to save up to 20% Forensics Europe Expo 2015 Conference Programme The Only Dedicated International Forensics Exhibition and Conference The Meeting Place for Professionals Involved

More information

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK

More information

Chairman Simon Cole Vice Chairman Bill Sadler

Chairman Simon Cole Vice Chairman Bill Sadler Overview and Scrutiny Committee Minutes of a meeting of the Overview and Scrutiny Committee held on Thursday 10 March 2016 at 6.00 pm at the Council Chamber, District Offices, College Heath Road, Mildenhall

More information

Is the new package the right fit for Europe?

Is the new package the right fit for Europe? Organised by Is the new package the right fit for Europe? Contact: Rose Maloney +44 (0) 2920 783 070 / rose.maloney@forum-europe.com Contents P 3 P 4 P 5 P 6 P 7 About the Conference About the 2015 Event

More information

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity. Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND

More information