Knowledge is power. Organisations must share intelligence and understand the evolving vulnerabilities to strike the balance between risk and cost and make intelligent, threat-based decisions on what to invest in to protect customers and profitability.

An effective security plan will incorporate intelligence-led threat detection to reveal, react and resolve the threats most relevant to businesses.

Organisations need a collective sense of purpose, a movement of people driving positive change and encouraging shared experiences and knowledge to empower companies and individuals to fight against cyber crime: a global Intelligence Network.

The history of cyber crime has taught us that as the criminals’ behaviour evolves, organisations need to change the way they act and think to stay on step ahead.

Your delegate package includes:

  • Comprehensive event documentation – including option to download presentations from our secure website
  • Custom report based on information and opinion created during workshop
  • Presentation, panel discussion and round table
  • Drinks reception on arrival
  • Gourmet 3-course Michelin star dinner and drinks

Ticket Price: VIP Complimentary


Wednesday 23rd May 2018
Wednesday 23rd May 2018
18:00Welcome drinks and Networking
18:30Host Scene Setting / Theme Outline

Adrian Nish, Head of Threat Intelligence, BAE Systems
James Hatch, Director of Cyber Services, BAE Systems
18:45Interactive Discussion

• How can organisations protect themselves while at the same time grow the business and deliver profit?
• What is the impact on reputation and revenue a breach can impose?
• How can organisations translate operational concerns into advice to the business and vice versa in an effective way?
• What is the best strategy to efficiently manage large volumes of alerts, while minimising impact to the business?
• How can vulnerabilities be managed, policies enforced, estate secured and regulatory requirements met?
• How can we accelerate security operations whilst also defending against targeted attacks?
• What is the best process to address internal malicious threats?
21:00Questions and details of follow-up and future workshops
Request an invitation Book now