The way we access information, use our devices and expect uninterrupted service availability, means that we must adapt our traditional information security infrastructure and unite around a Perimeter of One:
- One information security strategy
- One proven way to assess risk
- One agile model that supports business change
- One device that is used for everything
- One connection that is constant
- One integrated set of defences
- One intelligent view of critical assets
- One plan for incident response
Network with your peers and choose from a packed agenda of keynote presentations, case studies, hands-on practical workshops, live demonstrations and roundtable discussions.
You can see the agenda here.
To register, please click here.
We’ll be announcing the agenda on a regular basis, so please check back for updates.