Information Security World 2014

Find out what your fellow delegates enjoyed at #ISW2014

It was great to meet so many of you at Information Security World on Tuesday.  To access content from the day, including presentations from the APT Simulation workshop and the Risk Management in Action sessions, please visit the ISW Presentations page.

The way we access information, use our devices and expect uninterrupted service availability, means that we must adapt our traditional information security infrastructure and unite around a Perimeter of One:

  • One information security strategy
  • One proven way to assess risk
  • One agile model that supports business change
  • One device that is used for everything
  • One connection that is constant
  • One integrated set of defences
  • One intelligent view of critical assets
  • One plan for incident response

Network with your peers and choose from a packed agenda of keynote presentations, case studies, hands-on practical workshops, live demonstrations and roundtable discussions.