Information Security World 2014

The way we access information, use our devices and expect uninterrupted service availability, means that we must adapt our traditional information security infrastructure and unite around a Perimeter of One:

  • One information security strategy
  • One proven way to assess risk
  • One agile model that supports business change
  • One device that is used for everything
  • One connection that is constant
  • One integrated set of defences
  • One intelligent view of critical assets
  • One plan for incident response

Network with your peers and choose from a packed agenda of keynote presentations, case studies, hands-on practical workshops, live demonstrations and roundtable discussions.

You can see the agenda here.

To register, please click here.

We’ll be announcing the agenda on a regular basis, so please check back for updates.