GovSec

Government IT Security Conference

12 May 2020

Victoria Park Plaza, London

SOCIAL


LATEST TWEETS

govsec-conference-award

THE UK’S PREMIER EVENT FOR CYBER SECURITY & INFOSEC PROFESSIONALS AND DECISION-MAKERS LOOKING TO PROTECT KEY PUBLIC SECTOR IT INFRASTRUCTURE AND ASSETS

 

“I’ve enjoyed the energy on the floor, everything was covered here today, very interesting topics.” DELL SECURITY, Security Strategist & Evangelist.

At a glance

With cyber risk landscape continually changing and evolving, there is still much work to be done to ensure our vital public services can withstand a severe attack, stay one step ahead and achieve cyber resilience. Securing critical information and assets is crucial for safeguarding against cyber-attacks, and so is ensuring staff are up-to-date with how they can effectively protect and guard the critical information assets of their organisation.

Whitehall Media’s award-winning 7th annual GovSec conference aims to enable the government to function effectively, safely and securely through improved IT and information security to protect the vital services provided by central government, local councils and the NHS. The all-day conference explores how public sector organisations and professionals can make sense of securing their functions in a rapidly changing environment.

Join hundreds of senior cybersecurity, InfoSec and senior managers to discuss the risk landscape, how best to detect and defend against attacks through appropriate skills and capabilities and best practice required to protect critical national systems and networks. Through a series of thought leadership and case study presentations, we showcase the very best examples of how public bodies are building resilience and utilising technology to solve strategic security issues.

 

“I really enjoyed my first experience of attending this event. The idea of having so many security professionals in place was overwhelming and the speakers were really good and had a vast amount of knowledge in their respective organisations. I have taken back lots of positives from this seminar and would definitely implement some of them.” NORTHWEST LONDON COLLABORATION OF CCGS, IT Security Manager.

FEATURED TOPICS

Managing Risks and Vulnerabilities

  • Cyber Risk Management
  • Creating a Risk-Aware Culture
  • Controlling Risks through Technology & Processes
  • Critical Infrastructure & Operational
  • Technology Security
  • Emergency Resource Planning
  • Governance, Regulation, Compliance
  • Framework
  • Identity Assurance/Access
  • Management
  • Privileged Account Management
  • Leadership & Management of Security & Risk
  • Risk Management Frameworks, Metrics, Strategy
  • Vulnerability Detection & Assessment
  • Digital Rights Management
  • Wireless & Mobile Security
  • Social Media Challenges & Risks
  • Change Management / Programme Management
  • Supply Chain Security & Third-Party Risk
  • Infrastructure Management & Security
  • Information Security/Governance

Incident Planning and Response

  • Adaptative Security Architecture
  • Asset Protection & Resilience
  • Audit & Accountability
  • Business Continuity Management & Contingency Planning
  • Cyber Insurance
  • Data Access Governance, Data Loss
  • Prevention, Disaster Recovery
  • Detecting Espionage
  • Digital Transformation & Cyber Security
  • Digital Forensics
  • Legacy Systems & Continuous
  • Improvement Challenges
  • Malware Detection & Response
  • Personnel Security/Changing role of HR
  • Physical/Hardware Security
  • DevOps Security
  • User Awareness & Training
  • Security Assurance
  • Network Security & Monitoring
  • Penetration Testing
  • Wireless & Mobile Security
  • BYOD/ Endpoint / Application Security
  • Security of Public-Facing Government
  • Applications
  • Securing Online Transactions & Payment Security

Best Practices for Cyber Resilience

  • Advanced Threat
  • Protection/Advanced Evasive
  • Techniques
  • Building Cyber Skills into Workforce & Leadership
  • Cloud Security Principles, Practice, Integration
  • Cryptography Techniques
  • Cyber Essentials Scheme (CES)
  • Cyber Policing/Preventing Cybercrime
  • Cyber Policy, Defence, Threat
  • Intelligence
  • Data Protection, Classification, Confidentiality
  • Data Transit Protection
  • Embedding Security into disruptive trends (IoT, big data, etc.)
  • IaaS, PaaS, SaaS
  • Technical Surveillance Counter Measures
  • Web security tools & best practice
  • Privacy Enhancing Technologies
  • Securing Critical National
  • Infrastructure

Featured Speakers

SPONSORS

cpd-membercpd-certified

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking