The European Information Security Summit
20th – 21st February 2018, London
The European Information Security Summit is now the largest
and most comprehensive cyber security summit in Europe
The 2017 event was a great success, with streams that covered topics including culture & education; data & technology; and identity & access management. You can download the post-event report for 2017 by clicking here.
Edward LucasSenior Editor, Author of critically-acclaimed ‘Cyberphobia’, The Economist
Lectured at Harvard, Stanford, Oxford
He appears regularly on the BBC’s Today and Newsnight programmes
Jamie SheaDeputy Assistant Secretary General, Emerging Security Challenges, NATO
NATO Deputy Assistant Secretary General
He has been working with NATO since 1980. He now lectures extensively on European security affairs and is involved in several prestigious university institutions.
Cameron CraigDeputy General Counsel - Data Privacy & Digital - Group Head of Data Privacy, HSBC
Responsible for HSBC’s global data privacy risk
Recommended for his client-friendly and commercial approach” and in 2011 states that he is “technically second to none,” while clients value his “approachable manner and commercial advice.
The European Information Security Summit (TEISS) is now the largest and most comprehensive cyber security summit in Europe, from the portfolio of Business Reporter.
It features parallel conferences on culture and education, data and technology, and identity and access management – giving you three conferences in one. In addition, it also features dedicated training sessions for small groups, and the ability to build a bespoke agenda that suits your exact challenges.
Join 450+ Cyber Security and Information Technology professionals to discuss the latest issues.
The forecast evolution of cyber crime, and what we must do differently to combat it
Best practices for instilling a pervasive corporate culture of cyber security
Securing data and identity across the cloud and outside the perimeter
The challenges and opportunities of identity management in the Internet of Things
Creating agile systems that can adapt to new forms of attack
Improving cyber security in the extended enterprise
Uneducated staff are a major point of weakness for hackers. We help you build a training programme that works with your staff’s daily operations, and showcase the best way to get the Board on your side.
Perfect for: CIO, Chief Risk Officer, CISO, Head of Business Resilience, Head of Business Intelligence, Head of Business Continuity
Managing the identities of proliferating connected devices, and access for an increasingly complex hierarchy of outside parties, grows ever more vital. Talk with our experts about overcoming the challenges of securing access management in the extended enterprise, and how to control the Identity of Things.
Perfect for: Head of Identity & Access Management, Head of Privacy, Head of Governance, Head of IT Security, Chief Technical
The increasing number of connected devices massively increases the vulnerability of a corporate network. Join this stream to learn best practices for managing security processes in the Internet of Things, prepare for the challenges of data management in the light of new regulations (especially the GDPR), and how data analytics can be used to monitor for attacks.
Perfect for: CTO, CISO, Head of Data Security, Head of Analytics, Head of Cloud, Head of IT
1 x training session which discusses affordable and effective cyber security strategies for SMEs
1 x training session on crisis communications which teaches you what to say, when to say it, and which channel to say it on
TEISS 2017 will feature more than 400 delegates enjoying 100 speakers over the course of the two day summit.
Yes, you will be able to jump between streams as often as you like. However there is a small extra charge for training sessions. Please contact us if you would like to attend these.
Yes, we will send you the slides from the summit sessions around a week after the event.
Yes! The event is CPD certified and certificates of attendance can be generated after the event upon request.