Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - a risk perspective
IISP East Midlands Sept 2014 - Jim Shields presentation
IISP Sept 2014 presentation
Redscan - Insider threat case study
David Benford - hostile observations through social media
Horizon introduction
Internet of Things - how secure is it?
Econocom - identifying funding for success
Mike Gillespie - The Internet of Everything
Qonex - Securing the IoT
Webroot - self-defending IoT devices & gateways
Be careful what you wish for: the great Data Protection law reform - Lilian Edwards
General Data Protection Regulation: what do you need to do to get prepared? - Helena Wootton
Ransomware - Mark Chimely
How to avoid becoming the next victim of ransomware
Insider threat event presentation