Session confirmation form

advertisement
Cyber Innovation Showcase – Session details
Please complete this form and return to victoria.windsor@reedexpo.co.uk
Session details
Title (The title should be concise and clearly
reflect the content of the session)
Session outline (Please provide maximum 40
words describing the proposed presentation)
Please also attach your logo as an EPS and as a JPEG
Speaker details
Technology Showcase Speaker
Title
First name
Surname
Job title
Company name
Company address 1
Company address 2
Town/city
Country/region
Zip code
Email address
Telephone number
Mobile number
Twitter name
Professional
biography (60 – 80
words)
Please also attach a photo of your speaker as a JPEG 300dpi
Background information – this information helps us to market your session
1. Which vertical markets is the workshop applicable to?: Please delete the markets this session is NOT
relevant to
Broadcasting
Catering/Hotels/Leisure & Entertainment
Charity
Construction/Agriculture/Mining
Consultancy
Education & Training
Finance/Banking/Insurance
Government(Central/Local/MOD)
IT Distributor/VAR/Integrator/OEM
IT Hardware/Software/Manufacturer/Supplier
Legal
Manufacturing/Engineering/Electronics (Non IT)
Media (Marketing, Advertising, PR, Press, Publishing)
Medical/Healthcare
Oil/Gas/Chemical
Pharmaceuticals
Property
Public Services (Excluding Healthcare)
Retail/Wholesale Distribution
Service Provider
Telecommunications
Transport and Travel
Utilities(Energy/Water/Gas)
Other
All
2. Please indicate what size of organisation your workshop is most suited to:
Enterprise
SMB
Both
3. Please specify 3-5 key product areas that are applicable to your workshop: Please delete the product areas
this session is NOT relevant to
ANTI-MALWARE
Anti Spam
Anti Virus
APPLICATION SECURITY
Application Security
Application Code Security
Patch Management
BC/DR/INVESTIGATION
Business Continuity/Disaster Recovery
Fraud Detection
IT Forensics
ENCRYPTION
Digital Signatures
Encryption/PKI/Digital Certificates
Storage Security
HUMAN FACTORS/GOVERNANCE/COMPLIANCE
Audit
Cyber Insurance
Governance Risk & Compliance
Information Risk Management
Insider Threat/Social Engineering
Legislation and Standards
PCI-DSS
Security Policy
Security Training/Awareness/Education/Recruitment
IDENTITY ACCESS MANAGEMENT
Authentication
Biometrics
Digital Right Management
Identity & Access Management
Single Sign On / Security Tokens
MOBILE
End Point Security
Mobile Security/Mobile Device Management
Remote Access
VPN
OUTSOURCING/MANAGED SERVICES
Cloud Security
Managed Security Services
Security Web Services/Security as a Service
PERIMETER/INFRASTRUCTURE
Content Monitoring/Filtering
Converged Security
Data Leakage Prevention
Email/IM Security
Firewalls
Internet Security/Network Security
Intrusion Prevention/Detection
Penetration Testing/Risk & Vulnerability Assessment
Secure Disposal
Security EM
Unified Threat Management
Virtualization Security
VOIP Security
Wireless
SECURE TRANSACTIONS
Physical/ Virtual Authentication and Identification
THREAT INTELLIGENCE
4. Please select no more than two of the business issues that visitors will be able to resolve by attending
your workshop: Please delete the business issues this session is NOT relevant to
 Clearly navigate and understand increasingly complex legislation
 Deliver security to drive and enable clear business growth
 Demonstrate clear thought leadership to ensure security is high on the corporate agenda and capex justified
 Ensure information security projects demonstrate return on investment
 Identify internal and external threats and keep a business secure
 Select best fit products and solutions from the wide range of choice of vendors and products available
Download