Cyber Innovation Showcase – Session details Please complete this form and return to victoria.windsor@reedexpo.co.uk Session details Title (The title should be concise and clearly reflect the content of the session) Session outline (Please provide maximum 40 words describing the proposed presentation) Please also attach your logo as an EPS and as a JPEG Speaker details Technology Showcase Speaker Title First name Surname Job title Company name Company address 1 Company address 2 Town/city Country/region Zip code Email address Telephone number Mobile number Twitter name Professional biography (60 – 80 words) Please also attach a photo of your speaker as a JPEG 300dpi Background information – this information helps us to market your session 1. Which vertical markets is the workshop applicable to?: Please delete the markets this session is NOT relevant to Broadcasting Catering/Hotels/Leisure & Entertainment Charity Construction/Agriculture/Mining Consultancy Education & Training Finance/Banking/Insurance Government(Central/Local/MOD) IT Distributor/VAR/Integrator/OEM IT Hardware/Software/Manufacturer/Supplier Legal Manufacturing/Engineering/Electronics (Non IT) Media (Marketing, Advertising, PR, Press, Publishing) Medical/Healthcare Oil/Gas/Chemical Pharmaceuticals Property Public Services (Excluding Healthcare) Retail/Wholesale Distribution Service Provider Telecommunications Transport and Travel Utilities(Energy/Water/Gas) Other All 2. Please indicate what size of organisation your workshop is most suited to: Enterprise SMB Both 3. Please specify 3-5 key product areas that are applicable to your workshop: Please delete the product areas this session is NOT relevant to ANTI-MALWARE Anti Spam Anti Virus APPLICATION SECURITY Application Security Application Code Security Patch Management BC/DR/INVESTIGATION Business Continuity/Disaster Recovery Fraud Detection IT Forensics ENCRYPTION Digital Signatures Encryption/PKI/Digital Certificates Storage Security HUMAN FACTORS/GOVERNANCE/COMPLIANCE Audit Cyber Insurance Governance Risk & Compliance Information Risk Management Insider Threat/Social Engineering Legislation and Standards PCI-DSS Security Policy Security Training/Awareness/Education/Recruitment IDENTITY ACCESS MANAGEMENT Authentication Biometrics Digital Right Management Identity & Access Management Single Sign On / Security Tokens MOBILE End Point Security Mobile Security/Mobile Device Management Remote Access VPN OUTSOURCING/MANAGED SERVICES Cloud Security Managed Security Services Security Web Services/Security as a Service PERIMETER/INFRASTRUCTURE Content Monitoring/Filtering Converged Security Data Leakage Prevention Email/IM Security Firewalls Internet Security/Network Security Intrusion Prevention/Detection Penetration Testing/Risk & Vulnerability Assessment Secure Disposal Security EM Unified Threat Management Virtualization Security VOIP Security Wireless SECURE TRANSACTIONS Physical/ Virtual Authentication and Identification THREAT INTELLIGENCE 4. Please select no more than two of the business issues that visitors will be able to resolve by attending your workshop: Please delete the business issues this session is NOT relevant to Clearly navigate and understand increasingly complex legislation Deliver security to drive and enable clear business growth Demonstrate clear thought leadership to ensure security is high on the corporate agenda and capex justified Ensure information security projects demonstrate return on investment Identify internal and external threats and keep a business secure Select best fit products and solutions from the wide range of choice of vendors and products available