Speak to an expert 03333 233 981

Speak to an expert 03333 233 981

Mitigate Cyber Security will be exhibiting at Securing The Law Firm 2014 as a networking sponsor.

Now in its third edition, Securing the Law Firm is the leading e-crime and information security forum specifically aimed at key IT security decision-makers in the legal services. Welcoming an audience of over 100 professionals, it is the largest gathering of its kind. Whether it is espionage, insider risk, or insecure transfer platforms, the threats facing lawfirms are manifold. This event offers practical guidance and strategic insights through a balance of educational seminars and expert presentations in front of those responsible for protecting reputation, setting technology strategy, and ensuring compliance in the protection of sensitive data. Delegates also have the chance to network and exchange insights about the latest industry developments in an invitation-only environment. 

Speakers include:

  • Ohad Bobrov, CTO and co-founder, Lacoon Mobile Security 
  • James Druce, Account Director at Check Point SW Technologies
  • Luisa Gentile, Security Awareness Transformation Manager, Group Corporate Security, Vodafone 
  • Tony Hibbert, Chief Information Security Officer/Deputy CIO, Intrum Justitia 
  • Sam Hutton, CTO, Glasswall Solutions 
  • Neira Jones, FBCS, Chairman, Global Advisory Board, CSCSS & Chairman, Advisory Board, Ensygnia 
  • Rashmi Knowles, Chief Security Architect EMEA, RSA 
  • Mark Hughes, CEO, BT Security 
  • Stuart McKenzie, Senior Consultant, Context Information Security 
  • Simon Moores, Vice Chairman, Conservative Technology Forum 
  • Ian Pratt, Co-founder and SVP of Products, Bromium 
  • David Prince, Delivery Director – IT Services, Schillings 
  • Simon Saunders, Management Consultant, Portcullis 
  • John Yeo, Director, SpiderLabs EMEA, Trustwave

Key themes include:

Crossing the capability gap: identifying sensitive data, meeting client expectations, and becoming compliant
Protecting against accidents: improving user awareness within and beyond the IT department
Mitigating third-party risks: testing, monitoring, and auditing the Cloud and third-party providers 
Facilitating a secure environment: stopping users from circumventing controls