Halkyn Security Blog
Specialist Security & Risk Management Consultants

UOC – Cybersecurity Conference 2017

UOC Cyber Security Conference 2017

UOC Cyber Security Conference 2017

Cybersecurity is big news with governments and businesses suffering at the hands of cyber attacks. As a result of this, the University of Chester (UoC) STEMs society is hosting a Cybersecurity Conference on the 28th March 2017.

The primary aim is to raise awareness of Cybersecurity. In addition, it will provide an opportunity to build professional networks and encourage career development. Most of all this event provides an opportunity for you to ask any questions you might have. The current line up of speakers includes some genuine experts. As a result this presents a great opportunity to discuss what matters to you.

The event is at Thornton Science Park and UoC staff, students and guests are welcome.  Advance registration is required via EventBrite and it starts at 1700hrs. Attendance is free. So there really is no reason to miss out on this event.

UoC CyberSecurity Conference

The guest speakers include:

  • Taz Wake – Cybersecurity and Risk Consultant at Halkyn Consulting Ltd, based in North Wales.
  • James Simpson – Cybersecurity Consultant & Director at Secti Ltd, based in Shropshire.
  • Matt Hull – MSc Student at the University of Chester & Detective Constable at Cheshire Constabulary
  • GCHQ – GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.
  • Detective Superintendent Jon Betts – Head of Criminal Justice & Custody at Cheshire Constabulary

While the event is on, free refreshments, including pizzas, will be provided.

Please note, Thornton Science Park is an access controlled site. As a result all guests are required to register in advance. Also, all guests are to use car park B for parking. More details are available from the event organiser or the EventBrite page.

In conclusion, if you live in the North West and have even the slightest interest in Cybersecurity, you should attend this event. So dont hesitate, book it now on EventBrite.

Similar posts
  • Memory analysis in incident response ... Incident response is often a stressful, high-pressure situation. Responders are desperately trying to claw together information. All around them the world is collapsing. Furthermore, everything important seems to be deleted or obfuscated. Yet it is not all doom and gloom. They have memory analysis. Life can be hard for the incident responder. You are faced [...]
  • Checklist or your memory, is one bett... Quite rightly, security professionals are proud of how much information they hold in their heads. There is no doubt that to be effective you need to have immediate access to lots of different concepts. However, the really effective ones also have a checklist. First off – the problem. Lots of certificate exams are memory tests and [...]
  • Threat Hunting – essential for ... Lots of articles, blog posts and webcasts talk about threat hunting. Despite this few, if any, organisations do it. This is a mistake. Security hit the headlines again recently, when Equifax admitted to a breach exposing around 143 million records of personal data. While details are still emerging, it looks like the attackers compromised an [...]
  • Dashboards vs Security – are th... Metrics, Dashboards and Security Like them or not, metrics are a fundamental part of every organisation. Security doesn’t get to a free pass. It is a rare CISO who doesn’t demand dashboards showing how all the security controls are performing. Therefore for most organisations, this is a fight long lost. This may not always be a [...]
  • Security Incident Response Really Doe... Incident response is one of those things you really hope you’ll never have to use, but know you will. Or at least you should know! Even with the best security, there will come a day when you are up to your eyes in chaos. Either a live security incident or, worse still, picking up the pieces [...]
%d bloggers like this: