Halkyn Security Blog
Specialist Security & Risk Management Consultants

North Wales Cyber Security Cluster – April 2016 Meeting

Cyber Security Cluster - April 2016

Cyber Security Cluster – April 2016 meeting

The North Wales Cyber Security Cluster is meeting on 21 April at Solvings Ltd, in Mold, Flintshire. Solvings provide a great location and the cluster is a wonderful opportunity to learn about cyber security.

Access to cluster meetings is free and everyone is welcome. No prior knowledge is needed. There really are no stupid questions!

Clusters exist across the UK and grew out of the UK Governments Cyber Security Strategy. In North Wales, meetings are monthly. Each session comprises a mix of presentations, information sharing and networking.

Halkyn Consulting is proud to be presenting a session on cyber attacks for the April meeting. We will look at why cyber security is different & why it matters. Following this, we will cover hackers. This will include what motivates them and what techniques they use.

In this session we will also present a case study involving a live “hacking” demonstration. This is based on an investigation we carried out for a UK client. The demonstration will show, in near real time, how swiftly hackers can compromise a system. This is true, even for a fairly well secured system.

If time allows, we will cover some additional cases involving blended attacks and newer tools. All of this is based on real-world examples of attacks hitting UK businesses.

To close our session, we will talk about incident response. This is a crucial part of every cyber security plan. We will look at three common IR models. We will also briefly cover the six steps of incident response. A future session will concentrate this in more detail.

Everyone really is welcome to the Cyber Security Cluster. Free up a couple of hours on Thursday and pop in to say hello. Please help to spread the word. North Wales can be a centre of Cyber Security excellence.

You can register for a seat via EventBrite or even just turn up on the day. See you there!

Similar posts
  • Checklist or your memory, is one bett... Quite rightly, security professionals are proud of how much information they hold in their heads. There is no doubt that to be effective you need to have immediate access to lots of different concepts. However, the really effective ones also have a checklist. First off – the problem. Lots of certificate exams are memory tests and [...]
  • Threat Hunting – essential for ... Lots of articles, blog posts and webcasts talk about threat hunting. Despite this few, if any, organisations do it. This is a mistake. Security hit the headlines again recently, when Equifax admitted to a breach exposing around 143 million records of personal data. While details are still emerging, it looks like the attackers compromised an [...]
  • UOC – Cybersecurity Conference ... Cybersecurity is big news with governments and businesses suffering at the hands of cyber attacks. As a result of this, the University of Chester (UoC) STEMs society is hosting a Cybersecurity Conference on the 28th March 2017. The primary aim is to raise awareness of Cybersecurity. In addition, it will provide an opportunity to build professional networks and encourage career [...]
  • Dashboards vs Security – are th... Metrics, Dashboards and Security Like them or not, metrics are a fundamental part of every organisation. Security doesn’t get to a free pass. It is a rare CISO who doesn’t demand dashboards showing how all the security controls are performing. Therefore for most organisations, this is a fight long lost. This may not always be a [...]
  • Security Incident Response Really Doe... Incident response is one of those things you really hope you’ll never have to use, but know you will. Or at least you should know! Even with the best security, there will come a day when you are up to your eyes in chaos. Either a live security incident or, worse still, picking up the pieces [...]
%d bloggers like this: