We use cookies on this site. By browsing our site you agree to our use of cookies. Close this message Find out more

Home > Information Security home > Alumni > Alumni Conference > Alumni Conference 2012 > Alumni Reunion Conference 2012 Presentations
More in this section Alumni Conference 2012

Alumni Reunion Conference 2012 Presentations

This page contains an archive of the presentations from the Alumni Reunion Conference 2012.
Where a presentation is not available for download the author has not given permission for the presentation to be released.

Downloads are restricted to delegates of the conference, if you attended the conference and have not been supplied with access credentials then please contact ISG-Webmaster@rhul.ac.uk.


Monday 25th June 2012

Session 1: Security Education Session 2: Risk Management and Cloud Computing Session 3: Information Assurance and Critical Infrastructures Session 4: National Infrastructures and Embedded Systems Session 5: Invited Speaker
  • Dr Alistair MacWillson (Accenture Technology Consulting): The Future of Security - responding to what is ahead
Tuesday 26th June 2012

Session 6: Security Management Compliance and Technologies
  • Harry Bains (Euroclear SA/NV): Security architecture - a practical case study
  • George Patsis (Obrela Security Industries): Corporate Information Security Intelligence - Integrating People, Process and Technology
  • Alexander (Baba) Akinjayeju (Verizon Enterprise Solution): Information security in the today's enterprise
Session 7: Cryptography and Access Control Session 8: Security Management and Human Factors Session 9: Security Experiences Session 10: Invited Speaker
  • Professor Whitfield DIFFIE (Chief Cryptographer, Revere Security, and Vice President for Information Security Internet Corporation for Assigned Names and Numbers): Turning Points in Cryptography
Wednesday 27th June 2012

Session 11: Network Security Session 12: Strategic Aspects of Security
  • John Ruck (BAE Systems, Detica): Can cats be made secure? Delivering Information Security into complex environments
  • Mohammed Ruwaid Zumla: What is best ever practice and how do you taper it? 6 months at London 2012 will bring you up to speed.
  • Chez Ciechanowicz (RHUL): Closing remarks

The Information Security Group would like to thank the authors of the above presentation for their kind permission in allowing the presentations to be made available to conference delegates.

Presentations are copyright of the respective authors, no unauthorised copying or reproduction is permitted.

   
 
 
 

Comment on this page

Did you find the information you were looking for? Is there a broken link or content that needs updating? Let us know so we can improve the page.

Note: If you need further information or have a question that cannot be satisfied by this page, please call our switchboard on +44 (0)1784 434455.

This window will close when you submit your comment.

Add Your Feedback
Close