Alumni Reunion Conference 2012 Presentations
This page contains an archive of the presentations from the Alumni Reunion Conference 2012.
Where a presentation is not available for download the author has not given permission for the presentation to be released.
Downloads are restricted to delegates of the conference, if you attended the conference and have not been supplied with access credentials then please contact ISG-Webmaster@rhul.ac.uk.
Monday 25th June 2012
Session 1: Security Education
Session 2: Risk Management and Cloud Computing
Session 3: Information Assurance and Critical Infrastructures
Session 4: National Infrastructures and Embedded Systems
Session 5: Invited Speaker
Tuesday 26th June 2012
Session 6: Security Management Compliance and Technologies
- Dr Alistair MacWillson (Accenture Technology Consulting): The Future of Security - responding to what is ahead
Session 7: Cryptography and Access Control
Session 8: Security Management and Human Factors
Session 9: Security Experiences
Session 10: Invited Speaker
- Harry Bains (Euroclear SA/NV): Security architecture - a practical case study
- George Patsis (Obrela Security Industries): Corporate Information Security Intelligence - Integrating People, Process and Technology
- Alexander (Baba) Akinjayeju (Verizon Enterprise Solution): Information security in the today's enterprise
Wednesday 27th June 2012
Session 11: Network Security
Session 12: Strategic Aspects of Security
- Professor Whitfield DIFFIE (Chief Cryptographer, Revere Security, and Vice President for Information Security Internet Corporation for Assigned Names and Numbers): Turning Points in Cryptography
- John Ruck (BAE Systems, Detica): Can cats be made secure? Delivering Information Security into complex environments
- Mohammed Ruwaid Zumla: What is best ever practice and how do you taper it? 6 months at London 2012 will bring you up to speed.
- Chez Ciechanowicz (RHUL): Closing remarks
The Information Security Group would like to thank the authors of the above presentation for their kind permission in allowing the presentations to be made available to conference delegates.
Presentations are copyright of the respective authors, no unauthorised copying or reproduction is permitted.
Find your Information Security course