Tech & Strat Talks Submission Form:
SECTION 1: LOGISTICS CONTACT DETAILS: This is the main contact person from your organisation who we will liaise with regarding the logistics for the speaking position if the submission is successful. (This might be the speaker or another person)
Logistics contact: Name
Select title
Ms
Miss
Mrs
Mr
Professor
Dr
Sir
Dame
Lord
Lady
Logistics contact: Job title
Logistics contact: Company name
Email
Logistics contact: Telephone number
Logistics contact: Company Twitter name
SECTION 2: TALK DETAILS
Please indicate which type of talk this is
Strategy talk
Tech talk
Talk title
Talk synopsis (please provide 300-400 words describing the proposed talk)
Words left:
400
/400
Learning outcomes: Please list 5 benefits to the audience attending your presentation. (When you leave this talk you will....understand how to, learn how to etc)
1. 2. 3. 4. 5.
Please provide a 3-5 sentence summary of your talk to be used for promotional material (max 100 words)
Words left:
95
/100
If this is a Tech Talk, please indicate the technical level of this talk
Advanced
Intermediate
Introductory/ general
It is a Strategy Talk
If this is a Strategy talk, please indicate the technical level of this talk
Advanced
Intermediate
Introductory/ general
It is a Tech Talk
Which audience/s will benefit from the content of your talk?
Senior information security decision-makers
Mid-level information security management
Technical information security practitioners
Other
Please list relevant job titles of audience/s that will benefit from the content of your talk
Will your presentation include a demo or reveal new code, a new tool or exploit?
Yes
No
If yes, please provide detail below:
Has this talk been presented at other conferences?
Yes
No
Please explain how your talk will be different from and/or better than other talks on this topic
If this is a case study talk, who will present it?
Client
Our company
Joint client and company
It is not a case study
SECTION 3: SPEAKER 1 DETAILS (this information will be used to register the speaker for Infosecurity Europe if successful, so please ensure it is correct.)
Speaker 1: Name
Select title
Ms
Miss
Mrs
Mr
Professor
Dr
Sir
Dame
Lord
Lady
Speaker 1: Job Title
Speaker 1: Company Name
Speaker 1: Company Address
Afghanistan
Albania
Algeria
Andorra
Angola
Anguilla
Antigua & Deps
Argentina
Armenia
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bosnia Herzegovina
Botswana
Brazil
British Virgin Islands
Brunei
Bulgaria
Burkina
Burundi
Cambodia
Cameroon
Canada
Cape Verde
Cayman Islands
Central African Rep
Chad
Chile
China
Colombia
Comoros
Congo
Costa Rica
Croatia
Cuba
Curaçao
Cyprus
Czech Republic
Denmark
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Faroe Islands
Fiji
Finland
France
Gabon
Gambia
Georgia
Germany
Ghana
Greece
Grenada
Guatemala
Guinea
Guinea-Bissau
Guyana
Haiti
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iran
Iraq
Ireland
Israel
Italy
Ivory Coast
Jamaica
Japan
Jordan
Kazakhstan
Kenya
Kiribati
Korea North
Korea South
Kosovo
Kuwait
Kyrgyzstan
Laos
Latvia
Lebanon
Lesotho
Liberia
Libya
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mexico
Micronesia
Moldova
Monaco
Mongolia
Montenegro
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
New Zealand
Nicaragua
Niger
Nigeria
Norway
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Poland
Portugal
Puerto Rico
Qatar
Romania
Russian Federation
Rwanda
Saint Vincent & the Grenadines
Samoa
San Marino
Sao Tome & Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Singapore
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Sudan
Spain
Sri Lanka
St Kitts & Nevis
St Lucia
Sudan
Suriname
Swaziland
Sweden
Switzerland
Syria
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tonga
Trinidad & Tobago
Tunisia
Turkey
Turkmenistan
Tuvalu
Uganda
Ukraine
United Arab Emirates
United Kingdom
United States
Uruguay
Uzbekistan
Vanuatu
Vatican
Venezuela
Vietnam
Yemen
Zambia
Zimbabwe
Other
Speaker 1: Twitter name @
Speaker 1: Email Address
Speaker 1: Mobile/cell number
Speaker 1: Telephone number
Speaker 1: Professional biography (60-80 words)
SECTION 4: SPEAKER 2 DETAILS (if applicable)
Speaker 2: Name
Select title
Ms
Miss
Mrs
Mr
Professor
Dr
Sir
Dame
Lord
Lady
Copy of Speaker 2: Job Title
Speaker 2: Company Name
Speaker 2: Company Address
Afghanistan
Albania
Algeria
Andorra
Angola
Anguilla
Antigua & Deps
Argentina
Armenia
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bosnia Herzegovina
Botswana
Brazil
British Virgin Islands
Brunei
Bulgaria
Burkina
Burundi
Cambodia
Cameroon
Canada
Cape Verde
Cayman Islands
Central African Rep
Chad
Chile
China
Colombia
Comoros
Congo
Costa Rica
Croatia
Cuba
Curaçao
Cyprus
Czech Republic
Denmark
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Faroe Islands
Fiji
Finland
France
Gabon
Gambia
Georgia
Germany
Ghana
Greece
Grenada
Guatemala
Guinea
Guinea-Bissau
Guyana
Haiti
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iran
Iraq
Ireland
Israel
Italy
Ivory Coast
Jamaica
Japan
Jordan
Kazakhstan
Kenya
Kiribati
Korea North
Korea South
Kosovo
Kuwait
Kyrgyzstan
Laos
Latvia
Lebanon
Lesotho
Liberia
Libya
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mexico
Micronesia
Moldova
Monaco
Mongolia
Montenegro
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
New Zealand
Nicaragua
Niger
Nigeria
Norway
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Poland
Portugal
Puerto Rico
Qatar
Romania
Russian Federation
Rwanda
Saint Vincent & the Grenadines
Samoa
San Marino
Sao Tome & Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Singapore
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Sudan
Spain
Sri Lanka
St Kitts & Nevis
St Lucia
Sudan
Suriname
Swaziland
Sweden
Switzerland
Syria
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tonga
Trinidad & Tobago
Tunisia
Turkey
Turkmenistan
Tuvalu
Uganda
Ukraine
United Arab Emirates
United Kingdom
United States
Uruguay
Uzbekistan
Vanuatu
Vatican
Venezuela
Vietnam
Yemen
Zambia
Zimbabwe
Other
Speaker 2: Twitter name @
Speaker 2: Email Address
Speaker 2: Mobile/cell number
Speaker 2: Telephone number
Speaker 2: Professional biography (60-80 words)
Additional speakers? If your talk is a panel please contact madolyn.hollins@reedexpo.co.uk
SECTION 5: ABOUT YOUR TALK
Which vertical markets is the talk applicable to? (Please select the verticals that are relevant to your session)
All
Broadcasting
Catering/Hotels/Leisure & Entertainment
Charity
Construction/Agriculture/Mining
Consultancy
Education & Training
Finance/Banking/Insurance
Government (Central/Local/MOD)
IT Distributor/VAR/Integrator/OEM
IT Hardware/Software/Manufacturer/Supplier
Legal
Manufacturing/Engineering/Electronics (Non IT)
Media (Marketing, Advertising, PR, Press, Publishing)
Medical/Healthcare
Oil/Gas/Chemical
Pharmaceuticals
Property
Public Services (Excluding Healthcare)
Retail/Wholesale Distribution
Service Provider
Telecommunications
Transport and Travel
Utilities (Energy/Water/Gas)
Other
1
Please indicate what size of organisation your session is most suited to:
Enterprise
SMB
Both
Please specify 3-5 key product areas that are applicable to your session. This is used to aid navigation on the website. If you select more than 5 only the first 5 will be used on the website.
Anti-malware
Anti-spam
Anti-virus
Application Security
Mobile Application Security
Patch Management
Secure Coding
Web Application Security
Automation
AI/Machine Learning
Business Continuity/ Incident Response
Data Breach Incident Management
Disaster Recovery
Incident Response
Business Continuity
Security Information and Event Management (SIEM)
Compliance
Audit
Governance
Legislation and Standards
PCI-DSS
Legal Risk
Security Policy
Cyber Physical
Internet of Things
SCADA Security
Smart Grid Security
Data Protection
Data Breaches
Data Loss Prevention
Database Security
Information Management
Information Risk Management
Privacy
Secure Disposal
Secure Storage
Digital Forensics
Data Breach Incident Management
Fraud Detection
IT Forensics
Log Management
Encryption
Digital Signatures & Certificates
PKI
SSL
SSH
Human Factor
Insider Threat
Social Engineering
Security Training, Education & Awareness
Recruitment
Identity Access Management
Authentication Tokens
Biometrics
Digital Rights Management
Single Sign On
Two-factor Authentication
Virtual Authentication
Internet Security
Email Security
IM Security
Social Media Security
Web Security/Web Filtering
Managed Services
Cloud Security
Consulting & Professional Services
Managed Security Services
Outsourcing
Security-as-a-Service
Mobile Security
BYOD
Mobile Device Management
Mobile Access Management
Tablet Security
Network Security
Access Rights Management
Blockchain
End Point Security
Firewalls
Incident/Intrusion Detection
Intrusion Prevention/Detection
Network Access Control
Penetration Testing
Security Monitoring
Wireless Security
Unified Threat Management
Payment Security
Ecommerce
Secure Transactions
Risk Management
Big Data Analytics
Cyber Insurance
Risk & Vulnerability Assessment
Security Analytics
Threat Intelligence
Vulnerability Management
Other
Industry Association/Accreditation
Industry Education Provider
Industry Publication
2
Please select no more than two of the business issues that visitors will be able to resolve by attending your session:
Deliver security to drive and enable business growth
Demonstrate thought-leadership to ensure security is high on the corporate agenda and capex justified
Understand internal and external threats and keep a business secure
Mitigate the effects of new vulnerabilities and exploits
Build a robust cyber response and resilience strategy
Clearly navigate and understand increasingly complex legislation
Select best fit products and solutions from the wide range of choice of vendors and products available
Ensure information security projects demonstrate return on investment
Balance, manage and prioritise risk
Privacy Policy
I agree to the
Privacy Policy
.
Terms & Conditions
I agree to the
Terms & Conditions
.
Contact details:
Madolyn Hollins
Conference Executive
Email:
madolyn.hollins
@reedexpo.co.uk
File Upload
Uploading, please wait...
Upload
File Upload 2
Uploading, please wait...
Upload
Verification
You already reached the maximum number of accepted choices