Testing Your Business’s Ability to Defend its Digital and Physical Workplace

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

With the ‘Internet of Things’ firmly embedded as the one of the key information security topics of 2014 (confirmed by Google’s Nest Labs acquisition), technology’s ability to impact businesses physically has turned commonly accepted threats to client data and the consequent reputational damages on their head.

Implications of a security breach now include (at their most extreme) disrupted national infrastructure, international operations, lost Intellectual Property (IP) and even threats to physical safety. Cybercrime is now serious and organised - perpetrated on a national and international level. In the very worst case scenario, cybercrime can completely undermine confidence in the integrity of the UK government and economy’s technology and sensitive systems.

In light of this pervasive threat landscape, this webinar will:

  • Examine how businesses need to change their security testing strategy in order to educate and prepare
  • Look at what the information security industry can do to help businesses effectively target security efforts to defend their most valuable and vulnerable information and systems
  • Explore how the evolving ‘Internet of Things’ is creating multiple access points into a company’s network and advise on how new and developing threats can be tested
  • Introduce IMPACT testing


Matthew Dalton

Matthew Dalton IT Director, Boden

    John Walker

    John Walker Advisory Group, ISACA

      Charles White

      Charles White CEO, Information Risk Management (IRM) PLC

        James Wootton

        Technical Director, Information Risk Management (IRM) PLC

          Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.