Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Testing Your Business’s Ability to Defend its Digital and Physical Workplace

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

With the ‘Internet of Things’ firmly embedded as the one of the key information security topics of 2014 (confirmed by Google’s Nest Labs acquisition), technology’s ability to impact businesses physically has turned commonly accepted threats to client data and the consequent reputational damages on their head.

Implications of a security breach now include (at their most extreme) disrupted national infrastructure, international operations, lost Intellectual Property (IP) and even threats to physical safety. Cybercrime is now serious and organised - perpetrated on a national and international level. In the very worst case scenario, cybercrime can completely undermine confidence in the integrity of the UK government and economy’s technology and sensitive systems.

In light of this pervasive threat landscape, this webinar will:

  • Examine how businesses need to change their security testing strategy in order to educate and prepare
  • Look at what the information security industry can do to help businesses effectively target security efforts to defend their most valuable and vulnerable information and systems
  • Explore how the evolving ‘Internet of Things’ is creating multiple access points into a company’s network and advise on how new and developing threats can be tested
  • Introduce IMPACT testing


Matthew Dalton

Matthew Dalton IT Director, Boden

    John Walker

    John Walker Advisory Group, ISACA

      Charles White

      Charles White CEO, Information Risk Management (IRM) PLC

        James Wootton

        Technical Director, Information Risk Management (IRM) PLC