Today our society, our economies, and our personal and business lives rely more and more on technology, information, and computer systems. While these new technologies and systems bring many benefits to us they also introduce many new threats. Cloud computing, Bring Your Own Devices, Internet of Things, wearable technologies, and social media are just some examples of how our lives are changing. In this ever changing world where technology is becoming more ubiquitous and user focussed how do we ensure the security of the information in our systems? In this talk Brian Honan will:
Outline the challenges and threats new technologies are presenting to businesses
Discuss how future trends may impact our businesses
Present a number of steps on how to better deal with and manage these challenges while not restricting the benefits they bring
major challenge facing those trying to set up a Computer Emergency Response Team is developing the tools and platform to support the initiative. This session will look at how the WARP (Warning Advice and Reporting Point) platform can be used to facilitate the establishment of a CERT in a cost effective and efficient manner. After spending 4 years trying to convince the Irish Government to establish a national Computer Emergency Response Team with little or no progress, Brian Honan set up a not for profit company to offer CERT services to the Irish business community. However, faced with a very small budget Brian had to determine how best to implement the CERT without compromising the level of service provided to the target community. This talk will cover Brian's journey as he progressed from the initial conception to actually setting up IRISS-CERT,www.iriss.ie, which is now Ireland's only CERT. Brian will discuss how and why he decided what services were required by the business community and how he used the WARP (www.warp.gov.uk) platform to provide those services.
e all know how the Target, Sony and Anthem breaches were seismic, but have you truly considered how the aftershocks of these breaches will forever change the security profession? See breach experts discuss:
The evolution of new breach laws and litigation in 2015;
The latest attack targets and techniques;
What to look for in the next-generation of security controls.
Before medieval marauders had any hope of capturing the castle, they first had to overcome a series of obstacles designed to keep them from reaching their goal. By analyzing your adversary steps, you are in a better position to segment, analyze and mitigate an attack. In addition, firms can build a fortress of proactive defense controls and provide the time to react decisively.
Currently, there is no universal EU law to mandate firms within the European Union to alert regulators when they’ve suffered a breach. Given that this lack of mandated disclosure laws does not affect whether organisations are being attacked or not, this session will cover some of the lessons learned from a variety of data breaches
This website is a resource for event professionals and strives to provide the most comprehensive catalog of thought leaders and industry experts to consider for speaking engagements. A listing or profile on this website does not imply an agency affiliation or endorsement by the talent.
All American Entertainment (AAE) exclusively represents the interests of talent buyers, and does not claim to be the agency or management for any speaker or artist on this site. AAE is a talent booking agency for paid events only. We do not handle requests for donation of time or media requests for interviews, and cannot provide celebrity contact information.
If you are the talent, and wish to request removal from this catalog or report an issue with your profile, please click here.
Today our society, our economies, and our personal and business lives rely more and more on technology, information, and computer systems. While these new technologies and systems bring many benefits to us they also introduce many new threats. Cloud computing, Bring Your Own Devices, Internet of Things, wearable technologies, and social media are just some examples of how our lives are changing. In this ever changing world where technology is becoming more ubiquitous and user focussed how do we ensure the security of the information in our systems? In this talk Brian Honan will:
Outline the challenges and threats new technologies are presenting to businesses
Discuss how future trends may impact our businesses
Present a number of steps on how to better deal with and manage these challenges while not restricting the benefits they bring
major challenge facing those trying to set up a Computer Emergency Response Team is developing the tools and platform to support the initiative. This session will look at how the WARP (Warning Advice and Reporting Point) platform can be used to facilitate the establishment of a CERT in a cost effective and efficient manner. After spending 4 years trying to convince the Irish Government to establish a national Computer Emergency Response Team with little or no progress, Brian Honan set up a not for profit company to offer CERT services to the Irish business community. However, faced with a very small budget Brian had to determine how best to implement the CERT without compromising the level of service provided to the target community. This talk will cover Brian's journey as he progressed from the initial conception to actually setting up IRISS-CERT,www.iriss.ie, which is now Ireland's only CERT. Brian will discuss how and why he decided what services were required by the business community and how he used the WARP (www.warp.gov.uk) platform to provide those services.
e all know how the Target, Sony and Anthem breaches were seismic, but have you truly considered how the aftershocks of these breaches will forever change the security profession? See breach experts discuss:
The evolution of new breach laws and litigation in 2015;
The latest attack targets and techniques;
What to look for in the next-generation of security controls.
Before medieval marauders had any hope of capturing the castle, they first had to overcome a series of obstacles designed to keep them from reaching their goal. By analyzing your adversary steps, you are in a better position to segment, analyze and mitigate an attack. In addition, firms can build a fortress of proactive defense controls and provide the time to react decisively.
Currently, there is no universal EU law to mandate firms within the European Union to alert regulators when they’ve suffered a breach. Given that this lack of mandated disclosure laws does not affect whether organisations are being attacked or not, this session will cover some of the lessons learned from a variety of data breaches
Brian Honan is a keynote speaker and industry expert who speaks on a wide range of topics such as Being Secure in an Insecure World, Creating a CERT at WARP Speed: How To Fast Track the Implementation of Your CERT, Breach 360: How Top Attacks Impact Tomorrow’s Laws, Litigation, Security, Disrupting the Progression of a Cyber Attack and Breach-Aholic Anonymous – What Can We Learn From Data Breaches?. The estimated speaking fee range to book Brian Honan for your event is $10,000 - $20,000. Brian Honan generally travels from DublinIreland and can be booked for (private) corporate events, personal appearances, keynote speeches, or other performances. Similar motivational celebrity speakers are Andy Ellis, Gary Miliefsky, Amanda Rousseau, Chuck Whitlock and Ashkan Soltani. Contact All American Speakers for ratings, reviews, videos and information on scheduling Brian Honan for an upcoming live or virtual event.
Today our society, our economies, and our personal and business lives rely more and more on technology, information, and computer systems. While these new technologies and systems bring many benefits to us they also introduce many new threats. Cloud computing, Bring Your Own Devices, Internet of Things, wearable technologies, and social media are just some examples of how our lives are changing. In this ever changing world where technology is becoming more ubiquitous and user focussed how do we ensure the security of the information in our systems? In this talk Brian Honan will:
Outline the challenges and threats new technologies are presenting to businesses
Discuss how future trends may impact our businesses
Present a number of steps on how to better deal with and manage these challenges while not restricting the benefits they bring
major challenge facing those trying to set up a Computer Emergency Response Team is developing the tools and platform to support the initiative. This session will look at how the WARP (Warning Advice and Reporting Point) platform can be used to facilitate the establishment of a CERT in a cost effective and efficient manner. After spending 4 years trying to convince the Irish Government to establish a national Computer Emergency Response Team with little or no progress, Brian Honan set up a not for profit company to offer CERT services to the Irish business community. However, faced with a very small budget Brian had to determine how best to implement the CERT without compromising the level of service provided to the target community. This talk will cover Brian's journey as he progressed from the initial conception to actually setting up IRISS-CERT,www.iriss.ie, which is now Ireland's only CERT. Brian will discuss how and why he decided what services were required by the business community and how he used the WARP (www.warp.gov.uk) platform to provide those services.
e all know how the Target, Sony and Anthem breaches were seismic, but have you truly considered how the aftershocks of these breaches will forever change the security profession? See breach experts discuss:
The evolution of new breach laws and litigation in 2015;
The latest attack targets and techniques;
What to look for in the next-generation of security controls.
Before medieval marauders had any hope of capturing the castle, they first had to overcome a series of obstacles designed to keep them from reaching their goal. By analyzing your adversary steps, you are in a better position to segment, analyze and mitigate an attack. In addition, firms can build a fortress of proactive defense controls and provide the time to react decisively.
Currently, there is no universal EU law to mandate firms within the European Union to alert regulators when they’ve suffered a breach. Given that this lack of mandated disclosure laws does not affect whether organisations are being attacked or not, this session will cover some of the lessons learned from a variety of data breaches
This website is a resource for event professionals and strives to provide the most comprehensive catalog of thought leaders and industry experts to consider for speaking engagements. A listing or profile on this website does not imply an agency affiliation or endorsement by the talent.
All American Entertainment (AAE) exclusively represents the interests of talent buyers, and does not claim to be the agency or management for any speaker or artist on this site. AAE is a talent booking agency for paid events only. We do not handle requests for donation of time or media requests for interviews, and cannot provide celebrity contact information.
If you are the talent, and wish to request removal from this catalog or report an issue with your profile, please click here.