Wednesday 08 November 2017 to Thursday 09 November 2017
Mercure Manchester Piccadilly Hotel
Join the discussion
This two-day security conference is an opportunity for network and security professionals in UK higher education, further education and research to network with peers, share best practice and address common challenges.
You'll also learn more about emerging trends and how we can support members through our range of security products and services.
Wednesday 8 November
Welcome and introduction
Trends in information security and the role of the chief information security officer (CISO)
Paul will be drawing on his experience as a chief information security officer (CISO) across a variety of private and public-sector organisations to explain the relationship between risk and information security.
He will then talk about trends in information security, and the role of a CISO, and how they affect organisations of all types. In particular, he will talk about some of the key strategies he has seen working most effectively, such as security as a service, shared CISOs, and the move towards information security as a business driver.
Interim CISO, DrakeLong Ltd
Exhibition remains open.
Securely enabling teaching
A look at how IT and information security securely enables teaching across the university, offering simulated commercial practice, world-class teaching, and ethical learning.
Information security adviser, University of Southampton
Exhibition remains open.
Communicating cyber security
Setting the current context of cybercrime and the need to collectively tackle the threat it poses to the UK's infrastructure and economy.
Senior partner networks manager, Cyber Aware, Research, Information and Communications Unit (RICU), Home Office
Information lifecycles: a tool for GDPR and more
This talk will show how information lifecycles can help you implement the law, comply with standards and make more effective use of your information.
Chief regulatory adviser, Jisc technologies, Jisc
Exhibition remains open.
Privacy is at the heart of data protection – so what?
The GDPR does not mention privacy by design – preferring ‘data protection by design and default’ (Article 25).
They are not the same thing, but how do we reconcile the two and embed the spirit of P-by-D into the practical requirements of Article 25?
Security architect, University of Portsmouth
A practical guide to PCI compliance
Our sector faces increasing compliance pressures.
This session focuses on PCI (payment card industry) compliance and aims to demystify PCI and its 12 requirements by exploring the standard and where it applies.
IT security manager, Leeds Beckett University
Thursday 9 November
Welcome and introduction
Cyber resilience: planning to bounce back
How the CERT (computer emergency response team) at Oxford University has improved its resilience and looking at the emerging idea of 'cyber resilience' as the ability to continue to deliver outcomes despite adverse cyber events.
Dr Andrew Lenaghan
Computer security specialist, OxCERT, University of Oxford
Password lifespans: a new approach
UCL, as a university, has a huge user base and many complex systems which all rely on authentication.
This session provides a narrative of the challenges we have had with password lifespans, what we believe to be a completely new idea which improves both security and the user experience, and how we have implemented it in practice.
Global CISO, Thales e-Security
Wasn’t expecting that! Now what?
Sharing the practical experiences of handling incidents in UCAS and advice on building a robust incident management approach.
Enterprise architect - security, UCAS
Web filtering and monitoring at the University of Gloucestershire
The work at the University of Gloucestershire around Prevent and the discussions around appropriate filtering and monitoring that has lead to the purchase of an iBoss appliance from the Jisc framework agreement.
Dr Nick Moore
Director of library, technology and information service, University of Gloucestershire
Delivering a cyber security programme in the university environment
The University of Strathclyde is undertaking a three-year cyber security programme.
Bruce's presentation will look at this project and the multitude of individual projects within it, the change which this programme will deliver to the institution and the drivers which persuaded the university to implement it.
Head, IT infrastructure, University of Strathclyde
Scanning scanner activity
Scanning is a fact of internet life. This session look at who is scanning, what are they scanning for and is anything new happening?
We'll also look at the legal and ethical framework that supports the work undertaken by the University of Cambridge.
Director, Cambridge Cybercrime Centre, University of Cambridge
Phishing campaign – HEI learning points
Discover key learning points from the experience of running a simulated phishing exercise at Loughborough University in 2016.
Assistant director of IT, Loughborough University
Summary and close
Who should attend
This event is aimed at network and security professionals from higher education, further education and research who are users of the Janet Network.
Please note that this event is not for commercial organisations. Any commercial representatives registering as delegates will have their registration cancelled.
Trends in information security and the role of CISO:
DDoS mitigation at Jisc:
Securely enabling teaching in working with the academic community:
Communicating cyber security:
Information lifecycles: a tool for GDPR:
Privacy is at the heart of data protection:
A practical guide to PCI compliance:
Cyber resilience: planning to bounce back:
Password lifespans at UCL - a training opportunity:
Wasn't expecting that! Now what?:
If you have any questions about this event, contact email@example.com.
Due to the nature of the content at the conference you will be required to bring a print out of your booking and you will be required to produce official photo ID, ie a passport or driving licence.
Booking for this event has now closed.
All our sponsors will also be exhibiting at the event.
What is your approach to network and data security?
‘See the unseen’ with Axians and Fortinet, helping universities to develop secure carrier-grade network connectivity that successfully delivers a better experience for both students and researchers. We have the people, processes, technical and market knowledge to optimise and secure complex, critical digital networks.
BSI Cybersecurity and Information Resilience
As a leading provider of research and development, auditing services, training, data compliance, managed technology solutions and advisory services, BSI help organisations respond to information security challenges.
They can help you embed a robust framework to build information resilience and proactively identify, anticipate and respond to cyber threats and information security risks.
Cyber criminals have more tools at their disposal than ever before, coupled with a keen sense of when to use each one for maximum effect; particularly in the education sector.
To beat them at their game, Cisco's security experts are relishing the chance to offer you insights and solutions based on the latest threat intelligence they’ve found.
Gaia Technologies is one of the leading providers of ICT solutions to UK schools, currently looking after more than 500 education customers.
Through a well-earned reputation for innovation, commitment to customer care and an unrivalled track record delivery of projects, Gaia has established itself as a trusted partner for schools.
Infoblox delivers actionable network intelligence to enterprises, government agencies, and service providers around the world.
As the industry leader in DNS, DHCP, and IP address management (DDI), Infoblox provides control and security from the core — empowering thousands of organizations to increase efficiency and visibility, reduce risk, and improve customer experience.
Khipu Networks are a cyber security company delivering network, wifi and security solutions, specialising in the education sector.
Khipu partner with Jisc on several of the routing and switching frameworks, and also hold single supplier status for vulnerability assessment and simulated phishing services since 2016.
Palo Alto Networks
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organisations worldwide prevent cyber breaches.
Their innovative security platform prevents known and unknown threats, and safely enables applications, users and content, empowering organisations to securely and efficiently move their businesses forward.
Phoenix Datacom provide services and solutions to improve security and performance for critical, large-scale and latency-sensitive networks. Their integrated security solutions and network/application performance monitoring systems are coupled with our superior network visibility capabilities to provide cost-effective, comprehensive and resilient network coverage.