Join us in Newcastle next month for the annual Jisc security conference 2019. Under the theme "discovering the next generation of cyber security, together", delegates will explore emerging trends and threats to the education sector.
The two-day event provides a networking opportunity and a safe space to engage in frank and open conversations on sensitive topics, secure in the knowledge that all information released will stay in the confines of the conference. The sessions cover core topics, including:
- Business continuity and disaster recovery
- Threat intelligence
Highlights this year include...
1. A chance to double up - Make the most of your stay in Newcastle by joining one of Jisc’s training courses the day before at the same venue - and conference delegates get a 10% discount. The courses cover hands-on incident response training, and penetration testing. Or if you are interested in security information and event management (SIEM) then the Splunk education user group is also on nearby.
2. Digital pro? Keynote speaker Bernadette John explains how to protect reputation and employees by educating staff about Digital Professionalism best practice and providing clear guidelines and codes of practice.
3. Push for change - Learn how Leeds Beckett University planned and delivered a project to improve its IT and cyber security practice and culture.
4. Safety first - Andy Phippen, professor of digital policy, University of Plymouth will explore the online abuse and harassment of students and universities’ "duty of care".
5. Aim higher - Hear from Alex Harding, IT manager at Runshaw College, who will describe the college’s journey to achieving ISO 27001, starting from scratch.
6. The state of the sector - Dr John Chapman, head of Jisc’s security operations centre and the brains behind the annual cyber security posture survey, reveals key findings from 2019.
7. Cheers! Continue the discussion and network with peers at a drinks reception at the end of the first day.
8. DoH and DoT - Take a deep-dive into DNS over HTTPS (DoH), DNS over TLS (DoT) and encrypted server name indication (ESNI) - new technologies promising to preserve online privacy, but which are already being abused by malicious actors.
9. Get the max from data - Thomas Willson, security team lead at Imperial College London, demonstrates how multiple IT teams at Imperial College London use Splunk to collaborate on the same data with different viewpoints.
10. What you know, about who you know - Abigail McAlpine, PhD researcher in cyber security at the University of Huddersfield, looks at breaking down how children's personal information online could lead to a change in how we authenticate ourselves with our accounts.
11. Wolf in sheep’s clothing - The National Cyber Security Centre’s Keir P relates some cautionary tales from the education sector demonstrating how advanced persistent threats (APTs) are taking advantage of easy attack routes.