Node4 Sponsor the CFG IT, Data and Cyber Security Conference, 2017
A unique learning experience for charities that want to enhance their long term IT security strategy and guard against future threats…
Node4 is delighted to be exhibiting at this year’s CFG Cyber Security Conference. We will be displaying our Cloud services, including our high-end Cyber Security solutions and Steve Nice, Node4’s Chief Technologist will be talking about the security of remote working.
Following recent media reports of high-profile charities experiencing serious breaches to their data security, the Charity Finance Group is hosting the CFG IT, Data and Cyber Security Conference 2017; an event dedicated to helping charities manage their IT security.
By attending this conference, you will learn how to enhance your charity’s long-term strategy to help you guard against future cyber threats. Experts will show you how to align your charity’s data management across your organization, and how to develop a digital strategy in response to the needs of your charity.
Additional topics include:
- EU reform and compliance
- Strategic approaches to system management
- How to use data to drive your strategy
In addition, there will be many opportunities to network with speakers and other delegates.
Our speakers at the event.
Node4’s Chief Technologist
Steve Nice is a 30-year veteran of the software industry and in only one of a handful of certified ethical hackers in the UK.
Steve Nice has worked with organisations such as the M.O.D., Boots, Ericsson, and Merrill Lynch. As Security Technologist, he is responsible for ensuring Node4 stay at the forefront of delivering security solutions.
Session 1A: 10.30 – 11:15 Security of remote working
Steve Nice will be there to discuss the security of remote working: As systems enabling flexible working become more accessible, charities are increasingly working in new ways. With staff working across borders, remotely and using mobile technology, IT departments are required to manage various devices across multiple operating systems but how does this impact levels of security?
Steve will also perform a live demo which will demonstrate how easy it is for hackers to detect and get access to organisations’ remote IT systems like servers or software applications. A range of tools that can be used to carry out these activities will also be shown.