www.teiss.co.uk
Open in
urlscan Pro
52.49.144.126
Public Scan
URL:
https://www.teiss.co.uk/events/seizing-the-breach-how-can-businesses-use-data-visibility-to-improve-to-cyber-breach-resp...
Submission: On March 25 via api from CH — Scanned from DE
Submission: On March 25 via api from CH — Scanned from DE
Form analysis
3 forms found in the DOMName: ao-srch-form — GET https://www.teiss.co.uk/teiss-search
<form method="get" action="https://www.teiss.co.uk/teiss-search" name="ao-srch-form" id="ao-searchde-serchform-2103" class="ao-searchde-serchform" data-idname="2103">
<div>
<span class="aos-PosR"><label for="ao-searchde-box-2103" class="aos-searchde-srchbox-label">Search Teiss</label><input type="text" class="aos-DS27-FField ao-searchde-srchbox" name="q" id="ao-searchde-box-2103" value="" placeholder="Search Teiss">
</span>
<span class="aos-PL5px">
<button type="submit" class="aos-DS27-FButton" id="ao-searchde-btn-2103">Search</button>
</span>
</div>
</form>
Name: deLogin — POST https://www.teiss.co.uk/login?RefDoc=https%3A%2F%2Fwww%2Eteiss%2Eco%2Euk%2Fevents%2Fseizing%2Dthe%2Dbreach%2Dhow%2Dcan%2Dbusinesses%2Duse%2Ddata%2Dvisibility%2Dto%2Dimprove%2Dto%2Dcyber%2Dbreach%2Dresponses
<form action="https://www.teiss.co.uk/login?RefDoc=https%3A%2F%2Fwww%2Eteiss%2Eco%2Euk%2Fevents%2Fseizing%2Dthe%2Dbreach%2Dhow%2Dcan%2Dbusinesses%2Duse%2Ddata%2Dvisibility%2Dto%2Dimprove%2Dto%2Dcyber%2Dbreach%2Dresponses" name="deLogin" id="deLogin"
method="post" enctype="application/x-www-form-urlencoded" class="ao-loginde-vertical" data-dccode="2225"><input type="hidden" name="formID" value="aoLogin"><input type="hidden" name="Age_25_3_2022" value="">
<div class="ao-loginde-email aos-MBXS"><input tabindex="2" type="text" name="email" class="aos-DS19-FField aos-W100" id="Email2225" maxlength="150" placeholder="Email"></div>
<div class="ao-loginde-password aos-MBXS"><input tabindex="3" type="password" name="password" class="aos-DS19-FField aos-W100" id="Password2225" maxlength="150" placeholder="Password"></div>
<div class="aos-Check aos-DS19-N aos-FL aos-W100 aos-MT5px aos-MB15px"><input type="checkbox" name="RememberLogin" id="aoLogin-RememberLogin" value="1" checked="checked" class="aos-DS19-FField" data-label="Remember Login"><label
for="aoLogin-RememberLogin" class="aoInputLabel"></label>Remember Login</div>
<div class="ao-loginde-submit"><input class="aos-DS19-FButton aos-W100 aoLoginButton2225" tabindex="4" type="submit" value="Login"></div>
<div class="aos-FL aos-W100 aos-MTXS aos-TAC aos-DS19-N ao-loginde-bottomlinks"><a class="aos-NS" href="https://www.teiss.co.uk/registration">Register</a><span
class="aos-MLR5px aos-NS">|</span><a class="aos-NS" href="https://www.teiss.co.uk/password-reset">Reset Password</a></div>
</form>
Name: deLogin — POST https://www.teiss.co.uk/login?RefDoc=https%3A%2F%2Fwww%2Eteiss%2Eco%2Euk%2Fevents%2Fseizing%2Dthe%2Dbreach%2Dhow%2Dcan%2Dbusinesses%2Duse%2Ddata%2Dvisibility%2Dto%2Dimprove%2Dto%2Dcyber%2Dbreach%2Dresponses
<form action="https://www.teiss.co.uk/login?RefDoc=https%3A%2F%2Fwww%2Eteiss%2Eco%2Euk%2Fevents%2Fseizing%2Dthe%2Dbreach%2Dhow%2Dcan%2Dbusinesses%2Duse%2Ddata%2Dvisibility%2Dto%2Dimprove%2Dto%2Dcyber%2Dbreach%2Dresponses" name="deLogin" id="deLogin"
method="post" enctype="application/x-www-form-urlencoded" class="ao-loginde-vertical" data-dccode="2225"><input type="hidden" name="formID" value="aoLogin"><input type="hidden" name="Age_25_3_2022" value="">
<div class="ao-loginde-email aos-MBXS"><input tabindex="2" type="text" name="email" class="aos-DS19-FField aos-W100" id="Email2225" maxlength="150" placeholder="Email"></div>
<div class="ao-loginde-password aos-MBXS"><input tabindex="3" type="password" name="password" class="aos-DS19-FField aos-W100" id="Password2225" maxlength="150" placeholder="Password"></div>
<div class="aos-Check aos-DS19-N aos-FL aos-W100 aos-MT5px aos-MB15px"><input type="checkbox" name="RememberLogin" id="aoLogin-RememberLogin" value="1" checked="checked" class="aos-DS19-FField" data-label="Remember Login"><label
for="aoLogin-RememberLogin" class="aoInputLabel"></label>Remember Login</div>
<div class="ao-loginde-submit"><input class="aos-DS19-FButton aos-W100 aoLoginButton2225" tabindex="4" type="submit" value="Login"></div>
<div class="aos-FL aos-W100 aos-MTXS aos-TAC aos-DS19-N ao-loginde-bottomlinks"><a class="aos-NS" href="https://www.teiss.co.uk/registration">Register</a><span
class="aos-MLR5px aos-NS">|</span><a class="aos-NS" href="https://www.teiss.co.uk/password-reset">Reset Password</a></div>
</form>
Text Content
ao link News Artificial Intelligence Cloud Security Cyber Crime Cyber Risk Management Cyber Threat Intelligence Cyber Threats Data Protection Privacy Ransomware Security Culture Technology 5G Artificial Intelligence Authentication SafetyTech Zero Trust Security Threats Application Security Cloud Security Cyber Crime Cyber Threat Intelligence Cyber Threats Email Security End-point Security Insider Threat Ransomware Social Engineering Supply Chain Security Leadership & Management CISO Role Communication Cyber Insurance Cyber Risk Management GDPR Incident Response Legal Security Metrics SOC Leadership Culture & People Cyber Resilience Cyber Skills Gap Data Loss Prevention Data Protection Diversity & Inclusion Hybrid Working Mental Health Privacy Recruitment & Retention Security Awareness Security Culture Shadow IT Events teissTalk Upcoming Episodes On-Demand Episodes Hosts Speakers Sponsors White Papers Search Teiss Search Remember Login Register|Reset Password Remember Login Register|Reset Password News Artificial Intelligence Cloud Security Cyber Crime Cyber Risk Management Cyber Threat Intelligence Cyber Threats Data Protection Privacy Ransomware Security Culture Technology 5G Artificial Intelligence Authentication SafetyTech Zero Trust Security Threats Application Security Cloud Security Cyber Crime Cyber Threat Intelligence Cyber Threats Email Security End-point Security Insider Threat Ransomware Social Engineering Supply Chain Security Leadership & Management CISO Role Communication Cyber Insurance Cyber Risk Management GDPR Incident Response Legal Security Metrics SOC Leadership Culture & People Cyber Resilience Cyber Skills Gap Data Loss Prevention Data Protection Diversity & Inclusion Hybrid Working Mental Health Privacy Recruitment & Retention Security Awareness Security Culture Shadow IT Events teissTalk Upcoming Episodes On-Demand Episodes Hosts Speakers Sponsors White Papers SEIZING THE BREACH: HOW CAN BUSINESSES USE DATA VISIBILITY TO IMPROVE CYBER BREACH RESPONSES? Thursday, 19 May 2022 08:00 - 10:30 GMT The Goring, London * Overview * Sign Up With increased working from home, cyber-security is evolving. Remote workers need easy access to corporate data. But at the same time, that data needs to be protected from cyber-attacks. Businesses are increasingly asking: how can we keep our data secure, wherever it is? And if our distributed data is attacked, how can we minimise the effects of breaches when they happen? Most large businesses have already invested significantly in developing robust IT networks. However, technology will be ineffective without strong security processes that identify what corporate data is being held, how valuable it is, and where and how it is being processed. You can’t protect what you can’t see. And without understanding the nature of your data, and what is happening to it, you can’t respond effectively to security incidents. The key to strong information security lies not only in technology but also in having processes that can uncover corporate data and the way it is being processed. The problem here though is that organisations are processing massive quantities of data. Data visibility is important. However, making the best use of it is a challenge. With such vast data sets you have no choice but to automate. But what do you automate and what requires human intervention? When should you use human brains for human problems, and when should you rely on machines? These are significant questions. So join us in this discussion of how to achieve data visibility and how to use it to optimise breach responses. The questions we will explore During the meeting we will focus on topics such as: * Why is it important to assume a breach will happen? * How do you plan for a breach, and how do you learn from the experience of previous incidents? * How can you make the most of the security data you have and find the gold in this data so you can take useful action? * How should you define the outcomes you want to see from cyber security-technology? * What do you need to do to transform your threat detection into an effective response? * When should automation in cyber security be used and what is the role of humans in threat detection and response? Who is invited? This breakfast meeting is designed for senior information security decision makers in private sector companies who wish to discuss optimising breach responses. Delegates will be employed as senior information security roles (such as CISO, Head of IT security, Head of information security) in large (1000+ employees) companies across the private sector. Be one of 10 senior cyber security professionals around our breakfast table at the Goring Hotel in central London. For any enquiries, please contact Mergim Begolli on 0208 349 4363 or email m.begolli@business-reporter.co.uk The breakfast briefing is brought to you by Exabeam and is only for senior executives as mentioned above. Registrations of junior professionals, consultants, solution providers or other sellers to this market won’t be accepted. To be eligible you must be employed by a corporate legal entity such as a private company: if you are a sole trader or in a partnership other than a legally incorporated partnership, we will be unable to offer you a place. This breakfast briefing is free of charge to attend. When you register, we will ask you for your corporate email address which we will share only with the event sponsor(s). See our privacy policy. Mergim Begolli m.begolli@business-reporter.co.uk https://teiss.co.uk/ Add to Calendar 23-29 HENDON LANE, LONDON, N3 1RT 23-29 HENDON LANE, LONDON, N3 1RT 020 8349 4363 PRESS@TEISS.CO.UK GDPR Requests Cookie Policy Contact Us Terms of Business Media Kit Breakfast Briefing Media Kit Privacy Policy Terms and Conditions Topic List © 2022, Lyonsdown Limited. teiss® is a registered trademark of Lyonsdown Ltd. VAT registration number: 830519543 We use cookies so we can provide you with the best online experience. By continuing to browse this site you are agreeing to our use of cookies. Click on the banner to find out more. Cookie Settings Recommended Settings PRIVACY PREFERENCES Your Privacy Strictly Necessary Cookies Performance Cookies What are Cookies? Cookies are tiny text files that are placed on your computer, mobile phone, or other device, and help provide you with the best experience we can. They are used by most websites to help personalise your web experience. Some features will not function if you do not allow cookies. Our cookies help us: * Make our website work as you'd expect * Save you having to login every time you visit the site * Remember your settings during and between visits * Improve the speed/security of the site * Allow you to share pages with social networks e.g. Twitter * Continuously improve our website for you Granting us permission to use cookies If the settings on your software that you are using to view this website (your browser) are adjusted to accept cookies we take this, and your continued use of our website, to mean that you are fine with this. Should you wish to remove or not use cookies from our site you can remove them, however doing so will likely mean that our site will not work as you would expect. For more information about cookies, please see allaboutcookies.org. Strictly Necessary Cookies Strictly necessary cookies are essential in helping you to move around our website and use its features, such as accessing secure areas of the website and shopping. These cookies don't gather any personally identifiable information about you that could be used for marketing or remembering where you've been on the internet. We use these Strictly Necessary cookies to: * Remember things like information you've entered on order forms when you navigate to different pages in a single web browser session * Identifying you as being signed in and keeping you logged in throughout your visit so that you don't need to sign in each and every time you visit. Using our site indicates that you accept the use of 'Strictly Necessary' cookies. Accepting these cookies is a condition of using the website, so if you prevent them we cannot guarantee how our site will perform for you. Here is a list of the cookies we have defined as ’Strictly Necessary’ Host: teiss.co.uk Cookie names: JSESSIONID Purpose: To keep track of user sessions on the site and identify your user session. Host: teiss.co.uk Cookie name: AFFINO_x, AFFINO_xHTTPS, AFFINOLIVE_x Purpose: Each user profile has a number replacing x. Cookies Used Always Active JSESSION VISITOR VISITORLOGIN USER USERSECURE AWSELB Cookies Used Always Active JSESSION -------------------------------------------------------------------------------- VISITOR -------------------------------------------------------------------------------- VISITORLOGIN -------------------------------------------------------------------------------- USER -------------------------------------------------------------------------------- USERSECURE -------------------------------------------------------------------------------- AWSELB Performance Cookies (analytical) 'Performance' cookies collect information about how you use our website e.g. which pages you visit, and if you experience any errors. These cookies don't collect any information that could identify you - all the information collected is anonymous and is only used to help us improve how our website works. Some examples of how we do this include: * Provide statistics on how our website is used * See how effective our adverts are (we don't use this information to target adverts to you when you visit other websites) * Provide feedback to partners that one of our visitors also visited their website. This can include details of any products bought. This lets our partners improve their website, but we don't allow our partners to reuse this information for further advertising * Help us improve the website by measuring any errors that occur Accepting these cookies is strongly recommended, so if you prevent them, we cannot guarantee how our site will perform for you. Here is a list of the cookies we have defined as ’Performance’. Hosts: audit.affino.com Cookie names: cookie.ao3pcba Purpose: Identify anonymously whether or not users are blocking third party cookies and the platform they are using. No personal information is captured and the cookie only has a 24 hour lifespan. We also sometimes use Hotjar which will drop a cookie too. This allows us to see how users interact with our website so we can optimise it. Google Analytics and Google Tag Manger are on our site and will also drop a cookie. This does not give us any personally identifiable information but does allows us to optimise the website for your use. Cookies Used Google Analytics -------------------------------------------------------------------------------- Google Tag Manager Recommended Settings Save Settings