- Is requiring proof of vulnerability assessments or penetration tests sufficient?
- Demonstrating value-for-money in pentesting your key vendors and suppliers
- Developing and updating a risk profile for key vendors and suppliers
Join this teissTalk to answer some of the biggest questions facing the Information Security industry including:
Jenny Radcliffe, also known as “The People Hacker,” is a world renowned Social Engineer, hired to bypass security systems through a no-tech mixture of psychology, con-artistry, cunning and guile.
Jenny is a sought after keynote speaker, panelist and moderator at major conferences and corporate events, both in-person and online, is a TEDX contributor and is host of her own multiple award winning podcast series.
I am a IT Risk and Information and Cyber Security professional. I have worked with clients from a number of industry sectors with a particular focus on financial services, media, retail and business services. I help clients mitigate their information security risks by working with the business to understand and prioritise the information that matters. This is done by conducting interviews and workshops with key stakeholders, which can include anyone from C-suite executives to the data owners. My work also involves applying existing risk assessment and information security standards and frameworks (ISF Standard of Good Practice, ISO 27001 etc.) and using these to develop customised solutions to improve the client’s security posture.
Co-chair. Madrid KnowledgeNet Chapter en IAPP.
Legal background and data protection professional with over 15 years of experience in IT related positions across different sectors, specialised in the operationalisation of Data Protection. CIPP/E IAPP Certification. Extensive experience as in-house lawyer for global IT and telecom companies mainly focused on data protection, IT & commercial and Contract Law, legal Governance and Corporate Compliance.
[s2Member-Login login_redirect=”https://www.teiss.co.uk” /]