Please check back often as we add more details.
2013 EuroCACS brochure
View program tracks and workshops below.
Immerse yourself in 3 days of:
Educational sessions — workshops, keynotes, case studies and panel discussions
Networking events — spotlight educational sessions, attendee receptions, workshops and more
Track 5—Forums (Roundtable conversations)
2-Day Workshops, Saturday, 14 September, and Sunday, 15 September, 9.00 - 17.00
1-Day Workshop, Sunday, 15 September, 9.00 - 17.00
2-Day Workshops, Wednesday, 18 September, 13.00 - 17.00, and Thursday, 19 September, 7.30 - 12:00
Is it Cloudy or is it Foggy?
Amar Singh, CRISC
News International Corporation
Singh is a C-level executive leading the Global Information Security landscape with his benchmark-setting approach to securing and protecting organisations. A thought leader who also delivers quick and on-budget results, Singh brings a unique fusion of pragmatism and practicality, with a healthy dose of proportionate paranoia, to his work and is commanding the information security and assurance space with his approach to information security, governance, risk and compliance.
Several companies seek Singh's industry-leading views and comments on all things information security. Publications include: Forrester, Computer Weekly, The Register, TechWeek Europe, Computer Fraud & Security, Quocirca, CIR, TechWorld Computing, SC Magazine, CEO, ICAEW, V3, IT Security Pro, Computer Fraud & Security, and Tech Boson.
Apart from his engaging presentational approach, Singh is also well known for his ability to bridge deeply technical, managerial and leadership skills. His passion on all things information security, risk and compliance has made Singh a sought-after speaker. His opening keynote will cover the most up-to-date concerns pertaining to the world of cloud computing.
The Cybersecurity Shift: What Works, What Doesn't - and the Hidden Silver Linings in the "Cloud" of "Cyber"!
John Meakin, Ph.D
CISO, Head of Security Risk
RBS (Royal Bank of Scotland)
John will highlight the key challenges of the evolving cyber-security threat, emphasising the fundamental changes in approaches to enterprise security that it demands. He will blend his own experience with that of other experts at the conference and beyond to illustrate some of the pitfalls and effective strategies that the new threat environment is teaching us. He will also pick out the positives and for more effective security opportunities that the same experience is slowly revealing. There may be a beam of sunlight out there in the cloud!