BCS London Office Southampton Street, London, WC1.

Similar documents
May 2017 Amberhawk Training Limited

MEMBERSHIP CAN MAKE THE DIFFERENCE

Ref: British Cupping Society welcome letter

INFORMATION SYSTEMS EXAMINATIONS BOARD

30 September - 3 October 2018* Kempinski Hotel, Mall of the Emirates, Dubai, UAE

In-Vitro Diagnostic Directive (IVDD) and IVDD Technical File Preparation Workshop. 3-4 July 2014 TÜV SÜD

THE 2017 REGULATORY SUMMIT

COURSE LEADING TO THE BCS FOUNDATATION QUALIFICATION IN DATA PROTECTION (3 DAYS)

BCS Professional Certification BCS Professional Certification Subject Access Request Policy Qualifications Subject Access Request Policy July 2016

INFORMATION SYSTEMS EXAMINATIONS BOARD

BCS, The Chartered Institute for IT Candidate Guidelines for Oral Examinations Diploma in Solution Development

Reach your potential. Activate your membership

The forum will cover the key legislative amendments in the Companies (Amendment) Act 2014 and the practical applications and key filing requirements.

Become an IT professional. Achieve a professional IT qualification. Higher Education Qualifications in IT

BCS, The Chartered Institute for IT. Exam Cancellation and Rescheduling Policy. September 2017

NEWS ISSUE # 26

Workshop on Design for Compliance to IEC (3rd Edition) and EMC Standards & Requirements. 14 th - 15 th May 2015 TÜV SÜD

Partnership Information

GENERAL DATA PROTECTION REGULATION WORKSHOP (EDINBURGH, 20 May 2016)

Qualification Specification

Business Advantage Through Structured Skills Development

CFA CHARTER FINANCIAL ANALYST. The time is now to build a better tomorrow. IMA Educational Partner in KSA

Training Opportunities

Qualification Specification

ATTENDEE REGISTRATION POLICY

Workshop description

Configuration, Installation, Commissioning, Troubleshooting, Operation & Maintenance

COURSES LEADING TO THE BCS CERTIFICATE IN INFORMATION SECURITY MANAGEMENT PRINCIPLES (CISMP)

English for International Business Communication. Your survival kit for business interaction

Qualification Specification

Spark Digital Energy Conference and Exhibition Explore the digital technologies transforming the energy sector CONFERENCE AND EXHIBITION

IT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur

Medical Device Seminar Bringing your medical products to United States of America (USA)

COURSES FOR FREEDOM OF INFORMATION PRACTITIONERS (LEADING TO THE BCS FOI PRACTITIONER QUALIFICATION)

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

BCS Advanced International Diploma in Business Analysis

Lesson Guides INTERMEDIATE

BASED INTERNAL AUDITING

1 st Annual Meeting for Abacus Latin America Members

English for International Business Communication

Managing Projects Using PMI s Standards facilitated by: Mr. Andreas Solomou

ISEB Practitioner Certificate in IT Service Management: Specialising in Release and Control

English for International Business Communication

Assessor Training Course BREEAM International

2 nd Annual Conference for Abacus Europe, Middle East & Africa Regional Members

Aston Park Tennis Club. Privacy Policy for Members

Program Management Professionals (PgMP)

Cyprus VAT and direct tax update course

A BRIGHTER FUTURE FOR DIGITAL IT APPRENTICESHIPS. Apprenticeship End-Point-Assessment for Training Providers

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

DLB Privacy Policy. Why we require your information

Hello and welcome to the UAA abstract submission system!

Invitation to Exhibit

Working with investment professionals

BCS Higher Education Qualifications. Diploma in IT. Professional Project Syllabus

Qualification Specification

Instructions for Exam Entry May 2012

PREREG - Autscape Non residential Full Day Programme (including evening) Registration Form

BCS Professional Certification Group Operations Fraudulent Activity Policy Fraudulent Activity and Plagiarism Policy April 2016 March 2018

Julie Gascon Assistant Commissioner Canadian Coast Guard Mikå Mered Managing Partner POLARISK Group Lonnie Kishiyama

NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018

Qualification Specification for the Knowledge Modules that form part of the BCS Level 4 Software Developer Apprenticeship

CMI QUALIFICATIONS IN MANAGEMENT & LEADERSHIP (LEVEL 3, 5 AND 7)

Professional certification from BCS, The Chartered Institute for IT. bcs.org/certification

Oil & Gas Industry Quality Management System Auditor/ Lead Auditor Training

ASSOCIATE PROFESSIONAL RISK MANAGER (APRM) Examination Preparatory Programme. Leading Excellence in Banking

Information and Rules for Candidates taking IFE Examinations in March 2019

Adelaide Fringe is committed to protecting the privacy of its artists, employees, prospective employees, venues and the general public.

Specific Terms & Conditions 22nd Annual Conference of Rehabilitation in Multiple Sclerosis VZW, 4 6 May 2017, Barcelona

MRS Certified Member Application Form

DSDM Trainer-Coach Candidate Guidelines Version Jan-16. I help others to do it right

International Arbitration Workshops and Award Writing Examination

OSM Participant Registration Instructions

TÜV Rheinland Functional Safety Program

Syllabus: AIT Information Systems Infrastructure Lifecycle Management

Level 4 Certificate in Trade Finance Compliance (CTFC)

WHAT YOU NEED TO KNOW ABOUT PRESENTING AT THE ABA SECTION OF DISPUTE RESOLUTION 2014 SPRING CONFERENCE

OPIS CONFERENCES FAQs

- Information that you provide by filling in a hard copy form and return to us, e.g. at one of our events;

OPIS CONFERENCES FAQs

BODY CORPORATE REGISTRATION Application form

Master of Accounting (CPA Program)* Master of Advanced Professional Accounting

4th Annual conference & workshop

MASTER DRIVER CPC CONSORTIUM APPLICATION PACK

GROUP REGISTRATION CONTRACT

2017 Organized Panel Proposal

Program Management Professionals (PgMP)

training State of the art E-Learning Convenient online E-Books Brand new Study Guides and Mock Assessments Choose between Classroom or Self-Study

raining Meeting your training needs and CPE requirements opportunities April-June Group-Live Course Group Internet- Based Course

COBIT 5 Foundation Workshop

Training Workshop Society of Maintenance & Reliability Professionals (SMRP) Body of Knowledge by GSMP

2016 National Leadership Conference Registration Instructions

ASH Group Information and FAQ's

BCS Professional Certification

African Theatre Association (AfTA) PRIVACY POLICY

DELEGATE INFORMATION PACK 2019

Lesson Guides PRE-INTERMEDIATE

EY Training. Project Management Professional PMP. Exam preparatory course. 30 September 4 October 2018

Hallmark Solutions Limited PRIVACY NOTICE

Fellowship exams. Candidate handbook. Healthy Profession. Healthy Australia.

Transcription:

The British Computer Society Information Security Specialist Group Announce a Seminar Penetration Testing Day Thursday, 16 th July, 2009. BCS London Office Southampton Street, London, WC1. This event will take a close look at Penetration Testing. The objective of the event is to ensure that all ISSG delegates understand the basics of penetration testing. You will not be taught how to conduct Pen Tests but rather delegates will find out all the basics. A number of experienced Pen Test practitioners will give presentations at the seminar. There will be a heavy emphasis on the technical side but the management of Pen Tests will also be covered. Perhaps just as importantly, there will be ample opportunity for questions to the speakers and for networking with other delegates. As a result of feedback from previous events, much more time is being set aside for formal Q&A's as well as informal networking. This event is expected to be very popular and is limited to BCS ISSG members only. Once the places are filled, potential delegates will be placed on a reserve list and allocated places on a first come, first served basis if there are any cancellations. See Page 4 for Reservation details and please act quickly. Any enquiries should be sent by email to issg-admin@bcs.org.uk. Yours sincerely, Ian Fish, BCS-ISSG Membership Secretary Note: Directions to the venue will be sent out with the Joining Instructions.

Provisional Programme Speaker and Topic 09.30 10.00 Registration & Tea/Coffee and networking opportunity. 10.00 10.05 Mike Westmacott BCS-ISSG Committee and event Chair Welcome and Introduction 10.05 11.00 Speaker : John Yeo - Verizon Business 11.00 11.30 Coffee/Tea 11.30 12.30 Title : Getting the Most from your Security Consultancy Synopsis : John will talk about the complete security assessment lifecycle from the consultants perspective. He will discuss where security consultants can and can t help and how to leverage the most value from them. The talk will include where the security assessment and pentesting market is presently, what developments are taking place, and where we actually want to be in the future, sprinkled together with a few anecdotes and war stories from the field. Speaker : Peter Wood, First Base Title : Top Five Security Vulnerabilities Synopsis : Over the past 12 years, Peter Wood has taken part in a hundreds of penetration tests, from both inside and outside organisations. Over this period several themes have emerged - repeating problems which continue to undermine network security in the majority of organisations. Peter will discuss how to find the most common vulnerabilities in corporate networks, using real-world case studies to illustrate his talk. He will cover Windows domains, infrastructure devices and end points, sharing his experience of the configuration errors and misunderstandings that populate organisations networks everywhere. Peter is renowned for his pragmatism, so expect a down-to-earth, no-frills presentation with plenty of practical examples and plain speaking. Leave your prejudices at home! 12.30 13.15 Lunch A buffet lunch will be served. Vegetarian options will be available. 13.15 14.15 Speaker : Matthias Muhlert, Verizon Business Title : The Limitations of Web Application Vulnerability Scanners Synopsis : The presentation will discuss the risks that are associated with companies relying on vulnerability scanners. The business cases for utilizing an automated vulnerability scanner are tempting but to what extend should they be used? and will aim to answer the following questions that should be of interest to network managers, security managers and application leads:

- Are there unforeseen risks to business by over reliance on vulnerability scanners? - What will a scanner miss? - What risks are associated with false positives and false negatives? - What are the limitations of a vulnerability scanner? 14.15 15.15 Speaker : Ian Mann, Senior Systems Consultant - ECSC Title: Social Engineering: Hacking the Human Synopsis: History shows that breaches in information security are often much more than technical IT security failures. You will see fascinating examples of how extensive IT security infrastructure can be easily bypassed with even the most basic Social Engineering techniques. Includes advanced psychological techniques, used by malicious attackers to manipulate your staff into aiding and abetting security breaches. When you leave this presentation you will: Begin to see gaping holes in your own security and how easily someone can bypass your security countermeasures Understand the human limitations of an information security approach based on IT security technology Probably begin to think like a criminal; a good idea if you really want to improve your security. In addition, Ian will outline how you can include social engineering within a penetration testing programme to ensure that you get a full picture of your security vulnerabilities. 15.15 15.45 Coffee/Tea 15.45 16.00 Panel Discussion chaired by Mike Westmacott A Q&A session for delegates to raise any queries, problems or issues with the speakers. Note : Subject to demand and the availability of speakers, the Q&A session may be extended but will conclude no later than 16.30. 16.00 16.05 Mike Westmacott Closing Remarks. Note : This is the planned program for the event but may be subject to change. Prospective delegates should check www.bcs-issg.org.uk/events.html/ for up-to-date information. Any changes will be notified to delegates with the Joining Instructions.

You can register for this event in two ways. First you can register by credit card. This is the quickest way to secure your place at the seminar. Please visit : https://wam.bcs.org/wam/login.aspx?ref=event&id=2003 This is the new secure credit card payment system introduced by the BCS for all its services. This particular URL is specific to the Penetration Testing Day Seminar. Second, you can pay by cheque. If you want to do this, please use the form below on pages 5 and 6. For any further information about this event, visit : www.bcs-issg.org.uk or contact us on : issg-admin@bcs.org.uk Note If you wish to register less than 7 working days before the event, please first contact Rachel Browning on 01793 417444 or email the ISSG Administrator above to express your interest and confirm that space is still available. No registrations can be accepted after 12.00 noon on Friday, 10th July, 2009, in any event. Membership of the ISSG is open to all BCS members regardless of membership grade. To register for ISSG membership, BCS members should log into the BCS members area on <www.bcs.org.uk> and add the ISSG to their specialist group membership details.

BOOKING FORM Cheque Payments only Information Security Specialist Group Penetration Testing Day Thursday, 16 th July 2009 BCS, Southampton Street, London Please complete this form and post to Rachel Browning BCS, 1 st Floor, Block D, North Star House, North Star Avenue, Swindon SN2 1FA Email: Rachel.Browning@hq.bcs.org.uk Enquiries: Tel: +44(0)1793 417416 Delegate Details: Title: First Name: Last Name: Job Title: Organisation Name: (for name badge) Address for Correspondence: Post Code: Is the above address: Work / Home (please delete as applicable) Email: Telephone Contact Number: Is the above email address: Work / Home (please delete as applicable) By agreeing to attend, BCS will use your email or correspondence address to communicate with you regarding the event. Dietary / Special Requirements: Ex-VAT VAT Full Fee BCS Member (please state your membership no in the box below] 115.00 17.25 132.25 *Student 40.00 6.00 46.00 Please state your Membership Number *Please include a copy of your student ID card Total Cost

Payment: Address for VAT receipt (if different from the address on page 1) Personal / Company Cheque I enclose a cheque for the Full Fee. Cheques should be made payable to: The British Computer Society Additional Information Payment must be made in advance in order to confirm your place at the event. We do not issue invoices. A VAT receipted invoice will be sent to the person paying, after payment has been cleared. Please note that that Registration closes at 12.00 noon Friday, 10 th July, 2009. For overseas delegates who wish to attend the event please note that BCS will not issue an invitation letter. Cancellation Policy In the event of cancellation and provided Written Notice (letter or email to Rachel Browning) is received by Friday, 10 th July, 2009, a full refund will be made. In the event of cancellation after this date, we regret that no refund can be given. BCS reserve the right to cancel any event. In this case, the full fee will be refunded. Details of event changes or cancellations are available by phoning +44 (0)1793 417416. Name Substitutions Name substitutions are accepted up to 48 hrs prior to the event by fax or email. Fax: +44 (0)1793 417416 Email: Rachel.Browning@hq.bcs.org.uk Electronic Privacy As a body for IT professionals BCS Group regularly communicates with its interested parties by email. I understand that BCS Group will not pass on my email address to other organisations. Data Protection Act 1998 BCS Group will hold your personal data on its computer database and process it in accordance with the Act. This information may be accessed, viewed and used by the Society for administrative purposes and conducting market research. All of these purposes have been notified to the Commissioner. If you are based outside the European Economic Area (the EEA ), information about you may be transferred outside the EEA in accordance with the requirements of the Act.