SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Security Leadership Academy

A unique one day ISSA Master Class for Corporate Executives, Security
Professionals and Business Leaders – Learn ways to protect yourself, your
family, your livelihood and your business from organised crime – This is
information that every business leader must know!

Executive Insights into the Mindset of the Cyber
Criminal & How to Protect Your Organisation.
Date: July 11, 2012 – 9am registration – 9:30 Start to 17:30 End
Venue: London, UK
Trainers: Ira Winkler and Samantha Manke
Cost : ISSA Members £195, Non Members £395
Who should attend: Corporate Executives, Directors and Senior Managers
across all organisational functions.
(Places are strictly limited to first come first served and open to both members and non-members of the ISSA)



Ira Winkler has been dubbed "A Modern Day                                     reveals his security secrets, disclosing how companies
James Bond" by CNN and other media outlets for                                and individuals can protect themselves from even the
his ability to simulate espionage attacks against
                                                                              most diabolical criminals. He goes into the mindset of
many of the top companies in the world, showing
                                                                              everyone from small-time hackers to foreign
how billions of pounds can disappear. Author of                               Intelligence agencies to disclose cost-effective
‘Spies Among Us’ a unique book packed with                                    countermeasures for all types of attacks. Ira is an
riveting, true stories and case studies of how he                             internationally recognised expert in the world of
does it-and how you and your firm can avoid                                   information and cyber security and is well known for his
falling victim to the spies among us.                                         Social engineering penetration tests for global brand


  Author of ‘Spies Among Us’ Ira
    Winkler reveals the secret
   world of the Cyber Criminal
    and how they extract over
   £250Billion a year from their
             illicit craft
Corporations lose in excess of £250billion a year to
hacking, cracking, physical security breaches, and other
criminal activity. Millions of people a year have their
identities stolen or fall victim to other scams. On this
one day only ISSA Master Class, Ira Winkler personally


You can join ISSA UK by going to the following URL: http://www.issa.org/Join.html                                               V3.0
Security Leadership Academy
leaders and Fortune 500 organisations. He, along with              organisations from the ever increasing threat from
his business partners, help organisations defend their             sophisticated cyber crime.
business assets, intellectual capital and trade secrets
through the implementation of security awareness                   This Master Class will be delivered by Ira Winkler and
programmes and leading edge risk and vulnerability                 Samantha Manke. Ms. Manke is a security analyst at
mitigation strategies.                                             The Toro Company, where she created a security
                                                                   awareness programme that has been highly praised by
This ISSA Executive Master Class provides a unique                 security professionals across industry. Ms. Manke has
opportunity for UK corporate executives, practice                  conducted a comprehensive research study of the
leaders and security professionals to learn the                    security awareness efforts and effectiveness of major
techniques and insights of a master security                       international organisations, Samantha will share the
practitioner and to leave with the knowledge to create,            results of this research for the first time in the UK and
implement, and manage a security awareness                         will cover the benefits of specific awareness measures
programme as well as protect themselves and their                  as well as providing delegates with a three month
                                                                   security awareness implementation plan.



Secure your place today, be one of first 15 to sign up and receive a FREE signed copy of Ira’s book – ‘Spies Among Us’.

For more information please contact Mike Loginov – Director for the ISSA UK Security Leadership Academy on
M: +44 (0)7785238251 or e: mike.loginov@issa-uk.org - To secure your place on the programme today please contact Sophie
Wingrove e: sophie.wingrove@issa-uk.org




You can join ISSA UK by going to the following URL: http://www.issa.org/Join.html                                      V3.0

Contenu connexe

Tendances

Exploits in the Cryptocurrency Craze: What You Must Know to Protect Your Orga...
Exploits in the Cryptocurrency Craze: What You Must Know to Protect Your Orga...Exploits in the Cryptocurrency Craze: What You Must Know to Protect Your Orga...
Exploits in the Cryptocurrency Craze: What You Must Know to Protect Your Orga...Digital Transformation EXPO Event Series
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochureAndy Kim
 
Tadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareTadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareDomen Savič
 
Risq mark bullen - juniper (11-16-16)
Risq   mark bullen - juniper (11-16-16)Risq   mark bullen - juniper (11-16-16)
Risq mark bullen - juniper (11-16-16)ColloqueRISQ
 
Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information David Santiago
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or notebuc
 
Welcome to Micron Associates News Documentary Website
Welcome to Micron Associates News Documentary WebsiteWelcome to Micron Associates News Documentary Website
Welcome to Micron Associates News Documentary WebsiteErick Moose
 
7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber ThreatsAaron Vick
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30minKim Aarenstrup
 
Scare Ware From Ireland
Scare Ware From IrelandScare Ware From Ireland
Scare Ware From IrelandBrian Honan
 
What are the top 10 web security risks?
What are the top 10 web security risks?What are the top 10 web security risks?
What are the top 10 web security risks?Jacklin Berry
 

Tendances (15)

Exploits in the Cryptocurrency Craze: What You Must Know to Protect Your Orga...
Exploits in the Cryptocurrency Craze: What You Must Know to Protect Your Orga...Exploits in the Cryptocurrency Craze: What You Must Know to Protect Your Orga...
Exploits in the Cryptocurrency Craze: What You Must Know to Protect Your Orga...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
 
Tadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareTadej Hren: IOT Ransomware
Tadej Hren: IOT Ransomware
 
Controversy and crisis management
Controversy and crisis managementControversy and crisis management
Controversy and crisis management
 
Risq mark bullen - juniper (11-16-16)
Risq   mark bullen - juniper (11-16-16)Risq   mark bullen - juniper (11-16-16)
Risq mark bullen - juniper (11-16-16)
 
Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
 
Welcome to Micron Associates News Documentary Website
Welcome to Micron Associates News Documentary WebsiteWelcome to Micron Associates News Documentary Website
Welcome to Micron Associates News Documentary Website
 
7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats
 
Cost of Cyber Crime UK Data
Cost of Cyber Crime UK DataCost of Cyber Crime UK Data
Cost of Cyber Crime UK Data
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
 
Cybersec
CybersecCybersec
Cybersec
 
Scare Ware From Ireland
Scare Ware From IrelandScare Ware From Ireland
Scare Ware From Ireland
 
What are the top 10 web security risks?
What are the top 10 web security risks?What are the top 10 web security risks?
What are the top 10 web security risks?
 

Similaire à 3 Ira Winkler

40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINETopCyberNewsMAGAZINE
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertGareth Niblett
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Cyber Security | Mayur Rele
Cyber Security | Mayur ReleCyber Security | Mayur Rele
Cyber Security | Mayur ReleMayur Rele
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...IJNSA Journal
 
Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016ITnation Luxembourg
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfChinatu Uzuegbu
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber securitySlamet Ar Rokhim
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...IJNSA Journal
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Assignment Help
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 

Similaire à 3 Ira Winkler (20)

40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay Alert
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Cyber Security | Mayur Rele
Cyber Security | Mayur ReleCyber Security | Mayur Rele
Cyber Security | Mayur Rele
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 

3 Ira Winkler

  • 1. Security Leadership Academy A unique one day ISSA Master Class for Corporate Executives, Security Professionals and Business Leaders – Learn ways to protect yourself, your family, your livelihood and your business from organised crime – This is information that every business leader must know! Executive Insights into the Mindset of the Cyber Criminal & How to Protect Your Organisation. Date: July 11, 2012 – 9am registration – 9:30 Start to 17:30 End Venue: London, UK Trainers: Ira Winkler and Samantha Manke Cost : ISSA Members £195, Non Members £395 Who should attend: Corporate Executives, Directors and Senior Managers across all organisational functions. (Places are strictly limited to first come first served and open to both members and non-members of the ISSA) Ira Winkler has been dubbed "A Modern Day reveals his security secrets, disclosing how companies James Bond" by CNN and other media outlets for and individuals can protect themselves from even the his ability to simulate espionage attacks against most diabolical criminals. He goes into the mindset of many of the top companies in the world, showing everyone from small-time hackers to foreign how billions of pounds can disappear. Author of Intelligence agencies to disclose cost-effective ‘Spies Among Us’ a unique book packed with countermeasures for all types of attacks. Ira is an riveting, true stories and case studies of how he internationally recognised expert in the world of does it-and how you and your firm can avoid information and cyber security and is well known for his falling victim to the spies among us. Social engineering penetration tests for global brand Author of ‘Spies Among Us’ Ira Winkler reveals the secret world of the Cyber Criminal and how they extract over £250Billion a year from their illicit craft Corporations lose in excess of £250billion a year to hacking, cracking, physical security breaches, and other criminal activity. Millions of people a year have their identities stolen or fall victim to other scams. On this one day only ISSA Master Class, Ira Winkler personally You can join ISSA UK by going to the following URL: http://www.issa.org/Join.html V3.0
  • 2. Security Leadership Academy leaders and Fortune 500 organisations. He, along with organisations from the ever increasing threat from his business partners, help organisations defend their sophisticated cyber crime. business assets, intellectual capital and trade secrets through the implementation of security awareness This Master Class will be delivered by Ira Winkler and programmes and leading edge risk and vulnerability Samantha Manke. Ms. Manke is a security analyst at mitigation strategies. The Toro Company, where she created a security awareness programme that has been highly praised by This ISSA Executive Master Class provides a unique security professionals across industry. Ms. Manke has opportunity for UK corporate executives, practice conducted a comprehensive research study of the leaders and security professionals to learn the security awareness efforts and effectiveness of major techniques and insights of a master security international organisations, Samantha will share the practitioner and to leave with the knowledge to create, results of this research for the first time in the UK and implement, and manage a security awareness will cover the benefits of specific awareness measures programme as well as protect themselves and their as well as providing delegates with a three month security awareness implementation plan. Secure your place today, be one of first 15 to sign up and receive a FREE signed copy of Ira’s book – ‘Spies Among Us’. For more information please contact Mike Loginov – Director for the ISSA UK Security Leadership Academy on M: +44 (0)7785238251 or e: mike.loginov@issa-uk.org - To secure your place on the programme today please contact Sophie Wingrove e: sophie.wingrove@issa-uk.org You can join ISSA UK by going to the following URL: http://www.issa.org/Join.html V3.0