• Live Webcast

    Security: New Challenges, New Solutions

  • Thursday 21st July, 10am UK Time

    Cyber threats are constantly evolving and the regulatory regime is getting tougher. At the same time business systems integration adds new levels of complexity and potential vulnerability.

    With IT departments trying to drive down day-to-day running costs to free resources for business development, the cost of keeping the enterprise secure is an unwelcome tax innovation.

    Join this webcast to hear about the new threat landscape, the challenges it poses and new cost-effective solutions.

  • dell

Key Takeaways

What you will get from this webcast

  • Find out the latest security threats and how to overcome them.
  • Negotiate the complexity and vulnerability created by increased business system integration
  • Learn how to keep your enterprise secure
  • Hear about cost effective security solutions to protect your business


Mike Simons, Editor, ComputerworldUK
Mike is the Editor of ComputerWorldUK, joining IDG from Reed in 2006, where he worked on Computer Weekly and ComputerWeekly.com since 1999. He was News editor at the launch of ComputerWeekly.com in 2001 and news editor of a combined Computer Weekly and ComputerWeekly.com operation from 2003. Mike helped Computer Weekly secure the Periodical Publishers Association awards as either "magazine of the year" or "campaigning magazine of the year" for four years out of five. Mike joined IDG as launch editor of ComputerworldUK and has recently also taken over responsibility as editor of sister site Techworld. Mike also sits on the SAP Global Quality Awards judging panel.

Don Smith - VP Engineering and Technology (Dell)
Don has worked in the IT industry for 18 years, starting his IT career with the ground breaking Edinburgh University spin-off, Vision Group. After a successful flotation Vision was acquired by STMicroelectronics where ultimately Don became responsible for security architecture and operations for this $8billion enterprise. During his time at ST in Geneva, Don also worked on successfully integrating 14 acquisitions across 26 sites on three continents.
Don joined dns on returning to Scotland in 2005 and was instrumental in the construction of the dns identity management practice and the evolution of the dnsMSS service portfolio. Don is regarded as an expert in the field of Identity and Access Management.
After SecureWorks' acquisition of dns, Don focuses on bringing SecureWorks threat intelligence and security messages to European clients as well as continuing to provide leadership across the varied technologies and application areas represented by the IAM umbrella.

Andrew Bays, Sr. Consulting Systems Engineer - Juniper Networks
Andrew works with a cross section of organisations and individuals to provide innovative solutions to technical challenges.
He works with a wide variety of technology including but not exclusively firewalls, secure routers, IPS, SSL VPN, IPSEC VPN, NAC/UAC, switches, routers, AAA services, management and visibility products to complement existing technologies or provide evolution to better business utilisation of technology. He provides expansive solutions with a forward looking approach that considers tactical and strategic objectives with an awareness of project timescales and demands.
His experience extends into many verticals including finance, petrochemicals, insurance, Utilities (CPNI) and Public Sector across solution sets including compliance, data centre design, operations effectiveness and efficiency, security risk reduction, secure connectivity, mobility and e-commerce.
His latest role of Sr. Consulting Systems Engineer for Juniper Networks augments roles within Technical Architecture, Operations Architecture and Senior Consultancy in end-user, reseller and vendor organisations. His role is to work with customers and partners to achieve mutual success in projects and sales opportunities. Andrew engages at CxO levels in organisations as required to map business objectives with capabilities Juniper can offer, the core objective of these capabilities is secure, mitigated risk, reliable and highly available services to support business applications using underlying network services.

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
* *