September 12, 2022
[44CON Announce] 44CON 2022 is this week!
|IF:MC_PREVIEW_TEXT|
[if !gte mso 9]>|MC_PREVIEW_TEXT|
|
|
Try viewing this email in your browser |
|
|
end header bar
header left
|
|
|
|
|
Wednesday night - We have nothing planned. But people will be meeting in the venue bar. (Chelsea are playing that night and the local pubs are expected to be ‘fun’).
Thursday morning - Registration will start at 9:15; we look forward to seeing you back or for the first time! It has been too long.
...when you arrive you’ll see something different.
Turn left and you will smell coffee.
After the opening you will have the choice of a talk, a workshop, a workshop on the CTF.
Thursday night is packed with things to do and learning and more (food will appear) - another ‘interactive’ talk, a tabletop for groups (and prizes) based on incident management/response and apparently there’s a band that has one track called ‘vulnerability management’. (They played to over 2000 people at Defcon.)
... the venue asked what time the bar would close. We laughed.
Friday morning will kick off at 9:30 with registration from 8:45 with another day of stuff and giveaways in the turbo closing event.
There will be a feedback form. Fill this in for a chance of free entry to next year and other fun prizes.
Get the sponsor form stamped, we give prizes for this as well.
If you think we’ve missed something, please let us know.
We hope you have a safe, FUN time at 44CON 2022.
Check our full programme on Sched.
There are still tickets available but price will go up from Wednesday so grab yours now!
|
|
|
|
|
|
|
|
Our security intelligence and managed services help address challenges around data loss prevention, encryption, access to cloud services, and information risk management.
We have the technology and the intelligence to spot and tackle cyber threats before they become the stuff of headlines.
We monitor and manage customer and BT devices around the clock from 16 accredited global security operations centres, and we protect BT from over 125,000 cyber attacks every month.
We know that a cyber attack can destroy a reputation overnight. We also know that security is the number one digital enabler, allowing a business to run at speed and to build customer trust and investor confidence.
So we’ve built a team of 3000 security experts in 14 global centres.
It’s the same people who protect our business who also protect yours.
This team use unique tools and insight to stay one step ahead of criminal entrepreneurs.
As a global leader of Managed Security Services, we’re helping customers thrive in a digital world, by delivering world-class security solutions. These are underpinned by our professional services support, cloud of clouds strategy and excellent customer service.
|
|
|
|
|
|
|
|
|
|
CheckSec, builders of Canopy and proudly sponsoring 44CON since 2012!
We build Canopy, an end-to-end solution for managing security assessments. Canopy is to security and audit teams, what Salesforce is to sales teams. Canopy gives you the tools for tracking assessments, capturing and triaging results, and reporting as efficiently as possible. Whether you report through traditional documents, want a web-based results delivery platform, or need to integrate data feeds with other systems, Canopy can help you level up your assessment delivery.
We’re helping small boutique security teams, along with some of the largest enterprises that you’ve heard of, to bring efficiency, increase quality and reduce costs across their security assessment and auditing practices.
If you’re new to Canopy, drop by for a demo or send a demo request to support@checksec.com. If you’re already using Canopy, drop by to tell us about your experience
PS: we’re also hiring for senior backend engineering (python),senior front-end engineering (JavaScript/React) and customer support roles. Come talk to us if you would like more information!
|
|
|
|
|
|
|
|
|
Using Attack Trees to Analyse and Manage Risk |
|
|
Join Tony Badsey-Ellis, 2T Security's Head of Risk Management, on this instructor-led practical workshop where you will learn the fundamentals of the RiskTree® approach and the process of efficient, collaborative and concise risk management. This provides a data-driven business-focused way to quickly and effectively assess risk and get results that can be understood throughout an organisation, using our innovative software as part of the process.
2T Security are one of our sponsors at 44CON 2022 and will run this one-day course on 14th September.
|
|
|
|
|
end header left
1/2 right 1
end 1/2 right 1
1/2 left 1
end 1/2 left 1
cta
end cta
headline
end headline
1/1 panel
end 1/1 panel
2/2 content
end 2/2 content
3/3 content
end 3/3 content
2/2 panel
end 2/2 panel
3/3 panel
end 3/3 panel
profile
end profile
contact
end contact
1/2 left 2
end 1/2 left 2
1/2 right 2
end 1/2 right 2
header right
end header right
content right
end content right
content left
end content left
quote
end quote
1/3 left
end 1/3 left
1/3 right
end 1/3 right
1/1 content
end 1/1 content
footer