Infosecurity Europe 2015

Visit Cisco Booth F120

Join Cisco at Infosecurity Europe 2015, June 2-4, 2015, Olympia, London, United Kingdom

  • Date: Tuesday, June 2 – 
    Thursday, June 4
  • Location: Olympia London
    United Kingdom
  • Duration: Full day
  • Attendance: In Person
▲ Back to Top


Infosecurity Europe 2015

Mark your calendar and visit Cisco at booth F120 at Infosecurity Europe, June 2-4, 2015, Olympia, London, United Kingdom.

Today's threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well funded, and capable of causing major disruptions to organizations and the national infrastructure. Cisco's specific threat-centric and operationalized approach to security reduces complexity and fragmentation while providing unmatched visibility and contextual awareness, consistent control, and advanced threat protection before, during, and after an attack.

Visit Cisco booth F120 and talk with Cisco technical experts about your top-of-mind security challenges that your organization faces today.

We look forward to seeing you in London.

▲ Back to Top

Cisco Speakers

Cisco Speakers

Terry Greer-King

Technology Is Not Enough: Full Security Relies on Processes and People

Terry Greer-King, Director, Cyber Security, Cisco

Date: June 3, 2015
Time: 3:20 p.m. – 3:45 p.m.

The conundrum today is how to empower employees to perform at their best in a digital world while simultaneously protecting the organization from ever more sophisticated, organized, and persistent threats. Many employees are complacent when it comes to security, yet they are in fact a crucial part of the solution. This talk will examine implementing a business process approach to security and how to shift toward a more behavior-centric approach.

Tech Talks sponsored by Cisco

Phil Wood

Minimising the Damage Caused by Malware When Infection is Inevitable

Phil Wood

Date: June 2, 2015
Time: 11:20 a.m. – 11:45 a.m.

Given that infection by malware is an inevitable event, this seminar will examine what organisations can do to lessen the impact of infection upon their organisation. Firstly, there are ways in which detection-based technologies can be used to maximise point-in-time protection, by using cloud-based systems and advanced analytics techniques. However, as we have seen throughout the history of detection innovation, be it signatures, heuristics, sandboxing etc., detection will only take you so far, particularly when it comes to targeted attacks. So this seminar will concentrate on what, for many organisations, if missing from their malware strategy - namely, how do you deal with an infection once it is in place? We will look at Cisco's Advanced Malware Protection (AMP) product and it's use of "Retrospection" to allow security administrators to examine past and current events in light of new intelligence gained from the Cisco Threat Intelligence Cloud. Retrospection is based upon the concept that if you can no longer automatically tell what's malware and what's not with an acceptable degree of accuracy to be relied upon, you must track all file events regardless of the assumed disposition of those files. Once the threat data is updated with new insight, it can then be applied to all previous events to see if there are any matches. This gives the security administrator warning about previously unknown breaches and actionable intelligence with which to inform his or her post breach activities.


Bill McGee

Building Security into Your Data Center DNA

Bill McGee

Date: June 3, 2015
Time: 11:20 a.m. – 11:45 a.m.

Part of the tension between IT and security has been the all-too-often correct perception that security interrupts and slows down business-critical applications and services. Nowhere is this more apparent than in the data center, where complex traffic, customized applications, virtualization, and dynamic resource scalability are essential to the health and success of the organization. In this presentation we will look at five common vulnerabilities that are at the root of most data center breaches, why they happen, and how to rethink the way your organization can weave security into your data center DNA without compromising the way you want to do business.


Leon Ward

Importance of Threat-Centric Security

Leon Ward

Date: June 4, 2015
Time: 11:20 a.m. – 11:45 a.m.

Today's sophisticated attacks have grown in frequency, severity and complexity. Evolving technologies are paving the way for new attack techniques we couldn't have anticipated a few years ago. To truly protect against all possible attack vectors, IT professionals must accept the nature of modern networked environments and devices and start thinking like an attacker. Learn about threat-centric security approaches that protect their environments across the attack continuum - before, during and after an attack.

▲ Back to Top



You can find Cisco at booth F120 in the center of the exhibit hall. Come learn more about how Cisco can help you protect your network infrastructure with Cisco's advanced threat protection solutions, which are integrated, pervasive, continuous, and open. Solutions are available for organizations of any size including small, midsize and large enterprises.

While you explore Cisco's booth, have your badge scanned and be instantly entered for a chance to win a prize and other giveaways.

Control Secure Access with Context: Cisco Identity Services Engine and Cisco ISE Ecosystem Integrations

With Cisco Identity Services Engine (ISE) 1.3, we will demonstrate simplified secure access for bring-your-own-device (BYOD) programs, including integration with Cisco Meraki Systems Manager for MDM.


Threat-Focused Next-Generation Firewall: Cisco ASA with FirePOWER Services

The new Cisco next-generation firewall delivers integrated threat defense across the entire attack continuum before, during, and after an attack. It combines the proven Cisco ASA firewall with industry-leading Sourcefire threat and advanced malware protection.


Limit the Spread of Threats: Cisco TrustSec Segmentation

Cisco TrustSec technology allows administrators to map business assets and functions directly to contextual access policies. These security policies can be used to segment the extended network, enforce resource usage, dynamically manage and simplify security configurations, and eliminate the need for complex network changes.


Edge-to-Core Threat Protection: Cisco FirePOWER Next-Generation IPS

Threat protection across the entire attack continuum: integrated visibility of your network before an attack, industry-best threat protection during an attack, and scoping and remediation after an attack.


Protect Against Blended Attacks and Malware: Cisco Cloud Web Security, Email Security Appliance, and Web Security Appliance

Cisco security solutions for web and email combine comprehensive defense with superior deployment flexibility to address these two major attack vectors. A combination of Cisco Advanced Malware Protection and cognitive-threat analytics provides detection, threat blocking, and remediation.


Advanced Malware Protection: AMP for Networks and Endpoints and Cisco AMP Threat Grid

Cisco Advanced Malware Protection provides protection before, during, and after an attack. Using unified malware analysis, deep threat analytics, continuous monitoring capabilities, and retrospective security, security teams can more quickly detect, track, respond to, and remediate advanced threats in their environments.

▲ Back to Top

Meet with Cisco

Meet Cisco Executives and Experts

Arrange a meeting with Cisco executives and technical experts to get answers to your questions about Cisco Security solutions. To schedule a meeting, contact your local Cisco representative.

▲ Back to Top


Conference Registration

Infosecurity Conference and Exhibition/Europe is self-described as "the largest dedicated IT security forum in Europe." The event heightens awareness of the commercial importance of secure and reliable access to corporate information. The conference is designed to provide insight into the key IT security issues facing organizations today, and the technologies available to address them. Program addresses topics such as network security, firewalls, virus protection, encryption, communications security, access control, and cyber sabotage prevention. Attendees are representatives from the computing and IT industry. Counterpart events held in Belgium, Russia, and the Netherlands.

Be sure not to miss Europe's largest security event. Register here.

▲ Back to Top


Conference Location

Olympia London

Address: Hammersmith Road, Kensington, London W14 8UX, United Kingdom
Telephone: +44 20 7385 1200

Conference Website: