The RANT Conference is for senior level Information Security professionals working within an End User environment only. Your registration will be declined if you do not meet this criteria, as per the Terms and Conditions.
The RANT Conference provides a unique platform for the End User Information Security community to discuss and debate real-life, pertinent and controversial industry topics in a range of formats that encourage participation and controversial debate. All RANT Events operate under the Chatham House Rule.
The RANT Conference provides a full day of enlightening and informative presentations and intriguing and interactive panel debates presented by a selection of the industry’s best thought leaders, evangelists and entertaining speakers.
It is a chance to network with like-minded professionals in an informal environment. Guests are encouraged to pitch in with their opinions, views, and suggestions throughout the talks.
RANT prides itself on being a completely sales-free zone and hence it is closed to security vendors and consultancies except for sponsorship.
Please sign up using your work email or contact the organiser if it is your first time at RANT so we can verify you meet our attendance criteria.
Do the Chinese, Russians, or even the Americans, pose the greatest threat to your business? Who are these threat actors and what is their mission? Is the considerable hyperbole by the media and cyber-security vendors justified, and if they are to be believed, what is the most cost-effective and creative way of protecting your business?
A conceptual approach to a new strategic perspective illustrated through the medium of ducks, rabbits and space invaders…
This session will look at tools, techniques and opportunities that can be leveraged to identify signs of compromise. Whether an internal attack from an insider or an advanced penetration from a worthy adversary, the right tools deployed in the right places can create opportunities for detection that normally would be missed.
The field of security intelligence is providing us with new ways to process and explore events and data. But how much of this is useful? How does it enrich our understanding of the threats we face? How can we use these techniques to provide tangible benefits for network defence and systems engineering?
Should we do more to monitor and detect? And why don’t we already? What do you do with intelligence reports (honestly)? Plus, what could we be learning from law enforcement and superheroes? This session will suggest, discuss, debate and extol no brainer tips to turn information into action.
Where do you stand on assaulting the assailant: Good idea, bad idea? Or how about investigative security requests, digging the dirt or undertaking surveillance on a competitor or for a dispute? With powerful skills at our finger tips, just because we can, it doesn’t mean we should. Where and how should we draw the line? Perhaps an ethical code for the profession might help?
Against the clock opinion pieces governed by a gong!
Why are Board reactions sometimes different from what we’d expect?
We all know that there is cyber security skills gap, but it’s bigger than it needs to be! Why? Because HR departments insist on educational profiles and specific qualifications and forget about all the self-taught wizards out there…
An examination of the extent to which cybersecurity ‘gurus’ may be over-dramatising and over-simplifying cyber security risks; and how this behaviour might have long lasting consequences for us all….
Clairvoyance guesswork with a dash of analyst expertise: What to expect in the next 12 months…
With EU breach notification proposals still swimming around in the depths you may well be wondering: Where are they? When will they emerge? And what are they likely to look like when they do? Here we examine the current state of play, what the regulators are thinking and what they might do next…
Imagine a future where we are all stronger together. Where dependencies are mapped, vulnerabilities addressed at macro and micro levels, shared opportunities seized and all available information optimised. InfoSec utopia?
This could be our 2050 but how do we get there? What’s in it for you? Why should we care about this now? And in terms of framework and scope, where on earth do we begin…?
An update on The Analogies Project followed by two different perspectives each shedding light and shade on the same problem…
Education on Cyber Security is limited which is not helping the increasing skills gap. With over 750,000 job gaps in the Cyber Security market by 2017, Jim Wheeler looks at how a small bit of education can go a long way…..
Is too much of your time spent on reporting and not enough on skills development and doing? Do you sometimes feel you’re facing an unwinnable battle (fatigue)? Or maybe you’re a royal orang-utan ‘I’ve reached the top and had to stop and that’s what’s bothering me…’ Whatever your ailment our panel of top InfoSec medics will tackle career conundrums with irreverence considered opinion and cheap humour deep insight.
In true RANT style, join us a for a few drinks at our Pop-up pub provided by CRATE Brewery from Hackney. Enjoy locally brewed beers and ales and good grub!