Print

Print


***** Apologies for cross posting *****

Please see below the BCS event which is open to non-members.

 

Nicholas Cooper
Project & Information Management Strategies

01728 635736

07788446050

Disclaimer:     This email message is confidential to the intended recipient. If you have received it in error, please notify the sender and delete it from your system. Any unauthorised use, disclosure, or copying is not permitted. This email has been checked for viruses, but no liability is accepted for any damage caused by any virus transmitted by this email.
Registered Company No (England): 6887020   Registered VAT No: 970970979 
Registered Address: 3 Manor Courtyard, Hughenden Avenue, High Wycombe, HP13 5RE

 

From: BCS Consultancy SG [mailto:[log in to unmask]]
Sent: 06 March 2017 13:38
To: [log in to unmask]
Subject: Event Information: Introducing the 4D metaphysical Governance Risk and Compliance (GRC) database

 

Introducing the 4D metaphysical Governance Risk and Compliance (GRC) database

 

Date/Time: Tuesday 28 March 2017, 6.30pm - 7.45pm

 

·        6.30pm - Presentation

·        7.45pm - Networking and buffet

 

Venue: BCS, 1st Floor, The Davidson Building, 5 Southampton Street, London, WC2E 7HA | Maps

 

Cost: Free to attend for both BCS Members and non-members.

 

Book here: https://events.bcs.org/book/2446/

 

Speaker: David Lacey

 

Synopsis:

Cyber security has failed. Most security professionals now acknowledge this fact. The key questions are why it has failed, and how it can be fixed; David believes he can answer these questions.

 

In his view, the root cause of the problem lies in the complexity of cyber security, which involves a rich set of enterprise-wide controls, involving many different types and properties of entities. This complex demand can neither be ignored, nor simplified away. It has a finite scope, and, more importantly, is definable, meaning the analysis may be hard, but it can be achieved, given sufficient effort.

 

Traditional approaches to cyber security recognize the complexity of the cyber security problem space. They all fail to manage it correctly, only adding to the problem space, by introducing new terms and structures that further conflate an already overloaded solution space.

 

The solution lies in a fundamental rethink of the structure of GRC; everything within the scope can be defined and understood. Unfortunately, today’s methodologies and systems fail to deliver the solution.

 

David believes he has solved this problem by designing a 4D, pure, metaphysical data model that seamlessly connects controls, questions, threats, vulnerabilities, roles, incidents, assessments, and physical manifestations of objects.

 

This solution is undoubtedly unique, because it exploits unfashionable techniques, rare skills and knowledge, and demands an uncertain amount of effort.  The upper level ontology extends to around 400 entities, and encompasses around 10,000 classes of reference data, based on the most advanced data model patterns currently available.

 

This is only the second public presentation of David’s analysis, approach, and solution. You may challenge his science and claims, but you cannot deny their potential.

 

In the longer term, David believes an appliance can be developed that, with minimal user interaction, can discover every vulnerability in an enterprise, and automatically populate a professional risk assessment and gap analysis against all compliance standards.

 

The implications for DevSecOps are huge, because David’s technology will eventually transform the solution space, overtaking the inefficient and ineffective methods and systems currently deployed.

 

Speaker Profile

David Lacey is a leading researcher, writer and innovator in Cyber Security and IT Governance, with more than 25 years’ experience leading IT Security and Governance functions for organizations such as Shell, Royal Mail and the British Foreign & Commonwealth Office.

 

David has pioneered many new ideas in cyber security. Amongst other things he drafted the original text behind the ISO 27000 family of standards, achieved the world’s first and largest accredited certifications, founded the Jericho Forum, and developed the world’s first fraud detection system based on the human immune system. His latest invention is a 4-dimensionalist, metaphysical database that he believes will revolutionize the cyber security industry.

 


This email and any files transmitted with it have come from and are the property of The British Computer Society a registered charity in England and Wales (number 292786) or any of its group companies including its wholly owned subsidiaries BCS Learning & Development Limited a company registered in England and Wales (number 1005485) and Activ Training Limited, a company registered in England and Wales (number 03123597) and may be privileged, are confidential and intended solely for the use of the intended recipient. No-one else may retain, use, copy, forward, distribute or place any reliance on all or any of it in any form. If received in error, it should be destroyed and not disseminated. Our registered office is 1st Floor, Block D, North Star House, North Star Avenue, Swindon, England SN2 1FA. If you receive this email in error, please contact [log in to unmask]






----------------------------------------------------------
POSTING TO THE LIST
Either 'reply' to the sender or 'reply to all', which will go to the list and the sender. If you want to reply to the list only or the sender only, then please use the 'reply to all' option and choose the appropriate email address. To start a new message, send to [log in to unmask] - where listname is the name of this list.

UNSUBSCRIBE
-----------
To unsubscribe from this list, please use the 'reply to all' option and ensure the list email address is chosen. Please then send the message to the list address with

unsubscribe

in the subject line.
Or, if you are sending from an account other than [log in to unmask], use the subject line
unsubscribe [log in to unmask]

however, please ensure it is sent to the list email address.

To join again, send a message to the list with

join

in the subject line.

HELP
-----------
Only your "default" email address on the BCS membership system will be used in BCS lists.
To change this, go to: https://wam.bcs.org/wam/login.htm

General Guidance - http://www.bcs.org/listserver/outhelp
Email Policy - http://www.bcs.org/policies/email/
Discussion Policy - http://www.bcs.org/policies/discussions/
Other problems - email [log in to unmask]

To view the list archives go to: https://www.jiscmail.ac.uk/cgi-bin/webadmin?A0=RECORDS-MANAGEMENT-UK To unsubscribe from this list, send an email to [log in to unmask] with the words UNSUBSCRIBE RECORDS-MANAGEMENT-UK For any technical queries re JISC please email [log in to unmask] For any content based queries, please email [log in to unmask]