
Kate Sweetman
Global Leadership Consultant
Experienced CISO and C-Suite Security executive in multi-national organisations; Founder of (TL)2 Security
Speaker Fee Range: $5,000 - $20,000 USD
Travels From: London, UK
Thom Langford is available for virtual keynotes and webinars. Please complete the form or contact one of our agents to inquire about the fees for virtual engagements. Please note: the fee range listed above is for in-person engagements.
Want to book Thom Langford for your event? Please provide the info below and we’ll get in touch within 24h:
Speaker Fee Range: $5,000 - $20,000 USD
Travels From: London, UK
Thom Langford is available for virtual keynotes and webinars. Please complete the form or contact one of our agents to inquire about the fees for virtual engagements. Please note: the fee range listed above is for in-person engagements.
Speaker Thom Langford is the founder of (TL)2 Security, a strategic Information security Consultancy that focuses on Virtual CISO, strategic business alignment and public speaking/advocacy for hire.
As Chief Information Security Officer of Publicis Groupe, Thom was responsible for all aspects of information security risk and compliance as well as managing the Groupe Information Security Programme. Additionally, the role was responsible for business continuity capabilities across the Groupe’s global operations.
Having successfully built security and IT programmes from the ground up Thom brings an often opinionated and forward-thinking view of security risk, both in assessments and management, but is able to do so with humour and pragmatism (mostly).
An international public speaker and award-winning security blogger, Thom contributes to a number of industry blogs and publications. Thom is also the sole founder of Host Unknown, a loose collective of three infosec luminaries combined to make security education and infotainment films.
Risk is often seen as a dirty word in business. It is a thing that needs to be reduced to nothing, and has no possible good use in an organization, especially a security programme.
This couldn’t be more wrong! Risk is an inherent part of any business, and yet it is often poorly recognized and leveraged in the security organisation. In this presentation Thom will look at three areas of the risk conundrum to open the veil on the elusive art of understanding and ultimately measuring risk.
Increasing cybersecurity threats mean most organisations are looking to grow their cyber & Information Security teams. However, this also means that the existing shortage in qualified, experienced security people is getting worse.
In this session Thom Langford, CISO for Publicis Groupe , will share the approach he has taken to tackle the Security Skills shortage by looking for "passionate people and inspire them", rather than trying to find CVs that tick the appropriate boxes. He will challenge us to look beyond just qualifications & experience and think about the potential of candidates from non-traditional Security backgrounds giving opportunities that benefit both them and the business.
Do you daydream of having this conversation with the cybercriminals that attack your network? If this is you, then make sure you really do have the services (and processes, procedures and policies) to back up that monologue. Ransomware especially is invasive, pervasive, and worst case, destructive; cutting off the attacks before they begin is key.In this talk you will learn:
1.Why ransomware can exploit even the smallest weakness in your security controls.
2.Fundamental approaches to detect and respond to minimise and contain damage.
3.How to take advantage of new services, approaches and attitudes to best curtail any ambitions you have of monologuing like a Hollywood A-lister.
Global Leadership Consultant
Former Formula One Racing Driver
Co-Founder of Starbucks
Actor, Producer, & Entrepreneur
Basic Data Protection Information | |
---|---|
Responsible | AURUM SPEAKERS BUREAU S.L. |
Purpose | Respond to your inquiries and / or requests. Commercial activities |
Rights | Access, rectify and delete the data, as well as other rights, as explained in Additional Information. |
Aditional Information | You may consult the additional and detailed information on Data Protection on the Privacy Policy section. |