• No notifications yet.
  • Sign Out
logo image
  • logo image
Registered User? Login

The community gives you the chance to connect and engage with delegates attending this event.

Access to the community is available for registered attendees only. 

If you have already registered, please join using the link below. To register for the event please follow the 'Register for free' button and summit your details. Please contact ftlive@ft.com with any questions.

Forgot Password?
Sign Up
loader image
New User? Sign Up

The community gives you the chance to connect and engage with delegates attending this event.

Access to the community is available for registered attendees only. 

If you have already registered, please join using the link below. To register for the event please follow the 'Register for free' button and summit your details. Please contact ftlive@ft.com with any questions.

Forgot Password?
Login
loader image
    Protecting critical infrastructure from cyber attacks logo

    Protecting critical infrastructure from cyber attacks

    Where are the vulnerabilities and how can companies and governments co-ordinate defence?
    Tuesday 19 October | 16:00 - 17:00 BJT (GMT+8) | #FTDigitalDialogues
    Watch On Demand

    Presented by
    Partner logo
    In Partnership with
    Partner logo

    0
    DAYS
    0
    HOURS
    0
    MINUTES
    0
    SECONDS

    Chaired by The Financial Times

    The Financial Times partnered with Huawei to present this virtual webinar to discuss the classification of threats, current vulnerabilities and approaches to protecting critical infrastructure from cyber attacks. These issues were looked at from a geopolitical and technical perspective.

    See full overview

    Industry leaders share their insights

    speaker image
    JF
    Jane Frankland
    CEO
    KnewStart
    speaker image
    CM
    Colm Murphy
    Senior Cyber Security Advisor
    Huawei
    speaker image
    WN
    Wendy Ng
    Cloud Security Architect Lead
    OneWeb
    speaker image
    AI
    Alex Irwin-Hunt
    Global Markets Editor
    fDi Intelligence, FT Group

    And unique thoughts

    Who should monitor the integrity of the software and hardware supply chain to identify vulnerabilities across integrated systems?

    Where are the vulnerabilities in the technologies and systems which underpin critical infrastructure? How can threats be mitigated?

    What can be done to ensure that there is a sufficient supply of cyber security experts available to provide adequate defence?

    See the agenda

    Why Attend?

    Understand

    The big picture, not just the individual strands of the business you work in

    Connect

    And build relationships with some of the biggest names in your industry

    Discover

    New approaches and strategies to help win market share

    We’re here to help

    Contact us

    © Financial Times Live

    FT Live and its journalism are subject to a self-regulation regime under the FT Editorial Code of Practice

                    

    LEGAL

    FT Live Website Terms of Use
    Slavery Statement & Policies
    Contact us



    FT Live Delegate Terms & Conditions
    Privacy policy
    Cookie policy

Contact the organizer
Contact the organizer