{"id":1742,"date":"2016-02-12T14:32:16","date_gmt":"2016-02-12T14:32:16","guid":{"rendered":"http:\/\/blogs.sqa.org.uk\/computing\/?p=1742"},"modified":"2021-05-25T11:18:15","modified_gmt":"2021-05-25T10:18:15","slug":"cyber-security-conference-2016","status":"publish","type":"post","link":"https:\/\/blogs.sqa.org.uk\/computing\/cyber-security-conference-2016\/","title":{"rendered":"Cyber Security Conference 2016"},"content":{"rendered":"<p>I attended the Scottish Government&#8217;s <a href=\"http:\/\/cybersecurity.holyrood.com\/about-the-event\">Cyber Security 2016 <\/a>Conference yesterday, which held in <a href=\"http:\/\/www.dynamicearth.co.uk\/\">Dynamic Earth<\/a>. The event was attended by experts in cyber security from across Scotland, the UK, and the rest of the world. The <a href=\"http:\/\/cybersecurity.holyrood.com\/agenda\">agenda\u00a0<\/a>sounded interesting,\u00a0and the presentations were as good as the agenda implied. The <a href=\"http:\/\/cybersecurity.holyrood.com\/people\">speakers <\/a>were fascinating and included the Director of Cyber Security for the Scottish Government and the Head of Cyber Security for KPMG.<\/p>\n<a href=\"http:\/\/blogs.sqa.org.uk\/computing\/wp-content\/uploads\/sites\/5\/20160211_134627.jpg\" rel=\"attachment wp-att-1743\"><img loading=\"lazy\" class=\"aligncenter wp-image-1743\" src=\"http:\/\/blogs.sqa.org.uk\/computing\/wp-content\/uploads\/sites\/5\/20160211_134627-300x169.jpg\" alt=\"Cyber Security Conference 2016 lecture with delegates viewing presentation screen\" width=\"474\" height=\"267\" srcset=\"https:\/\/blogs.sqa.org.uk\/computing\/wp-content\/uploads\/sites\/5\/20160211_134627-300x169.jpg 300w, https:\/\/blogs.sqa.org.uk\/computing\/wp-content\/uploads\/sites\/5\/20160211_134627-768x432.jpg 768w, https:\/\/blogs.sqa.org.uk\/computing\/wp-content\/uploads\/sites\/5\/20160211_134627-1024x576.jpg 1024w, https:\/\/blogs.sqa.org.uk\/computing\/wp-content\/uploads\/sites\/5\/20160211_134627-600x337.jpg 600w, https:\/\/blogs.sqa.org.uk\/computing\/wp-content\/uploads\/sites\/5\/20160211_134627.jpg 1378w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/><\/a>\n<p>My talk was about what education is doing to teach young people about cyber threats, and also what we&#8217;re doing to encourage young people to pursue careers in cyber security.<\/p>\n<p>It seemed to be well received. I sat on the panel at the end of the event and I was surprised at the number of questions directed at\u00a0me (largely from people with no educational background). I think that many attendees were genuinely surprised at the number of qualifications available to school-age learners in cyber security, and weren&#8217;t aware that we&#8217;re the first country in Europe to introduce these into schools.<\/p>\n<p>Please <a href=\"mailto:helen.zhang@sqa.org.uk\">contact Helen<\/a> if you want to know more about online safety or cyber security qualifications.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I attended the Scottish Government&#8217;s Cyber Security 2016 Conference yesterday, which held in Dynamic Earth. The event was attended by experts in cyber security from across Scotland, the UK, and the rest of the world. The agenda\u00a0sounded interesting,\u00a0and the presentations were as good as the agenda implied. The speakers were fascinating and included the Director of Cyber Security for the Scottish Government and the Head of Cyber Security for KPMG. My talk was about what education is doing to teach&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[43,37],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/posts\/1742"}],"collection":[{"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/comments?post=1742"}],"version-history":[{"count":4,"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/posts\/1742\/revisions"}],"predecessor-version":[{"id":3737,"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/posts\/1742\/revisions\/3737"}],"wp:attachment":[{"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/media?parent=1742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/categories?post=1742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/tags?post=1742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}