SOCIAL


LATEST BLOGS


Ransomware – Public Sector Enemy #1

29th September 2017

By J Connolly A report released this week by security firm Barracuda revealed that over 25 per cent of the UK’s local authorities have been […]


GDPR means no hiding place for UK firms

27th September 2017

by Barry Scott, CTO, Centrify EMEA As with most aspects of the EU, unhindered cross-border data flows are something most U.K. firms just take for […]


LATEST TWEETS

SEMINARS

10 May 2018

The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.

SESSIONS

SEMINAR 1
A Deep Dive into the Evolution of Malware

What are the latest trends in malware that you need to be aware of? We take a deep dive into the advanced persistent threats, state sponsored attacks, social engineering and ransomware techniques employed by attackers.

 

SEMINAR 2
Accelerating your Detection and Response

Targeted attacks are a grim reality facing businesses of all sizes – big and small. This session will explore all you need to know about targeted attacks and mitigating the threat to your business.

SEMINAR 3
Utilising User Behaviour Analytics

Exploring how user behaviour analytics can help you to respond to insider threats, stolen credentials, and abuse in account privileges.

SEMINAR 4
10 ways to help you remain Data Compliant

Exploring top ways in which your organisation can protect its reputation and avoid punitive fines in order to comply with the EU GDPR that is set to come into force in May 2018.

SEMINAR 5
Securing your Cloud Assets

The first step to minimise and mitigate risk in the cloud is to identify the top security threats. This seminar walks you through the top security vectors you need to be mindful of as you cloudify your data assets.

SEMINAR 6
Securing your Cloud Assets

The first step to minimise and mitigate risk in the cloud is to identify the top security threats. This seminar walks you through the top security vectors you need to be mindful of as you cloudify your data assets.

SEMINAR 7
Identity: The New Security Perimeter

Identity and Access Management (IAM) allow organisations to implement access control and authentication procedures vital to data leak and data loss prevention. We look at how IAM can help you to identify who a user is, what they are trying to access, when they were authenticated, and optimise user experience while managing risks.

SEMINAR 8
How to Use AI to Reduce Your Attack Surface

Machine learning and AI can be used to reduced risk and the attack surface. We discuss applications of the latest state-of-the-art technologies and how they can anticipate and alleviate risks. We cover:

  • How new machine learning and AI algorithms are automating advanced cyber defence
  • Why automated defences augment human security teams
  • How to navigate the challenges of implementing AI in a business environment
SEMINAR 9
Sophisticated Cyber Threats and the Failure of Legacy Approaches

Legacy tools around rules, policies and signatures are struggling to keep pace with emerging threats. We look at how machine learning can detect previous unidentified threats and automatically defend your assets and network.

SEMINAR 10
Key Strategies for Upgrading Your Cyber Security Posture

Sophisticated cyber-attacks, breaches and disclosures are becoming the norm. As network speeds increase, data migrates to the cloud, more data is shared and employees bring in their personal devices into the workspace – enterprises must respond by upgrading their security posture to meet the challenges of tomorrow. We explore key strategies that will help your enterprise keep pace with the changing ICT landscape.

SEMINAR 11
Keeping up with the Cyber Criminal

It is clear from the sophisticated tactics and tools utilised by cyber criminals that their abilities have outpaced the ability of InfoSec professionals to address the latest threats. How can your organisation bolster its defences and build resilience? What skills are essential to combating the threat horizon, and how can you capitalise on real-time analysis and data analytics to finesse your ability to detect threats and breaches?