Thursday 28th September 2017

The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.


A Deep Dive into the Evolution of Malware

What are the latest trends in malware that you need to be aware of? We take a deep dive into the advanced persistent threats, state sponsored attacks, social engineering and ransomware techniques employed by attackers.

Accelerating your Detection and Response

Targeted attacks are a grim reality facing businesses of all sizes – big and small. This session will explore all you need to know about targeted attacks and mitigating the threat to your business.

User Behaviour Analytics – How they can help your organisation

Exploring how user behaviour analytics can help you to respond to insider threats, stolen credentials, and abuse in account privileges.

10 ways to help you remain Data Compliant

Exploring top ways in which your organisation can protect its reputation and avoid punitive fines in order to comply with the EU GDPR that is set to come into force in May 2018.

The Machine Fights Back: AI and the Future of Cyber Defence

Andrew Tsonchev, Director of Cyber Analysis, Darktrace

In this session, we will discuss:

  • How new machine learning and AI algorithms are automating advanced cyber defence
  • Why automated defences augment human security teams
  • How to navigate the challenges of implementing AI in a business environment
  • Real-world examples of unknown threats detected and responded to by Enterprise Immune System technology


Identity: The New Security Perimeter

Identity and Access Management (IAM) allow organisations to implement access control and authentication procedures vital to data leak and data loss prevention. We look at how IAM can help you to identify who a user is, what they are trying to access, when they were authenticated, and optimise user experience while managing risks.

Vulnerability Management: From Assessment to Response

How to support the entire vulnerability management lifecycle from assessment and mitigation to verification and responsiveness.

Sophisticated Cyber Threats and the Failure of Legacy Approaches

Legacy tools around rules, policies and signatures are struggling to keep pace with emerging threats. We look at how machine learning can detect previous unidentified threats and automatically defend your assets and network.

Key Strategies for Upgrading Your Cyber Security Posture

Sophisticated cyber-attacks, breaches and disclosures are becoming the norm. As network speeds increase, data migrates to the cloud, more data is shared and employees bring in their personal devices into the workspace – enterprises must respond by upgrading their security posture to meet the challenges of tomorrow. We explore key strategies that will help your enterprise keep pace with the changing ICT landscape.

Keeping up with the Cyber Criminal

It is clear from the sophisticated tactics and tools utilised by cyber criminals that their abilities have outpaced the ability of InfoSec professionals to address the latest threats. How can your organisation bolster its defences and build resilience? What skills are essential to combating the threat horizon, and how can you capitalise on real-time analysis and data analytics to finesse your ability to detect threats and breaches?