Cylance: Leveraging the Power of Prevention

7th August 2017

Several years ago, Cylance embarked on a mission to create a robust security solution that can successfully counter both known and unknown threats.



10 May 2018

The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.


A New Age of Behavioural Analytics: Rapic Threat Detection and Automated Response

Andy Skrei, Senior Solutions Architect, Exabeam

Detecting insider threats quickly whether from ransomware, an external attacker with stolen credentials, or from an employee, remains a challenge for many organisations. However new advances in the area of behaviour analytics and intelligent automation are now rapidly accelerating the detection, investigation and response to threats – far outpacing legacy systems.

This session includes a demonstration covering:

  • User behaviours – the difference between too much data and the right data
  • Pinpointing the real attacker and reducing false positives
  • How to automate incident investigation and response to increase productivity and minimize human errors.


Security Best Practice – Walking the Walk vs. Talking The Talk

Mark Sparshott, Senior Director, Tanium

90-99.9% of the time attackers use Old Day exploits to break into an organisation and then legitimate systems tools to reach and steal data.
So how is this still happening in an age when security best practice is well known and baked into all large organisations policies, standards & playbooks?
It’s because most organisations know what to do but can’t find a way to Walk the Walk in their large, distributed, amorphous and complex IT estate.

Join Tanium to hear the Top 5 Lessons Learned from helping 100+ of the world’s largest organisations see how their security controls actually fared in reality and see a live demonstration of Tanium being used to perform elements of a Hygiene Assessment on 1000+ machines in seconds.

How to use Artificial Intelligence to Reduce Risk by Getting Ahead of the Game

Dr. Anton Grashion, Senior Director Product Marketing, Field Marketing EMEA, Cylance

We will discuss how we are utilising Artificial Intelligence and machine learning in terms of risk reduction. We will discuss how this approach differs from other methods and do a live demonstration of how we can alleviate risks from unknown, freshly minted malware.

10 ways to help you remain Data Compliant

Exploring top ways in which your organisation can protect its reputation and avoid punitive fines in order to comply with the EU GDPR that is set to come into force in May 2018.


How to support the entire vulnerability management lifecycle from assessment and mitigation to verification and responsiveness.


Reducing Network Complexity Challenges for Securing IoT & Cloud Environments to achieve GDPR Compliance

Nilesh Mapara, Solutions Architect, Lumeta Corporation

With expansion into the cloud and supporting IP-Enabled mobile and IoT/ICS infrastructure, security and network teams are learning that increasing network complexity has exposed them to a greater attack surface. While ransomware attacks have had a severe impact on both the reputation and financials of many well-known companies, additional requirements imposed by GDPR compliance is putting significant pressure on IT organizations.

At this session, Lumeta will show you how to eliminate 100% of your blind spots as we find 40% more of your network, cloud and endpoint infrastructure and monitor in REAL-TIME to detect threats across an expanding attack surface.

The Machine Fights Back: AI and the Future of Cyber Defence

Andrew Tsonchev, Director of Cyber Analysis, Darktrace

In this session, we will discuss:

  • How new machine learning and AI algorithms are automating advanced cyber defence
  • Why automated defences augment human security teams
  • How to navigate the challenges of implementing AI in a business environment
  • Real-world examples of unknown threats detected and responded to by Enterprise Immune System technology