ESRM

Enterprise Security & Risk Management

28 November 2017

Victoria Park Plaza

SOCIAL


LATEST BLOGS


Consumer concerns over GDPR should set alarm bells ringing for businesses

21st November 2017

Today, putting the letters ‘GDPR’ into Google will generate over 420,000 news articles, some detailing the expected impact of the regulation, and others casting doubt […]


Why your GDPR compliance strategy must include mobile

17th November 2017

When considering compliance, enterprises must put mobile devices on an even footing with desktops. This is especially true as we race toward May 2018, when […]


LATEST TWEETS

THE UK’S LEADING EVENT FOR INFOSEC, CYBER
Security and Risk Management Professionals across every major business sector

At a glance

The ascendancy of emerging trends like cloud, mobile, big data and IoT are further enhancing the need for reliable and agile processes that are secure by default. Security practitioners are ever-pressed to understand the deficiencies in current practices, keep pace with emerging trends and catalyse effective responses to evolving threats and attacks

Join hundreds of leading Infosec, cyber security and risk management professionals at Whitehall Media’s prestigious bi-annual 8th ESRM conference to discuss the latest developments and best practices needed to address the most pressing security risks. The event offers unrivalled networking opportunities and insights on how to design, implement and embed deliverable action plans that balance risk mitigation with the pursuit of business growth to discuss the latest developments and best practices needed to address the most pressing security risks. The event offers unrivalled networking opportunities and insights on how to design, implement and embed deliverable action plans that balance risk mitigation with the pursuit of business growth.

FEATURED TOPICS

  • Best practice in IT GRC Management
  • BYOD/Mobile Device/App Security
  • Cloud Integration and Security – Risks and Rewards
  • Contingency Planning and Business Continuity
  • Creating a risk-aware culture
  • Cyber policing
  • Cyber Security Intelligence
  • Data confidentiality, integrity and secure auditing
  • Data Loss Prevention
  • Data Management (Ownership/Classification/Protection)
  • Digital Forensics and e-Discovery
  • Disaster Recovery and Data Recovery
  • Embedding security into disruptive trends (IoT, big data, etc.)
  • Encryption, firewall technology, anti-virus, password cracking
  • Establishing a Security and Risk Management Strategy
  • Governance, Regulation and Compliance
  • Hardware Security
  • Identity and Access Management (IAM)
  • Information Management, Governance and Protection
  • Insider Threats, Privileged Account Management
  • Leadership and Management of Security and Risk
  • Legislative changes (including new data privacy proposals)
  • Network Security
  • Operational Technology Risks
  • Penetration Testing
  • Real-time analysis and Analytics tools
  • Risk Metrics, Measurements, Strategy
  • Securing e-commerce and online transactions
  • Security Monitoring and Incident Response
  • Social Media Risks
  • Supplier Management and Third Party Risk
  • Technical Surveillance Counter Measures
  • User awareness of security standards and responsibilities
  • Vulnerability Assessment

Featured Speakers

SPONSORS

cpd-membercpd-certified

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking