Enterprise Security & Risk Management

19 April 2018

Victoria Park Plaza



New Cryptojacking Attack Hits Thousands of Websites

14th February 2018

By John Connolly Over 4000 sites were compromised this weekend when hackers inserted malicious code that hijacked the processing power of any site visitor’s computer […]

Cyber is Third Most Likely Global Risk

31st January 2018

By J Connolly The World Economic Forum’s Global Risks Report 2018 released this January warns of the increasing likelihood of cyber attacks and their growing […]


Security and Risk Management Professionals across every major business sector

At a glance

Cyber-attacks (and attackers) are becoming more brazen and sophisticated, with serious repercussions for large enterprise organisations. In the first half of 2017, 1.9 billion data records were breached – meaning on average, 122 records were lost or stolen every second.  Building resilience and developing contingency plans to tackle risks is a key focus for organisations as regulatory pressures increase and the imperative to protect vital customer data, intellectual property, trade secrets, business strategies – and, ultimately, market value – hangs in the balance.

The worldwide security market is booming and estimated to grow to $100 billion by 2020 as organisations invest in both technology and skills to enhance their security posture. The ascendancy of disruptive tech trends like machine learning, big data, AI, IoT and more are further enhancing the need for reliable and agile processes that are secure by default. Security practitioners are ever-pressed to understand the deficiencies in current practices, keep pace with emerging trends and catalyse effective responses to evolving threats and attacks.

Join hundreds of leading Infosec, cyber security and risk management professionals at Whitehall Media’s prestigious bi-annual 9th ESRM conference to discuss the latest developments and best practices needed to address the most pressing security risks. The event offers unrivalled networking opportunities and insights on how to design, implement and embed deliverable action plans that balance risk mitigation with the pursuit of business growth.


  • Advanced Threat Protection
  • Artificial Intelligence Vulnerability Detection
  • Asset Inventory and Management
  • Best practice in IT GRC Management
  • Business Continuity
  • BYOD/Mobile Device/App Security
  • Cloud Security – Risks and Rewards
  • Cloud Threat Intelligence
  • Contingency Planning and Business Continuity
  • Creating a Risk-Aware culture
  • Cyber Policing
  • Cyber Risk Assessments
  • Cyber Security Intelligence
  • Data Classification – Identifying sensitive, valuable and critical data
  • Data Confidentiality, Integrity and Secure Auditing
  • Data Loss Prevention
  • Data Management (Ownership/Classification/Protection)
  • Data Transmission Protocols
  • Digital Forensics and e-Discovery
  • Disaster Recovery and Data Recovery
  • Distributed Denial-of-Service Resiliency
  • Database Architecture Security
  • Embedding security into disruptive trends (IoT, blockchain, AI, etc.)
  • Emergency Resource Planning
  • Encryption and Cryptography best practices
  • Endpoint Security, Detection and Response
  • Establishing a Security and Risk Management Strategy
  • Governance, Regulation and Compliance
  • Hardware Security
  • Identity and Access Management (IAM)
  • Incident Management, Containment, Response
  • Information Management, Governance and Protection
  • Insider Threats, Privileged Account Management
  • Legislative changes (including new data protection proposals)
  • Network Security and Monitoring
  • Operational Technology Risks
  • Penetration Testing
  • Privileged Account Management
  • Protecting Critical National Infrastructures
  • Protecting against Phishing and Social Engineering
  • Ransomware and Malware
  • Risk Metrics, Measurements, Strategy
  • Securing e-commerce and online transactions
  • Security information and event management (SIEM)
  • Social Media Risks
  • Supplier Management and Third Party Risk
  • Technical Surveillance Counter Measures
  • Threat Intelligence, Visualisation
  • User awareness of security standards and responsibilities
  • User and Entity Behaviour Analytics
  • Vulnerability Assessment
  • Web security tools and best practice
  • Wireless and Mobile Security

Featured Speakers