Tuesday 25th April, 2017
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.
Hands-on Security Fundamentals with Tanium
Dylan DeAnda, Senior Director of Technical Account Management, Tanium & Tyler Oliver, Endpoint Detection and Response Director, Tanium
No marketing slides, no sales pitch. Together with our experts, you will hunt for threats in real-life scenarios. Being able to hunt for Indicators of Compromise both known and unknown at speed and scale is imperative. Our experts will illustrate how good security hygiene can improve your security posture significantly. Using your mobile device, you can vote for the threat types we will explore during the
The critical role of DNS for DDoS resilience and how to reduce risk from your online architecture
Matt Torrisi, Solutions Engineer, Oracle + Dyn
One of the most fundamental components of enterprises online connectivity is the Domain Name System (DNS). The critical role of DNS is often overlooked and not fully appreciated by many organisations but with complex and sophisticated distributed denial-of-service (DDoS) attacks increasing in regularity the true importance of DNS has come to light.
In this session you will learn:
- How DDoS attackers have the potential to disable online connectivity via your DNS
- Why enterprise-grade DNS is a critical consideration for the enterprise security architecture
- How to add network resilience and ensure that DNS is not a single point of failure
Why Are We Still Talking About Advanced Evasions?
Olli-Pekka Niemi, Director Network Security Research, Forcepoint
Most organisations have spent the past decade ramping up their response to network security threats, cybercrime and compliance regulations. However, Forcepoint research shows that advanced evasion techniques (AETs) continue to break the security protection model that most organisations are using today.
Through the use of a live demo, this seminar will immediately give you a better grasp of what AETs are, the risks they pose to your data, users and networks, and what you can do about them.
Join this session to:
- Understand how cybercriminals use AETs to bypass common security measures
- See why AETs are the weapons of choice for large attacks
- Assess the risks posed by AETs for your organisation
- Know how to proactively protect yourself from AETs
What you don’t know CAN hurt you – why layered visibility is your best defence
Nima Baiati, GSEC, CCSK, Senior Director, Product Management, Absolute Software
In today’s evolving cybersecurity landscape, no one security layer is sufficient to protect your organization, secure your devices, and safeguard your data. The attack surface is simply too vast and the attack vectors too numerous. The best strategy is now a multi-layered security approach, to prevent, assess, and respond to emerging threats.
Monitoring and managing your entire security posture is critical to protecting your organisation. Attend this session to:
- Identify where your organisation is most vulnerable and what you can do to layer on the protection you need
- Hear best practices on visibility, compliance, and securing your mission-critical applications.
- Understand why it’s important to focus on application resiliency and how it’s achieved
Trust in Our Digital World
Chris Hodson, EMEA CISO, Zscaler
Why do we need trust? Trust is a fundamental requirement of our daily lives but how do we apply the concept of faith across our ever-increasingly digital lives? In a world of phishing, web-exploits, cyber attacks and data breaches, who do you trust? The rhetoric suggests that we should ‘educate our users’ but how do we do this when the bad guys are finding ever more increasingly ingenious and surreptitious ways to dupe the public. The internet we know today brings with it a different threat landscape to that of yesteryear. The controls we used to make us feel safe online are being exploited on a daily basis. Our security teams relied on blocking access to suspicious websites and implicitly trusting sites with the handy padlock symbol. In recent years, we have seen attacks emanating from reputable sites and the issuing of bogus or compromised digital certificate information. The Internet of Things and its to-be 20bn devices bring with it medical breakthroughs and clear benefits to our home and professional lives but are we implicitly trusting the wrong things? What do we do? In this discussion, we will take a look at the ‘zero-trust’ approach. What does this looks like and if it either feasible or necessary.