ESRM

Enterprise Security & Risk Management

19 April 2018

Victoria Park Plaza

SOCIAL


LATEST BLOGS


New Cryptojacking Attack Hits Thousands of Websites

14th February 2018

By John Connolly Over 4000 sites were compromised this weekend when hackers inserted malicious code that hijacked the processing power of any site visitor’s computer […]


Cyber is Third Most Likely Global Risk

31st January 2018

By J Connolly The World Economic Forum’s Global Risks Report 2018 released this January warns of the increasing likelihood of cyber attacks and their growing […]


LATEST TWEETS

SEMINARS

19 April 2018

The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.

SESSIONS

SEMINAR 1
What you need to know about hackers and the threat landscape

A practical demo and discussion about the growing risks of cybercrime, APTs, emerging vulnerabilities, exploitation methods and how to effectively mitigate the threats faced by enterprise.

SEMINAR 2
Key Strategies for Upgrading Your Security Posture

Sophisticated cyber-attacks, breaches and disclosures are becoming the norm. As network speeds increase, data migrates to the cloud, more data is shared and employees bring in their personal devices into the workspace – enterprises must respond by upgrading their security posture to meet the challenges of tomorrow. We explore key strategies that will help your enterprise keep pace with the changing ICT landscape.

SEMINAR 3
Protect Your Network by Securing Your DNS Service

This seminar discusses a unique approach to securing your DNS infrastructure that will provide protection against DDOS attacks and enable you to detect and neutralise other types of malware activity on your network.

SEMINAR 4
Securing End Points: Effectively Managing Multiple Devices

Exploring how your business can optimise productivity, prove compliance, and remotely secure all devices and the corporate data they contain. The session will also look at device intelligence and analytics for risk assessment.

SEMINAR 5
Outpacing the Hacker

It is clear from the sophisticated tactics and tools utilised by cyber criminals that their abilities have outpaced the ability of InfoSec professionals to address the latest threats. How can your organisation bolster its defences and build resilience? What skills are essential to combating the threat horizon, and how can you capitalise on real-time analysis and data analytics to finesse your ability to detect threats and breaches?

SEMINAR 6
Are you all set for GDPR?
  • How should companies plan for GDPR?
  • How can they balance the imperative for growth with privacy?
  • What needs to be implemented for GDPR?
  • What should companies expect after May 2018?
SEMINAR 7
Building Your Security Threat Intelligence Capability

Security intelligence is a key enabler of risk management. It allows for better predictability and assessment and can provide a roadmap for investment. What are some of the foundational elements of an effective threat intelligence strategy? Join this seminar and discover how you can better understand how to predict, detect and respond to threats across your organisation’s digital estate.

SEMINAR 8
Risk Analytics: Using Big Data to Solve your Security Challenges

Exploring how big data can be capitalised upon to reduce security challenges and risks.

SEMINAR 9
Cyber Security – Auditing Your Controls

The explosive growth of cloud and “cloud first” initiatives have opened up new security concerns. In this session we look at how you can: 

  • Assess the risk from your cloud deployment
  • Increase visibility into your IT estate
  • Help maintain sovereignty of your data
  • Protect against high risk user behaviour
  • Prevent data loss and improve control of cloud apps
SEMINAR 10
Incident Management – Improving your Detection and Response

Sophisticated cyber-attacks, breaches and disclosures are becoming the norm. As network speeds increase, data migrates to the cloud, more data is shared and employees bring in their personal devices into the workspace – enterprises must respond by upgrading their security posture to meet the challenges of tomorrow. We explore key strategies that will help your enterprise keep pace with the changing IT landscape.