Enterprise Security & Risk Management

25 April 2017

Victoria Park Plaza



‘Vault 7’ material defines the largest intelligence leak in CIA history

15th March 2017

WikiLeaks enlightened the World on Monday 6th March 2017 with its publication of a substantial collection of confidential CIA documents which detail many of the […]

Detecting Cyber Crime With Artificial Intelligence

30th January 2017

Author: Cyberseer.Net Security professionals face a difficult task in keeping enterprise networks safe. Cyber-attacks continue to grow as criminals find new ways to infiltrate and […]



Tuesday 25th April, 2017

The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.


Hands-on Security Fundamentals with Tanium

Dylan DeAnda, Senior Director of Technical Account Management, Tanium & Tyler Oliver, Endpoint Detection and Response Director, Tanium

No marketing slides, no sales pitch. Together with our experts, you will hunt for threats in real-life scenarios. Being able to hunt for Indicators of Compromise both known and unknown at speed and scale is imperative. Our experts will illustrate how good security hygiene can improve your security posture significantly. Using your mobile device, you can vote for the threat types we will explore during the

Protection First – Moving Beyond Legacy Endpoint Security Technology

Anton Grashion, Senior Director of Product Marketing, Cylance

Supporting enterprises in increasingly complex and diverse environments requires technologically sophisticated security solutions to combat zero-day threats. Reducing risk and minimizing breaches is increasingly important but current approaches, becoming increasingly costly and complex have not delivered. Artificial intelligence can secure a system against known and unknown threats in addition to threats that may hide their malicious behaviour while under scrutiny.


The critical role of DNS for DDoS resilience and how to reduce risk from your online architecture  

Matt Torrisi, Solutions Engineer, Oracle + Dyn

One of the most fundamental components of enterprises online connectivity is the Domain Name System (DNS). The critical role of DNS is often overlooked and not fully appreciated by many organisations but with complex and sophisticated distributed denial-of-service (DDoS) attacks increasing in regularity the true importance of DNS has come to light.
In this session you will learn:

  • How DDoS attackers have the potential to disable online connectivity via your DNS
  • Why enterprise-grade DNS is a critical consideration for the enterprise security architecture
  • How to add network resilience and ensure that DNS is not a single point of failure
Why Are We Still Talking About Advanced Evasions?

Olli-Pekka Niemi, Director Network Security Research, Forcepoint

Most organisations have spent the past decade ramping up their response to network security threats, cybercrime and compliance regulations. However, Forcepoint research shows that advanced evasion techniques (AETs) continue to break the security protection model that most organisations are using today.

Through the use of a live demo, this seminar will immediately give you a better grasp of what AETs are, the risks they pose to your data, users and networks, and what you can do about them.

Join this session to:

  • Understand how cybercriminals use AETs to bypass common security measures
  • See why AETs are the weapons of choice for large attacks
  • Assess the risks posed by AETs for your organisation
  • Know how to proactively protect yourself from AETs


What you don’t know CAN hurt you – why layered visibility is your best defence

Nima Baiati, GSEC, CCSK, Senior Director, Product Management, Absolute Software

In today’s evolving cybersecurity landscape, no one security layer is sufficient to protect your organization, secure your devices, and safeguard your data. The attack surface is simply too vast and the attack vectors too numerous. The best strategy is now a multi-layered security approach, to prevent, assess, and respond to emerging threats.

Monitoring and managing your entire security posture is critical to protecting your organisation. Attend this session to:

  • Identify where your organisation is most vulnerable and what you can do to layer on the protection you need
  • Hear best practices on visibility, compliance, and securing your mission-critical applications.
  • Understand why it’s important to focus on application resiliency and how it’s achieved
Trust in Our Digital World

Chris Hodson, EMEA CISO, Zscaler

Why do we need trust?  Trust is a fundamental requirement of our daily lives but how do we apply the concept of faith across our ever-increasingly digital lives?  In a world of phishing, web-exploits, cyber attacks and data breaches, who do you trust?  The rhetoric suggests that we should ‘educate our users’ but how do we do this when the bad guys are finding ever more increasingly ingenious and surreptitious ways to dupe the public. The internet we know today brings with it a different threat landscape to that of yesteryear.  The controls we used to make us feel safe online are being exploited on a daily basis.  Our security teams relied on blocking access to suspicious websites and implicitly trusting sites with the handy padlock symbol.  In recent years, we have seen attacks emanating from reputable sites and the issuing of bogus or compromised digital certificate information. The Internet of Things and its to-be 20bn devices bring with it medical breakthroughs and clear benefits to our home and professional lives but are we implicitly trusting the wrong things?  What do we do? In this discussion, we will take a look at the ‘zero-trust’ approach.  What does this look like and if it is either feasible or necessary.

Why Protecting Personal Data has Never Been so Important

Simon Townsend, Chief Technologist, Ivanti

Accidental or even intentional data breaches can happen at any time. Reacting to security incidents is no longer an acceptable practice for IT professionals, organisations need to be proactive and ready for ever-changing environments.

This session will cover:

  • Why GDPR will change how we process, manage, respond to and protect data
  • Assessing current security policies and privilege rights
  • Preventing inappropriate access to personal data
  • Why encrypting personal data can help avoid future complexity