Tuesday 25th April, 2017
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.
Hands-on Security Fundamentals with Tanium
Dylan DeAnda, Senior Director of Technical Account Management, Tanium & Tyler Oliver, Endpoint Detection and Response Director, Tanium
No marketing slides, no sales pitch. Together with our experts, you will hunt for threats in real-life scenarios. Being able to hunt for Indicators of Compromise both known and unknown at speed and scale is imperative. Our experts will illustrate how good security hygiene can improve your security posture significantly. Using your mobile device, you can vote for the threat types we will explore during the
Protect Your Network by Securing Your DNS Service
Matt Torrisi, Solutions Sales Engineer, Dyn Ltd
What you don’t know CAN hurt you – why layered visibility is your best defence
Nima Baiati, GSEC, CCSK, Senior Director, Product Management, Absolute Software
In today’s evolving cybersecurity landscape, no one security layer is sufficient to protect your organization, secure your devices, and safeguard your data. The attack surface is simply too vast and the attack vectors too numerous. The best strategy is now a multi-layered security approach, to prevent, assess, and respond to emerging threats.
Monitoring and managing your entire security posture is critical to protecting your organisation. Attend this session to:
- Identify where your organisation is most vulnerable and what you can do to layer on the protection you need
- Hear best practices on visibility, compliance, and securing your mission-critical applications.
- Understand why it’s important to focus on application resiliency and how it’s achieved
Trust in Our Digital World
Chris Hodson, EMEA CISO, Zscaler
Why do we need trust? Trust is a fundamental requirement of our daily lives but how do we apply the concept of faith across our ever-increasingly digital lives? In a world of phishing, web-exploits, cyber attacks and data breaches, who do you trust? The rhetoric suggests that we should ‘educate our users’ but how do we do this when the bad guys are finding ever more increasingly ingenious and surreptitious ways to dupe the public. The internet we know today brings with it a different threat landscape to that of yesteryear. The controls we used to make us feel safe online are being exploited on a daily basis. Our security teams relied on blocking access to suspicious websites and implicitly trusting sites with the handy padlock symbol. In recent years, we have seen attacks emanating from reputable sites and the issuing of bogus or compromised digital certificate information. The Internet of Things and its to-be 20bn devices bring with it medical breakthroughs and clear benefits to our home and professional lives but are we implicitly trusting the wrong things? What do we do? In this discussion, we will take a look at the ‘zero-trust’ approach. What does this looks like and if it either feasible or necessary.