Enterprise Security & Risk Management

25 April 2017

Victoria Park Plaza



‘Vault 7’ material defines the largest intelligence leak in CIA history

15th March 2017

WikiLeaks enlightened the World on Monday 6th March 2017 with its publication of a substantial collection of confidential CIA documents which detail many of the […]

Detecting Cyber Crime With Artificial Intelligence

30th January 2017

Author: Cyberseer.Net Security professionals face a difficult task in keeping enterprise networks safe. Cyber-attacks continue to grow as criminals find new ways to infiltrate and […]



Tuesday 25th April, 2017

The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.


Hands-on Security Fundamentals with Tanium

Dylan DeAnda, Senior Director of Technical Account Management, Tanium & Tyler Oliver, Endpoint Detection and Response Director, Tanium

No marketing slides, no sales pitch. Together with our experts, you will hunt for threats in real-life scenarios. Being able to hunt for Indicators of Compromise both known and unknown at speed and scale is imperative. Our experts will illustrate how good security hygiene can improve your security posture significantly. Using your mobile device, you can vote for the threat types we will explore during the



Protect Your Network by Securing Your DNS Service

Matt Torrisi, Solutions Sales Engineer, Dyn Ltd



What you don’t know CAN hurt you – why layered visibility is your best defence

Nima Baiati, GSEC, CCSK, Senior Director, Product Management, Absolute Software

In today’s evolving cybersecurity landscape, no one security layer is sufficient to protect your organization, secure your devices, and safeguard your data. The attack surface is simply too vast and the attack vectors too numerous. The best strategy is now a multi-layered security approach, to prevent, assess, and respond to emerging threats.

Monitoring and managing your entire security posture is critical to protecting your organisation. Attend this session to:

  • Identify where your organisation is most vulnerable and what you can do to layer on the protection you need
  • Hear best practices on visibility, compliance, and securing your mission-critical applications.
  • Understand why it’s important to focus on application resiliency and how it’s achieved
Trust in Our Digital World

Chris Hodson, EMEA CISO, Zscaler

Why do we need trust?  Trust is a fundamental requirement of our daily lives but how do we apply the concept of faith across our ever-increasingly digital lives?  In a world of phishing, web-exploits, cyber attacks and data breaches, who do you trust?  The rhetoric suggests that we should ‘educate our users’ but how do we do this when the bad guys are finding ever more increasingly ingenious and surreptitious ways to dupe the public. The internet we know today brings with it a different threat landscape to that of yesteryear.  The controls we used to make us feel safe online are being exploited on a daily basis.  Our security teams relied on blocking access to suspicious websites and implicitly trusting sites with the handy padlock symbol.  In recent years, we have seen attacks emanating from reputable sites and the issuing of bogus or compromised digital certificate information. The Internet of Things and its to-be 20bn devices bring with it medical breakthroughs and clear benefits to our home and professional lives but are we implicitly trusting the wrong things?  What do we do? In this discussion, we will take a look at the ‘zero-trust’ approach.  What does this looks like and if it either feasible or necessary.