ESRM

Enterprise Security & Risk Management

19 April 2018

Victoria Park Plaza

SOCIAL


LATEST BLOGS


Getting to know the GDPR: The technical and organizational measures

27th November 2017

Before we jump into the third part of this GDPR blog series, let’s take a moment to think about a few questions. Such as, why are compliance mandates necessary? Are they framed to just prevent data breaches? Are compliance […]


Consumer concerns over GDPR should set alarm bells ringing for businesses

21st November 2017

Today, putting the letters ‘GDPR’ into Google will generate over 420,000 news articles, some detailing the expected impact of the regulation, and others casting doubt […]


LATEST TWEETS

SEMINARS

19 April 2018

The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.

SESSIONS

SEMINAR 1
What you need to know about hackers and the threat landscape

A practical demo and discussion about the growing risks of cybercrime, APTs, emerging vulnerabilities, exploitation methods and how to effectively mitigate the threats faced by enterprise.

SEMINAR 2
Key Strategies for Upgrading Your Security Posture

Sophisticated cyber-attacks, breaches and disclosures are becoming the norm. As network speeds increase, data migrates to the cloud, more data is shared and employees bring in their personal devices into the workspace – enterprises must respond by upgrading their security posture to meet the challenges of tomorrow. We explore key strategies that will help your enterprise keep pace with the changing ICT landscape.

SEMINAR 3
Protect Your Network by Securing Your DNS Service

This seminar discusses a unique approach to securing your DNS infrastructure that will provide protection against DDOS attacks and enable you to detect and neutralise other types of malware activity on your network.

SEMINAR 4
Securing End Points: Effectively Managing Multiple Devices

Exploring how your business can optimise productivity, prove compliance, and remotely secure all devices and the corporate data they contain. The session will also look at device intelligence and analytics for risk assessment.

SEMINAR 5
Outpacing the Hacker

It is clear from the sophisticated tactics and tools utilised by cyber criminals that their abilities have outpaced the ability of InfoSec professionals to address the latest threats. How can your organisation bolster its defences and build resilience? What skills are essential to combating the threat horizon, and how can you capitalise on real-time analysis and data analytics to finesse your ability to detect threats and breaches?

SEMINAR 6
Are you all set for GDPR?
  • How should companies plan for GDPR?
  • How can they balance the imperative for growth with privacy?
  • What needs to be implemented for GDPR?
  • What should companies expect after May 2018?
SEMINAR 7
Building Your Security Threat Intelligence Capability

Security intelligence is a key enabler of risk management. It allows for better predictability and assessment and can provide a roadmap for investment. What are some of the foundational elements of an effective threat intelligence strategy? Join this seminar and discover how you can better understand how to predict, detect and respond to threats across your organisation’s digital estate.

SEMINAR 8
Risk Analytics: Using Big Data to Solve your Security Challenges

Exploring how big data can be capitalised upon to reduce security challenges and risks.

SEMINAR 9
Cyber Security – Auditing Your Controls

The explosive growth of cloud and “cloud first” initiatives have opened up new security concerns. In this session we look at how you can: 

  • Assess the risk from your cloud deployment
  • Increase visibility into your IT estate
  • Help maintain sovereignty of your data
  • Protect against high risk user behaviour
  • Prevent data loss and improve control of cloud apps
SEMINAR 10
Incident Management – Improving your Detection and Response

Sophisticated cyber-attacks, breaches and disclosures are becoming the norm. As network speeds increase, data migrates to the cloud, more data is shared and employees bring in their personal devices into the workspace – enterprises must respond by upgrading their security posture to meet the challenges of tomorrow. We explore key strategies that will help your enterprise keep pace with the changing IT landscape.