ESRM DUBAI

Enterprise Security & Risk Management

17 April 2018

Conrad Dubai (United Arab Emirates)

SOCIAL


LATEST BLOGS


Threat Research – Surveying the Landscape

2nd October 2017

By: Paul John, Senior Security Architect, Secureworks Staying aware of online threats, techniques and markets remains a key part of cyber defence


UAE Population Pose High Risk to the Safety of Their Data

18th September 2017

Research by Kaspersky Lab has found that the UAE is failing to protect their data properly. Even though the ever growing population recognises the danger […]


LATEST TWEETS

SEMINARS

17 April 2018

Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.

SESSIONS

SEMINAR 1
Security by Default

Security must not be reverse engineered into the adoption of new, disruptive technologies like the Internet of Things. We look at how you can ensure your infrastructure is secure by default.

 

SEMINAR 2
International Frameworks for Cyber Security

Exploring approaches to cyber security in the international arena and the importance of international cooperation and partnerships.

 

SEMINAR 3
Private and Public Partnerships – The Important Role of Information Sharing

We look at how collaboration between government and industry can help to minimise security threats and risks. We ask: What role should the private sector play in helping the government secure its key assets? How important is multi-stakeholder participation? What forensic technologies, expertise and skills can industry share with government to respond to international threats and risks?

SEMINAR 4
Is IAM the new perimeter of defence?

Identity and Access Management (IAM) is a vital mechanism for securing access controls, user behaviour monitoring and privileged account management. We explore how identity is the new perimeter as traditional security controls become more porous.

SEMINAR 5
Social Engineering Techniques

We look at:

  • How attackers use social engineering to cause crippling data breaches
  • Case studies of various attack techniques
  • Detecting and thwarting attacks through proactive simulation methods
SEMINAR 6
Keeping up with the Cyber Criminal

It is clear from the sophisticated tactics and tools utilised by cyber criminals that their abilities have outpaced the ability of InfoSec professionals to address the latest threats. How can your organisation bolster its defences and build resilience? What skills are essential to combating the threat horizon, and how can you capitalise on real-time analysis and data analytics to finesse your ability to detect threats and breaches?

SEMINAR 7
Building Your Security Threat Intelligence Capability

Security intelligence is a key enabler of risk management. It allows for better predictability and assessment and can provide a roadmap for investment. What are some of the foundational elements of an effective threat intelligence strategy? Join this seminar and discover how you can better understand how to predict, detect and respond to threats across your organisation’s digital estate.

SEMINAR 8
Cyber Security – Accelerating your Detection and Response

Targeted attacks are a grim reality facing businesses of all sizes – big and small. This session will explore all you need to know about targeted attacks and mitigating the threat to your business.

SEMINAR 9
Intelligent Security in Action

Intelligent systems are becoming the must-have to effectively respond to security challenges in real-time. We look at machine learning and advanced data analytics, and their role in modern threat detection.

SEMINAR 10
Mobile Apps – Identifying and Mitigating Digital risk

In a mobile-first world, apps offer new opportunities for engagement and growth with your customers. They also introduce new risks. What should organisations do to better protect themselves from such risks? We offer an interactive walk-through all the major threats that organisations and users need to look out for.