ESRM DUBAI

Enterprise Security & Risk Management

11 October 2017

Conrad Dubai (United Arab Emirates)

SOCIAL


LATEST BLOGS


How does security visibility help your cybersecurity posture?

16th August 2016

Cybersecurity is a constant battle to stay ahead. The Cybersecurity Capability Maturity Model (C2M2) outlines a process to move your security posture to the next […]


The 7 Cyber Security Skills That Are Highly Valued And Sought After By Large Enterprise

9th August 2016

Large enterprise organisations are under immense pressure to address cyber security skills shortages, leaving their critical assets and data open to attack.


LATEST TWEETS

SEMINARS

October 2017

The Seminars will take place from 12.15 – 1.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.

SESSIONS

SEMINAR 1
Security by Default

Security must not be reverse engineered into the adoption of new, disruptive technologies like the Internet of Things. We look at how you can ensure your infrastructure is secure by default.

 

SEMINAR 2
International Frameworks for Cyber Security

Exploring approaches to cyber security in the international arena and the importance of international cooperation and partnerships.

 

SEMINAR 3
Private and Public Partnerships – The Important Role of Information Sharing

We look at how collaboration between government and industry can help to minimise security threats and risks. We ask: What role should the private sector play in helping the government secure its key assets? What forensic technologies, expertise and skills can industry share with government to respond to international threats and risks?

SEMINAR 4
Is IAM the new perimeter of defence?

Identity and Access Management (IAM) is a vital mechanism for securing access controls, user behaviour monitoring and privileged account management. We explore how identity is the new perimeter as traditional security controls become more porous.

SEMINAR 5
Social Engineering Techniques

We look at:

  • How attackers use social engineering to cause crippling data breaches
  • Case studies of various attack techniques
  • Detecting and thwarting attacks through proactive simulation methods
SEMINAR 6
Keeping up with the Cyber Criminal

It is clear from the sophisticated tactics and tools utilised by cyber criminals that their abilities have outpaced the ability of InfoSec professionals to address the latest threats. How can your organisation bolster its defences and build resilience? What skills are essential to combating the threat horizon, and how can you capitalise on real-time analysis and data analytics to finesse your ability to detect threats and breaches?

SEMINAR 7
Building Your Security Threat Intelligence Capability

Security intelligence is a key enabler of risk management. It allows for better predictability and assessment and can provide a roadmap for investment. What are some of the foundational elements of an effective threat intelligence strategy? Join this seminar and discover how you can better understand how to predict, detect and respond to threats across your organisation’s digital estate.

SEMINAR 8
Cyber Security – Accelerating your Detection and Response

Targeted attacks are a grim reality facing businesses of all sizes – big and small. This session will explore all you need to know about targeted attacks and mitigating the threat to your business.

SEMINAR 9
App Security

Exploring how InfoSec teams can rapidly adapt to the changing business climate where speed and agility are necessary to stay competitive.