17 April 2018
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.
Security by Default
Security must not be reverse engineered into the adoption of new, disruptive technologies like the Internet of Things. We look at how you can ensure your infrastructure is secure by default.
International Frameworks for Cyber Security
Exploring approaches to cyber security in the international arena and the importance of international cooperation and partnerships.
Private and Public Partnerships – The Important Role of Information Sharing
We look at how collaboration between government and industry can help to minimise security threats and risks. We ask: What role should the private sector play in helping the government secure its key assets? What forensic technologies, expertise and skills can industry share with government to respond to international threats and risks?
Is IAM the new perimeter of defence?
Identity and Access Management (IAM) is a vital mechanism for securing access controls, user behaviour monitoring and privileged account management. We explore how identity is the new perimeter as traditional security controls become more porous.
Social Engineering Techniques
We look at:
- How attackers use social engineering to cause crippling data breaches
- Case studies of various attack techniques
- Detecting and thwarting attacks through proactive simulation methods
Keeping up with the Cyber Criminal
It is clear from the sophisticated tactics and tools utilised by cyber criminals that their abilities have outpaced the ability of InfoSec professionals to address the latest threats. How can your organisation bolster its defences and build resilience? What skills are essential to combating the threat horizon, and how can you capitalise on real-time analysis and data analytics to finesse your ability to detect threats and breaches?
Building Your Security Threat Intelligence Capability
Security intelligence is a key enabler of risk management. It allows for better predictability and assessment and can provide a roadmap for investment. What are some of the foundational elements of an effective threat intelligence strategy? Join this seminar and discover how you can better understand how to predict, detect and respond to threats across your organisation’s digital estate.
Cyber Security – Accelerating your Detection and Response
Targeted attacks are a grim reality facing businesses of all sizes – big and small. This session will explore all you need to know about targeted attacks and mitigating the threat to your business.
Exploring how InfoSec teams can rapidly adapt to the changing business climate where speed and agility are necessary to stay competitive.
Data Privacy and Data Protection
We look at key data protection principles, specifically how businesses can meetand the symbiotic relationship between data security and privacy.