ESRM

Enterprise Security & Risk Management

19 April 2018

Victoria Park Plaza

SOCIAL


LATEST BLOGS


What’s In Store For The 2015 Network?

22nd April 2015

I’ll cut to the chase here. In my opinion 2015 will be the year that network and application convergence finally deliver for enterprises of all […]


Data security and IT Asset Disposal Today

21st April 2015

Information availability and risks are evolving. Is your ITAD strategy  With internet traffic set to cross the 1 zettabyte – that’s 1 followed by 21 […]


LATEST TWEETS

THE UK’S LEADING EVENT FOR INFOSEC, CYBER
Security and Risk Management Professionals across every major business sector

At a glance

Cyber-attacks (and attackers) are becoming more brazen and sophisticated, with serious repercussions for large enterprise organisations. In the first half of 2017, 1.9 billion data records were breached – meaning on average, 122 records were lost or stolen every second.  Building resilience and developing contingency plans to tackle risks is a key focus for organisations as regulatory pressures increase and the imperative to protect vital customer data, intellectual property, trade secrets, business strategies – and, ultimately, market value – hangs in the balance.

The worldwide security market is booming and estimated to grow to $100 billion by 2020 as organisations invest in both technology and skills to enhance their security posture. The ascendancy of disruptive tech trends like machine learning, big data, AI, IoT and more are further enhancing the need for reliable and agile processes that are secure by default. Security practitioners are ever-pressed to understand the deficiencies in current practices, keep pace with emerging trends and catalyse effective responses to evolving threats and attacks.

Join hundreds of leading Infosec, cyber security and risk management professionals at Whitehall Media’s prestigious bi-annual 9th ESRM conference to discuss the latest developments and best practices needed to address the most pressing security risks. The event offers unrivalled networking opportunities and insights on how to design, implement and embed deliverable action plans that balance risk mitigation with the pursuit of business growth.

FEATURED TOPICS

  • Advanced Threat Protection
  • Artificial Intelligence Vulnerability Detection
  • Asset Inventory and Management
  • Best practice in IT GRC Management
  • Business Continuity
  • BYOD/Mobile Device/App Security
  • Cloud Security – Risks and Rewards
  • Cloud Threat Intelligence
  • Contingency Planning and Business Continuity
  • Creating a Risk-Aware culture
  • Cyber Policing
  • Cyber Risk Assessments
  • Cyber Security Intelligence
  • Data Classification – Identifying sensitive, valuable and critical data
  • Data Confidentiality, Integrity and Secure Auditing
  • Data Loss Prevention
  • Data Management (Ownership/Classification/Protection)
  • Data Transmission Protocols
  • Digital Forensics and e-Discovery
  • Disaster Recovery and Data Recovery
  • Distributed Denial-of-Service Resiliency
  • Database Architecture Security
  • Embedding security into disruptive trends (IoT, blockchain, AI, etc.)
  • Emergency Resource Planning
  • Encryption and Cryptography best practices
  • Endpoint Security, Detection and Response
  • Establishing a Security and Risk Management Strategy
  • Governance, Regulation and Compliance
  • Hardware Security
  • Identity and Access Management (IAM)
  • Incident Management, Containment, Response
  • Information Management, Governance and Protection
  • Insider Threats, Privileged Account Management
  • Legislative changes (including new data protection proposals)
  • Network Security and Monitoring
  • Operational Technology Risks
  • Penetration Testing
  • Privileged Account Management
  • Protecting Critical National Infrastructures
  • Protecting against Phishing and Social Engineering
  • Ransomware and Malware
  • Risk Metrics, Measurements, Strategy
  • Securing e-commerce and online transactions
  • Security information and event management (SIEM)
  • Social Media Risks
  • Supplier Management and Third Party Risk
  • Technical Surveillance Counter Measures
  • Threat Intelligence, Visualisation
  • User awareness of security standards and responsibilities
  • User and Entity Behaviour Analytics
  • Vulnerability Assessment
  • Web security tools and best practice
  • Wireless and Mobile Security

Featured Speakers

SPONSORS

cpd-certifiedcpd-member

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking