Enterprise Security & Risk Management

19 April 2018

Victoria Park Plaza



What’s In Store For The 2015 Network?

22nd April 2015

I’ll cut to the chase here. In my opinion 2015 will be the year that network and application convergence finally deliver for enterprises of all […]

Data security and IT Asset Disposal Today

21st April 2015

Information availability and risks are evolving. Is your ITAD strategy  With internet traffic set to cross the 1 zettabyte – that’s 1 followed by 21 […]


Security and Risk Management Professionals across every major business sector

At a glance

Cyber-attacks (and attackers) are becoming more brazen and sophisticated, with serious repercussions for large enterprise organisations. Building resilience and developing contingency plans to tackle risks is a key focus for organisations as regulatory pressures increase and the imperative to protect vital customer data, intellectual property, trade secrets, business strategies – and, ultimately, market value – hang in the balance.

The worldwide security market is booming and estimated to grow to $120 billion by 2017 as organisations invest in both technology and skills to enhance their security posture. The ascendancy of emerging trends like cloud, mobile, big data and IoT are further enhancing the need for reliable and agile processes that are secure by default. Security practitioners are ever-pressed to understand the deficiencies in current practices, keep pace with emerging trends and catalyse effective responses to evolving threats and attacks.

Join hundreds of leading Infosec, cyber security and risk management professionals at Whitehall Media’s prestigious bi-annual 7th ESRM conference to discuss the latest developments and best practices needed to address the most pressing security risks. The event offers unrivalled networking opportunities and insights on how to design, implement and embed deliverable action plans that balance risk mitigation with the pursuit of business growth.


  • Best practice in IT GRC Management
  • BYOD/Mobile Device/App Security
  • Cloud Integration and Security – Risks and Rewards
  • Contingency Planning and Business Continuity
  • Creating a risk-aware culture
  • Cyber policing
  • Cyber Security Intelligence
  • Data confidentiality, integrity and secure auditing
  • Data Loss Prevention
  • Data Management (Ownership/Classification/Protection)
  • Digital Forensics and e-Discovery
  • Disaster Recovery and Data Recovery
  • Embedding security into disruptive trends (IoT, big data, etc.)
  • Encryption, firewall technology, anti-virus, password cracking
  • Establishing a Security and Risk Management Strategy
  • Governance, Regulation and Compliance
  • Hardware Security
  • Identity and Access Management (IAM)
  • Information Management, Governance and Protection
  • Insider Threats, Privileged Account Management
  • Leadership and Management of Security and Risk
  • Legislative changes (including new data privacy proposals)
  • Network Security
  • Operational Technology Risks
  • Penetration Testing
  • Real-time analysis and Analytics tools
  • Risk Metrics, Measurements, Strategy
  • Securing e-commerce and online transactions
  • Security Monitoring and Incident Response
  • Social Media Risks
  • Supplier Management and Third Party Risk
  • Technical Surveillance Counter Measures
  • User awareness of security standards and responsibilities
  • Vulnerability Assessment