19 April 2018
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.
What you need to know about hackers and the threat landscape
A practical demo and discussion about the growing risks of cybercrime, APTs, emerging vulnerabilities, exploitation methods and how to effectively mitigate the threats faced by enterprise.
Key Strategies for Upgrading Your Security Posture
Sophisticated cyber-attacks, breaches and disclosures are becoming the norm. As network speeds increase, data migrates to the cloud, more data is shared and employees bring in their personal devices into the workspace – enterprises must respond by upgrading their security posture to meet the challenges of tomorrow. We explore key strategies that will help your enterprise keep pace with the changing ICT landscape.
Protect Your Network by Securing Your DNS Service
This seminar discusses a unique approach to securing your DNS infrastructure that will provide protection against DDOS attacks and enable you to detect and neutralise other types of malware activity on your network.
Securing End Points: Effectively Managing Multiple Devices
Exploring how your business can optimise productivity, prove compliance, and remotely secure all devices and the corporate data they contain. The session will also look at device intelligence and analytics for risk assessment.
Outpacing the Hacker
It is clear from the sophisticated tactics and tools utilised by cyber criminals that their abilities have outpaced the ability of InfoSec professionals to address the latest threats. How can your organisation bolster its defences and build resilience? What skills are essential to combating the threat horizon, and how can you capitalise on real-time analysis and data analytics to finesse your ability to detect threats and breaches?
Are you all set for GDPR?
- How should companies plan for GDPR?
- How can they balance the imperative for growth with privacy?
- What needs to be implemented for GDPR?
- What should companies expect after May 2018?
Building Your Security Threat Intelligence Capability
Security intelligence is a key enabler of risk management. It allows for better predictability and assessment and can provide a roadmap for investment. What are some of the foundational elements of an effective threat intelligence strategy? Join this seminar and discover how you can better understand how to predict, detect and respond to threats across your organisation’s digital estate.
Risk Analytics: Using Big Data to Solve your Security Challenges
Exploring how big data can be capitalised upon to reduce security challenges and risks.
Cyber Security – Auditing Your Controls
The explosive growth of cloud and “cloud first” initiatives have opened up new security concerns. In this session we look at how you can:
- Assess the risk from your cloud deployment
- Increase visibility into your IT estate
- Help maintain sovereignty of your data
- Protect against high risk user behaviour
- Prevent data loss and improve control of cloud apps
Incident Management – Improving your Detection and Response
Sophisticated cyber-attacks, breaches and disclosures are becoming the norm. As network speeds increase, data migrates to the cloud, more data is shared and employees bring in their personal devices into the workspace – enterprises must respond by upgrading their security posture to meet the challenges of tomorrow. We explore key strategies that will help your enterprise keep pace with the changing IT landscape.