ESRM

Enterprise Security & Risk Management

28 November 2017

Victoria Park Plaza

SOCIAL


LATEST BLOGS


What’s In Store For The 2015 Network?

22nd April 2015

I’ll cut to the chase here. In my opinion 2015 will be the year that network and application convergence finally deliver for enterprises of all […]


Data security and IT Asset Disposal Today

21st April 2015

Information availability and risks are evolving. Is your ITAD strategy  With internet traffic set to cross the 1 zettabyte – that’s 1 followed by 21 […]


LATEST TWEETS

The UK’s LEADING EVENT FOR INFOSEC, CYBER
Security and Risk Management Professionals across every major business sector

At a glance

The UK’s LEADING EVENT FOR INFOSEC, CYBER SECURITY AND RISK MANAGEMENT PROFESSIONALS ACROSS EVERY MAJOR BUSINESS SECTOR

The ascendancy of emerging trends like cloud, mobile, big data and IoT are further enhancing the need for reliable and agile processes that are secure by default. Security practitioners are ever-pressed to understand the deficiencies in current practices, keep pace with emerging trends and catalyse effective responses to evolving threats and attacks.

JOIN HUNDREDS OF LEADING INFOSEC, CYBER SECURITY AND RISK MANAGEMENT PROFESSIONALS AT WHITEHALL MEDIA’S BIANNUAL 8th ESRM CONFERENCE
to discuss the latest developments and best practices needed to address the most pressing security risks. The event offers unrivalled networking opportunities and insights on how to design, implement and embed deliverable action plans that balance risk mitigation with the pursuit of business growth.

FEATURED TOPICS

  • Best practice in IT GRC Management
  • BYOD/Mobile Device/App Security
  • Cloud Integration and Security – Risks and Rewards
  • Contingency Planning and Business Continuity
  • Creating a risk-aware culture
  • Cyber policing
  • Cyber Security Intelligence
  • Data confidentiality, integrity and secure auditing
  • Data Loss Prevention
  • Data Management (Ownership/Classification/Protection)
  • Digital Forensics and e-Discovery
  • Disaster Recovery and Data Recovery
  • Embedding security into disruptive trends (IoT, big data, etc.)
  • Encryption, firewall technology, anti-virus, password cracking
  • Establishing a Security and Risk Management Strategy
  • Governance, Regulation and Compliance
  • Hardware Security
  • Identity and Access Management (IAM)
  • Information Management, Governance and Protection
  • Insider Threats, Privileged Account Management
  • Leadership and Management of Security and Risk
  • Legislative changes (including new data privacy proposals)
  • Network Security
  • Operational Technology Risks
  • Penetration Testing
  • Real-time analysis and Analytics tools
  • Risk Metrics, Measurements, Strategy
  • Securing e-commerce and online transactions
  • Security Monitoring and Incident Response
  • Social Media Risks
  • Supplier Management and Third Party Risk
  • Technical Surveillance Counter Measures
  • User awareness of security standards and responsibilities
  • Vulnerability Assessment

FEATURED SPEAKERS

SPONSORS

cpd-member

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking