Government IT Security & Risk Management

9 May 2018

Victoria Park Plaza



£20Million Set to be Invested into Britain’s School Curriculum in a Bid to Boost Future Cyber Defences

15th March 2017

September 2017 will see the launch of a new government scheme aimed at providing teenagers with the cyber security skills they would require for a […]

Optimising Internet Access for staff and visitors in the NHS

14th April 2016

In a bid to help reduce costs and improve the use of technology within the health service, the Government has called for all NHS Organisations […]



Wednesday, 10th May, 2017

The Seminars will take place from 12.15 – 13.00.

Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.


Securing Your Digital Transformation: What Every CISO Should Know 

Chris Hodson, EMEA CISO, Zscaler

Digital transformation is a powerful business enabler that is compelling business leaders to fundamentally change their technology ecosystems. However, such a transformation significantly impacts security, network traffic flows, applications, user experience, and cost, which is why it is top-of-mind in C-suites and the boardroom.
Digital business transformation is no longer a question of it, but WHEN. According to IDC, by the end of 2017, two-thirds of CEOs in the Global 2000 will have digital transformation at the center of their corporate strategies. Enterprises that are able to adapt to this digital transformation will see a sustained competitive advantage over the ones that aren’t. How ready is your enterprise?

Essential Steps To Prevent Your Organisation Suffering A Major Breach

David Higgins, Director of Strategic Accounts, EMEA – CyberArk

With high profile breaches only a tiny part of the reality of unauthorised network access, including third parties, smart security leaders are focusing on reducing the privileged account attack surface and containing attacks when – not if – they happen. This session will walk through the essential steps in building a privileged user management strategy.

Operating securely in a high threat internet connected platform

Simon Vernon, Senior Cyber Consultant, e2e-assure /Rob Demain, Founder and Director, e2e-assure / Leighton James, Director of Cloud Strategy, UKCloud

Join us for a live demonstration of a common hack that could compromise systems and applications delivered to remote workers who use Wi-Fi networks.

UKCloud are the leading provider of Cloud Hosting services in G-Cloud and have helped hundreds of public sector projects leverage the benefits of assured cloud services. UKCloud partner with e2e-assure to provide enhanced security monitoring of their award winning UK sovereign public cloud platform. e2e assure can deploy their specialised skills and services to help customers ensure they are operating securely inside cloud environments. e2e assure will illustrate how they can help you bolster your security in the high threat, low trust environment that is the Internet.

Identity Governance and Security in the Cloud Age

Martin Whitby, Technical Lead, UKI, Sailpoint

How can you manage access to your existing on premise applications and your cloud subscriptions in the new SaaS based world and improve your security stance? With an increasing number of cloud services available and being adopted how can you ensure appropriate access across your user population? How are you going to monitor and alert on data outside structured applications and outside your security perimeter?