ECS EUROPE

Enterprise Cyber Security

19 September 2018

Postillion Convention Centre Amsterdam

SOCIAL


LATEST TWEETS

EUROPE’S LEADING EVENT FOR CYBER SECURITY thought leaders and innovators across government and all major business sectors

At a glance

EUROPE’S LEADING EVENT FOR CYBER SECURITY THOUGHT LEADERS AND INNOVATORS ACROSS EVERY MAJOR BUSINESS SECTOR

The cyber threat landscape is steadily growing in complexity, resource and sophistication just as technology becomes ever more advanced and permeates deeper into our personal and professional lives. Enterprises face renewed pressures as the preventative and reactive measures that have previously acted as the fixtures of corporate defence are no longer adequate on their own to ensure the safety of strategic assets (like mission-critical systems, devices, data, applications and users) in the face of targeted cyber-attacks.

The safeguarding of intellectual property and data are now a crucial part of business strategy for every business sector. But as the number of threats and sophistication of attacks gathers pace, ensuring the protection of the Digital Single Market and the resilience of European digital infrastructure becomes a formidable challenge. The EU, in a September 2017 Joint Communication has resolved to address these threats by prioritizing cyber security and fostering greater collaboration across member states.

 

AS WHITEHALL MEDIA’S 4TH EUROPEAN CYBER AND INFORMATION SECURITY CONFERENCE OPENS IN AMSTERDAM
we bring together hundreds of cyber security and InfoSec specialists from both the public and private sector to discuss how they are deploying advanced security strategies, tools and techniques to better manage the emerging risks and vulnerabilities enterprises face.

 

FEATURED TOPICS

Attacks & Defences
  • Adversarial Behaviours
  • Asset Inventory and Management
  • Attack Techniques and Vectors
  • Breach Response and Notification
  • Cyber Policing and Law Enforcement
  • Cyber Forensics
  • Defending against Advanced Persistent Threats (APTs)
  • Insider Threat awareness
  • Malware and Ransomware, deployment and protection
  • Network Analysis
  • User Behaviour Analytics
  • Vulnerability Assessments and Threat Intelligence
Secure Systems, Software & Platforms
  • Authentication and Identity Management
  • Cryptography best practices
  • Database Protection and Disaster Recovery
  • Disruptive Technologies – AI, Machine Learning, Blockchain (opportunities and risks)
  • Hardware Security
  • IoT and Industrial Control Systems
  • Mobile / Endpoint Protection
  • Operating System protection mechanisms
  • Physical Layer Security
  • Secure virtualisation and Cloud Security
  • Software and Programming Security
  • Web-Facing Asset Management
Human, Organisational & Regulatory Alignment
  • Blue Team / Red Team Organisation
  • Board Level Engagement Strategies
  • Compliance and Obligations
  • Cyber Skills and Capabilities
  • Data Protection & GDPR
  • Legislative changes, including NIS
  • Phishing and Social Engineering
  • Protecting Personal Information
  • Risk management and governance systems
  • Secure Communications
  • Secure Operations Centre – implementation and management
  • Security culture and awareness
  • Security Ethics
  • Usable Security and Behavioural Responses to Security Controls

Featured Speakers

SPONSORS

cpd-membercpd-certified

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking