ECS

Enterprise Cyber Security

24 September 2019

Victoria Park Plaza, London

SOCIAL


LATEST TWEETS


THE UK’S LEADING ENTERPRISE CYBER SECURITY EVENT FOR THOUGHT LEADERS AND INNOVATORS ACROSS GOVERNMENT AND ALL MAJOR BUSINESS SECTORS

At a glance

The cyber threat landscape is growing in complexity, resource and sophistication. New attacks emerge every day that are imaginative in execution and potentially devastating in impact. Meanwhile, the cyber domain has moved into every area of modern life, from the SCADA systems of nuclear stations to the smart homes they power.

In the face of these threats, enterprises and governments face a growing challenge. To protect vital infrastructure, assets, and customer data in an increasingly online world.

Join Whitehall Media’s 4th Enterprise Cyber Security conference where we bring together hundreds of cyber security and InfoSec specialists from both the public and private sector committed to protecting the largest organisations from a growing cyber threat. Covering secure systems, new threats and defences and the ways organisations can adapt to provide the best possible security for their customers and employees.

FEATURED TOPICS

Defending Cyberspace against Risks and Vulnerabilities
  • Building a Secure Cyberspace
  • Understanding the Risk Landscape and Threat Vectors
  • Active Cyber Defence Mechanisms, Tools and Techniques
  • Advanced Intrusion Detection and Prevention (IPS)
  • Protecting against malware, ransomware, and new threats
  • Disruptive Technologies – IoT, AI, Machine Learning, Blockchain (Opportunities and Risks)
  • User behaviour and awareness training
  • Stimulating growth in the Cyber Security sector
  • Promoting Cyber Security Technologies
  • Breach Investigation
Deterring Cyber Attacks
  • Reducing Cyber Crime
  • Building Cyber Skills and Capabilities
  • Identity and Access Management (IAM)
  • User Behaviour Analytics
  • Understanding Insider Threats
  • Data Protection (GDPR) and Governance
  • Mobile Risks and Mitigation
  • Protecting Critical National Infrastructure
  • Security Intelligence and Analytics
  • Social Engineering (Phishing)
  • Network Forensics
Developing Cyber Resilience
  • Cloud / Mobile / App / Network Security
  • Continuous, Proactive Monitoring
  • APT Protection
  • Endpoint Protection
  • Cryptography / Encryption techniques
  • Data Loss Prevention / Disaster Recovery Management
  • Protecting data at rest and data in transit
  • Incidence Detection, Management and Response
  • Inventory and Asset Management
  • Intellectual Property Protection
  • Cyber Hygiene and Compliance
  • Raising Awareness among public and businesses
  • Security Classification and Policy Enforcement
  • Vulnerability Assessment and Management
  • Threat Intelligence Monitoring

Previous Speakers

SPONSORS

cpd-membercpd-certified

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking