Enterprise Cyber Security

24 September 2019

Victoria Park Plaza, London




Tuesday 24th September, 2019

The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.



Network Traffic Analysis to Detect Intrusions and Threats

Network traffic is a tremendous source of information if you can cope with the volume and velocity it produces. Join this seminar for a thorough examination of how you can analyse network traffic to find attackers and detect when incidents are taking place.


Securing Active Directory

New attacks targeting Active Directory have become common place as a way of escalating privileges and cementing control within enterprise systems. We explore the most common ways AD is compromised and what you can do to ensure it is better secured.


Simulating Phishing Attacks

We undertook a large-scale phishing test on over 10,000 employees to test our security posture. Join this seminar to find out on what we learned, how you can better protect your businesses, and key techniques to prevent data theft and loss.


Best Practice Securing Cloud Environments

In this seminar, we focus on how organisations can secure complex cloud environments, whether public, private or hybrid.


Streamlined Vulnerability Assessments

How can you streamline the process of finding and assessing the vulnerabilities within your system? We focus in this session on how you can reduce the time spent manging vulnerabilities and increase the level of automation, to ensure your systems remained patched and secure as they can be.


The Challenges of Data Classification in Complex Environments

Across a sprawling enterprise, it is a challenging task to be able to identify your most sensitive data assets. Identification is key though to ensuring that your most important assets are adequately defended and access is restricted. In this session we look at the challenges associated with data classification, and the innovative ways data management is being used to improve security in large enterprise environments.


Cutting Edge Breach Detection

The average attacker dwell time is well over six months. We think that this time can be severely curtailed if organisations adopt the newest techniques and tools to detect data breaches and unauthorised access. Join this session as we delve into the best ways to find the attackers within your systems.


Trends in Mobile Malware and Why Businesses Need to Adapt to the Mobile World

Mobile security is often an afterthought for enterprises, understandably when larger threats often loom. But when the majority of employees use their mobiles for business, and frequently access work services through their devices, the threat of mobile malware becomes more prescient.

Join this seminar as we explore the evolution of mobile malware, and why tracking and managing it is essential for businesses looking to secure their systems.