Tuesday 24th September, 2019
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.
Network Traffic Analysis to Detect Intrusions and Threats
Network traffic is a tremendous source of information if you can cope with the volume and velocity it produces. Join this seminar for a thorough examination of how you can analyse network traffic to find attackers and detect when incidents are taking place.
Securing Active Directory
New attacks targeting Active Directory have become common place as a way of escalating privileges and cementing control within enterprise systems. We explore the most common ways AD is compromised and what you can do to ensure it is better secured.
Simulating Phishing Attacks
We undertook a large-scale phishing test on over 10,000 employees to test our security posture. Join this seminar to find out on what we learned, how you can better protect your businesses, and key techniques to prevent data theft and loss.
Best Practice Securing Cloud Environments
In this seminar, we focus on how organisations can secure complex cloud environments, whether public, private or hybrid.
Streamlined Vulnerability Assessments
How can you streamline the process of finding and assessing the vulnerabilities within your system? We focus in this session on how you can reduce the time spent manging vulnerabilities and increase the level of automation, to ensure your systems remained patched and secure as they can be.
The Challenges of Data Classification in Complex Environments
Across a sprawling enterprise, it is a challenging task to be able to identify your most sensitive data assets. Identification is key though to ensuring that your most important assets are adequately defended and access is restricted. In this session we look at the challenges associated with data classification, and the innovative ways data management is being used to improve security in large enterprise environments.
Cutting Edge Breach Detection
The average attacker dwell time is well over six months. We think that this time can be severely curtailed if organisations adopt the newest techniques and tools to detect data breaches and unauthorised access. Join this session as we delve into the best ways to find the attackers within your systems.
Trends in Mobile Malware and Why Businesses Need to Adapt to the Mobile World
Mobile security is often an afterthought for enterprises, understandably when larger threats often loom. But when the majority of employees use their mobiles for business, and frequently access work services through their devices, the threat of mobile malware becomes more prescient.
Join this seminar as we explore the evolution of mobile malware, and why tracking and managing it is essential for businesses looking to secure their systems.