Evaluate cutting-edge technology and solution providers through our Live Web Seminars by attending solution provider sessions. Connect with your fellow IAM and IT security leaders and dive into thoughtful conversations spurred by powerful sessions and hear directly from the experts behind the latest IAM innovations.
All sessions will be available on-demand after, so you won’t miss anything. Session times are subject to change. Participants can also connect with peers and experts to ask questions, share insights, and get the most from the leaders in the industry
PLEASE NOTE: All Conference Sessions (including slides) will be presented in English ONLY
Delegates will be able to attend two seminars at the event ‘live’ as they will run in two sessions.
All event footage will be available on demand for a maximum of 2 hours after the session has closed.
Supply Chain Security: When Caring Is Not Sharing
The number of third parties having access to IT systems is increasing. Most of them have widespread access to company data, and many businesses do not require third parties to comply with their privacy policies. In this seminar, we explore how to combat third-party suppliers’ impact on companies’ cybersecurity and risk from smart selection of partners to building a disciplined governance framework.
Network Monitoring – Uncomplicated and Simplified
Businesses rely on networks for all operations, making network monitoring crucial for any business. Join this seminar to learn how to reduce network outages and quickly detect, diagnose, and resolve multi-vendor network performance issues with affordable, easy-to-use network monitoring software.
Tips to Remain GDPR Compliant
Security is not a game. With the GDPR law effective since May 2018, a failure to comply with the current regulations could cost millions to a company. Fast-tracking compliance with GDPR has become imperative. Join this seminar to grasp best practices and tips to remain GDPR compliant.
(Why) your Enterprise Needs Cyber Insurance
Today’s businesses are more likely to be a victim of cybercrime than a burglary. When targeted by a hacker, the response takes time and money, disrupting your business, losing revenue and damaging the business reputation. In this seminar, we explore the benefits of cyber insurance and the reasons why your business requires it.
Essential Capabilities of an Analytics-Driven SIEM
Join this seminar to learn how analytics-driven SIEMs can help you to:
- Monitor threat and correlate events in real-time
- Improve your incident response with an organised way to address a potential breach
- Monitor user behaviour to uncover misuse
- Recognise abnormal activity, assess the risk and prioritise responses through threat intelligence
- Produce visual insights from mountains of data through advanced analytics powered with ML
Breaking down sources of Cloud Data Risk
With the average enterprise organisation experiencing 30 cloud-related security threats each month – a significant increase from last year – cloud security and cloud-related risk management are becoming increasingly relevant to enterprises. Join us to deep-dive into key cloud security strategies.
Exchanging Data Without Uncertainties
Creating a robust Data-Security System that allows you to use, move and lose your data without compromising it, exposing it to cyber risk is the ultimate goal to leverage the full potential of your data. In this seminar, we explore best practices and techniques to encrypt or tokenise data to move your security systems wherever your data travels.