Tuesday 22nd September, 2020
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.
Supply Chain Security: When Caring Is Not Sharing
The number of third parties having access to IT systems is increasing. Most of them have widespread access to company data, and many businesses do not require third parties to comply with their privacy policies. In this seminar, we explore how to combat third-party suppliers’ impact on companies’ cybersecurity and risk from smart selection of partners to building a disciplined governance framework.
Security Penetration Testing
In this seminar we look at the importance of de-biasing and stress-testing to help decision-makers consider previously overlooked sources of uncertainty to judge whether the company’s risk-bearing capacity can absorb their potential impact.
Network Monitoring – Uncomplicated and Simplified
Businesses rely on networks for all operations, making network monitoring crucial for any business. Join this seminar to learn how to reduce network outages and quickly detect, diagnose, and resolve multi-vendor network performance issues with affordable, easy-to-use network monitoring software.
Tips to Remain GDPR Compliant
Security is not a game. With the GDPR law effective since May 2018, a failure to comply with the current regulations could cost millions to a company. Fast-tracking compliance with GDPR has become imperative. Join this seminar to grasp best practices and tips to remain GDPR compliant.
(Why) your Enterprise Needs Cyber Insurance
Today’s businesses are more likely to be a victim of cybercrime than a burglary. When targeted by a hacker, the response takes time and money, disrupting your business, losing revenue and damaging the business reputation. In this seminar, we explore the benefits of cyber insurance and the reasons why your business requires it.
Essential Capabilities of an Analytics-Driven SIEM
Join this seminar to learn how analytics-driven SIEMs can help you to:
- Monitor threat and correlate events in real-time
- Improve your incident response with an organised way to address a potential breach
- Monitor user behaviour to uncover misuse
- Recognise abnormal activity, assess the risk and prioritise responses through threat intelligence
- Produce visual insights from mountains of data through advanced analytics powered with ML
Breaking down sources of Cloud Data Risk
With the average enterprise organisation experiencing 30 cloud-related security threats each month – a significant increase from last year – cloud security and cloud-related risk management are becoming increasingly relevant to enterprises. Join us to deep-dive into key cloud security strategies.
Exchanging Data Without Uncertainties
Creating a robust Data-Security System that allows you to use, move and lose your data without compromising it, exposing it to cyber risk is the ultimate goal to leverage the full potential of your data. In this seminar, we explore best practices and techniques to encrypt or tokenise data to move your security systems wherever your data travels.