Seminars @

ECS uk


21 September 2021

Brought to you by Whitehall Media

Seminars @ ECS uk


Away from the conference hall you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.

Delegates will be able to attend one seminar live at the event. No pre-selection is required – delegates will be able to select which session they attend live and watch the remainder on demand.

Seminar A – BeyondTrust – Building Cybersecurity Immunity to Ransomware with PAM


James Maude, Lead Cyber Security Researcher, BeyondTrust

Ransomware shows no signs of abating. Digital transformation, expanding cloud deployments, and increased remote work are all creating new planes of privileges for ransomware to exploit. In the session James Maude, Lead Cyber Security Researcher, BeyondTrust, will explore ransomware attacks and how you can protect your environment by making it inhospitable to them. Attend this session to learn: • 6 things to know about ransomware • Realistic security practices you can implement to protect against ransomware • The role of PAM (privileged access management) in mitigating the risks of ransomware and other cyber threats with a powerful, blended defense.

view presentation

James Maude
Lead Cyber Security Researcher, BeyondTrust
view profile
Room / Location:
Session 4 @ 13:45

Seminar B – IBM – Quantifying Cyber Risk and Communicating with Key Stakeholders


This panel session will be moderated by Ray Stanton, Executive Partner, IBM 

Kevin Drolet,
Senior Manager, IT Governance, Risk and Compliance, Wood
Daniel Norman, Senior Solutions Analyst, Information Security Forum Limited
Simi Deb, Associate Partner, Security Strategy, Risk and Compliance, IBM

Today’s CISOs are expected to effectively quantify, manage and reduce cyber risk, while navigating through different tools and methodologies.
Understanding what your key internal and external stakeholders need in order to manage the cybersecurity risk is critical.
Join this session to hear from our expert panel on areas such as:-

  • How important it is to understand the risk appetite of the business to align your cyber risk strategy.
  • Best practices to ensure effective quantifying and sharing of cyber risk in financial terms in order to communicate clearly and concisely with key stakeholders, including the board.
  • Which methodologies, approaches and 3rd party tools can help transform the security relationship with the business

view presentation

Ray Stanton
Executive Partner, IBM
view profile
Room / Location:
Session 4 @ 13:45

Seminar C – Sophos – Incident Response Best Practices


Kostandino Kustas, Senior Sales Engineer, Sophos

Four Common Mistakes and How To Build an Effective Incident Response Plan In its report, The State of Ransomware 2020, Sophos found more than half of organisations were hit by ransomware in the last year, and nearly three-quarters of attack victims said the cybercriminal succeeded in encrypting their data. It’s a growing dilemma for businesses, who are reliant on their cyber security to offer an optimum resolution to posing threats and maintaining the quality of their daily usage online. But for IT professionals and executives, it’s easy to undervalue basic reasons on how to stay cyber safe.

This presentation highlights the four common cybersecurity incident response mistakes:

1. Waiting too long to react

2. Declaring “mission accomplished” too soon

3. Relying on complete visibility

4. Assuming you can handle your issues on your own Many firms have conceded that cyber security is an ongoing task that requires full investment and time to make their stakeholders completely satisfied, and here, Sophos focuses on ways it can help your business within three key areas: protection, visibility and expertise.

view presentation

Kostandino Kustas
Senior Sales Engineer, Sophos
view profile
Room / Location:
Session 4 @ 13:45

Seminar D – RiskRecon – The Neighborhood Watch: Using Continuous Monitoring To Increase Visibility and Effectiveness Of TPRM Programs


Jonathan Ehret, CISSP, CISA, CRISC, VP Vice President, Strategy & Risk, RiskRecon

While organizations have devoted countless resources to securing their borders and the precious data that resides within it, many often ship that same data to third parties without much thought as to how that vendor is protecting it for them. For those that are checking the security posture of their vendors, it is often accomplished via the use of a point in time security questionnaire.

But do those questionnaires provide the right visibility? Visibility into our vendors’ security controls and the effectiveness with which they are operating have been and continue to be some of the major challenges in the world of third party risk.

This discussion will cover those struggles, the inherent limitations of the security questionnaire as well as how continuous monitoring tools can be utilized to shed light on the effectiveness of a vendor’s security controls.

view presentation

Jonathan Ehret
CISSP, CISA, CRISC, VP Vice President, Strategy & Risk, RiskRecon
view profile
Room / Location:
Session 4 @ 13:45

Seminar E – OneTrust – A How-To Guide: Navigating the Top 7 Trends in Third-Party Risk Management 


Sandrine Lagrange, CIPP/E, CIPM Senior Solutions Engineer, OneTrust 

The world of third-party risk management is rapidly changing. Each day, organizations like yours face new security, privacy, and compliance threats when working with third parties. The good news is there are world-class teams around the world that are paving the way with new best practices for the next generation of third-party risk management. In working with hundreds of these organizations, we’ve seen first-hand what it takes to be successful and secure when working with third parties.

So, is your third-party risk management program ahead of the curve? Attend this webinar to find out and learn more about:

– New trends in the third-party risk industry

– What emerging threats you can expect and how to address them

-How to find and leverage assessment communities and shared due diligence data




view presentation

Sandrine Lagrange
CIPP/E, CIPM Senior Solutions Engineer, OneTrust
view profile
Room / Location:
Session 4 @ 13:45

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

China the Focus for Cyber Sabotage
The UK and allies, including the US and Canada, have released recent statements accusing the Chinese government of “systematic cyber-sabotage”, believing that state-sponsored hackers were behind an early 2021 attack that compromised around the figure of 400,000 worldwide servers and leaving them open and exposed to cybercriminals. Tied to Beijing In the UK alone, more...
The ransomware that shows up everywhere but the headlines
The most reported ransomware strain of 2021 so far – accounting for around 71% of the total – is not a headline grabbing, multi-million-dollar ransom threat targeting a large enterprise, but a file-encrypting virus called DJVU or STOP ransomware that targets home users and has more than 290 variations. It’s important to keep things in perspective and to remember...
Security SOS Week 2021: Registration Now Open!
Registration is now open for this year’s Security SOS Week which takes place September 13-16, 2021. Get up to speed on malware, cyber insurance, supply chain attacks, and corporate cybersecurity defence strategies in a series of daily 40-minute podcast interviews with Sophos Senior Technologist, Paul Ducklin. Sessions run each day from 11a.m to 12p.m. Security SOS...