Seminars @

ECS uk

Enterprise Cyber Security

21 September 2021

Victoria Park Plaza, London

Seminars @ ECS uk


Away from the conference hall you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.

The Seminars will take place from 12:15 – 13:00

Delegates will be able to attend one seminar at the event. No pre-selection is required – delegates will be able to select which session they attend onsite.

How secure are your cloud workloads?


Many businesses still operate under a security model which is built on a trust but verify approach. This leaves many organisations extremely vulnerable and open to attack despite. What is required in response a shift towards zero-trust network in which the natural enterprise approach is to never trust, extensively verify mindset no matter the status of the user.

We address:

  • Network
  • People
  • Devices
  • Workloads
  • Data
Room / Location:
Oudegracht 1-5 (Main Conference Room), Level 1

Managing your endpoints: IT security anywhere and everywhere


In this seminar, we will discuss how to manage the growth of your IT environment as your business expands in size and scale. No matter the industry sector, cybercriminals are becoming increasingly sophisticated in their attempts to target enterprise networks. With the use of new and emerging tech, combined with the expanding attack surface, ensuring that you are able to manage and secure both traditional and modern endpoints is vital.

We address, how to ensure you have the right software to proactively discover, manage and secure both traditional and modern endpoints.

Room / Location:
Domtoren 1, Level 1

Here come the machines!


We live in an increasingly interconnected world, from our IoT home devices which ease the burden of house management to automated work processes which were previously manually enabled. Despite such progress, from a security perspective, the industry is playing catch up.

Join this session in order to learn how to recognise an AI-driven attack, how best to respond to them, and the best places in your network to set up your defences.

Room / Location:
Domtoren 3, Level 1

Moving to the cloud with security in mind


Given that up to 70% of security practitioners are concerned by a lack of visibility into the attack surface, it is clear that what is needed is a solution which is able to add light in place of darkness, maintain productivity in place of disruption, and allow digital transformation initiatives to continue uninterrupted.

We address:

  • Achieve full visibility
  • Reduce the possibility of data breaches
  • Transform cybersecurity effectiveness
  • Secure your digital transformation initiatives
Room / Location:
Domtoren 4, Level 1

Supply chain management: centralise your data sources


As the TPM landscape becomes more crowded with a variety of actors, agencies and organisations, businesses are mandated to match this development with an advanced supply chain management suite designed for today’s enterprise environment.

Join us as we address the key elements which make up a safe, secure, all-in-one TPM platform.

  • Mitigate against disruptions
  • Maintain business continuity
  • Build a resilient supply chain system
Room / Location:
Domtoren 5, Level 1

Threat hunting: seeking out the enemy


You can reduce risk and get the threat context you need to maintain a robust security architecture with an adaptive, reactive, and reliable AI threat hunting solution.

Faster identification and eradication of advanced threats help you to minimise downtime, financial loss and damage to your brand.

Improve the efficiency of your cybersecurity programme with cutting edge threat context and validation of your security controls.

Room / Location:
Domtoren 6, Level 1

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Misconfiguration Error Leads to Energy Provider Data Breach
Eversource, New England’s largest energy provider, has had its customers’ data exposed in a data breach brought on by a misconfiguration error on March 16th. Powering the Breach The provider discovered that one of its cloud data storage folders had been set to open access in error when it was supposed to be set towards...
Apple Extortion Attempt Scrambles Taskforce
Action has been taken by the US Department of Justice following a claim by the infamous REvil (Sodinokibi) group that they have stolen Apple trade secrets via a supplier. This has immediately resulted in the launching of a new ransomware task force. The Resident REvil A blog by the REvil group was posted on its...
Cybersecurity Spend to Skyrocket in 2021 (ECS)
As the global economy is taking slow steps towards a form of recovery, the worldwide security market is estimated to see a growth of up to 10% to top $60bn. Factors at Work Analyst firm Canalys has clarified that the double-digit growth from $54.7bn in 2020 is its best-case scenario, but the worst case is...