Seminars @

ECS uk

Enterprise Cyber Security

21 September 2021

Victoria Park Plaza, London

Seminars @ ECS uk


Away from the conference hall you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.

The Seminars will take place from 12:15 – 13:00

Delegates will be able to attend one seminar at the event. No pre-selection is required – delegates will be able to select which session they attend onsite.

How secure are your cloud workloads?


Many businesses still operate under a security model which is built on a trust but verify approach. This leaves many organisations extremely vulnerable and open to attack despite. What is required in response a shift towards zero-trust network in which the natural enterprise approach is to never trust, extensively verify mindset no matter the status of the user.

We address:

  • Network
  • People
  • Devices
  • Workloads
  • Data
Room / Location:
Oudegracht 1-5 (Main Conference Room), Level 1

Managing your endpoints: IT security anywhere and everywhere


In this seminar, we will discuss how to manage the growth of your IT environment as your business expands in size and scale. No matter the industry sector, cybercriminals are becoming increasingly sophisticated in their attempts to target enterprise networks. With the use of new and emerging tech, combined with the expanding attack surface, ensuring that you are able to manage and secure both traditional and modern endpoints is vital.

We address, how to ensure you have the right software to proactively discover, manage and secure both traditional and modern endpoints.

Room / Location:
Domtoren 1, Level 1

Here come the machines!


We live in an increasingly interconnected world, from our IoT home devices which ease the burden of house management to automated work processes which were previously manually enabled. Despite such progress, from a security perspective, the industry is playing catch up.

Join this session in order to learn how to recognise an AI-driven attack, how best to respond to them, and the best places in your network to set up your defences.

Room / Location:
Domtoren 3, Level 1

Moving to the cloud with security in mind


Given that up to 70% of security practitioners are concerned by a lack of visibility into the attack surface, it is clear that what is needed is a solution which is able to add light in place of darkness, maintain productivity in place of disruption, and allow digital transformation initiatives to continue uninterrupted.

We address:

  • Achieve full visibility
  • Reduce the possibility of data breaches
  • Transform cybersecurity effectiveness
  • Secure your digital transformation initiatives
Room / Location:
Domtoren 4, Level 1

Supply chain management: centralise your data sources


As the TPM landscape becomes more crowded with a variety of actors, agencies and organisations, businesses are mandated to match this development with an advanced supply chain management suite designed for today’s enterprise environment.

Join us as we address the key elements which make up a safe, secure, all-in-one TPM platform.

  • Mitigate against disruptions
  • Maintain business continuity
  • Build a resilient supply chain system
Room / Location:
Domtoren 5, Level 1

Threat hunting: seeking out the enemy


You can reduce risk and get the threat context you need to maintain a robust security architecture with an adaptive, reactive, and reliable AI threat hunting solution.

Faster identification and eradication of advanced threats help you to minimise downtime, financial loss and damage to your brand.

Improve the efficiency of your cybersecurity programme with cutting edge threat context and validation of your security controls.

Room / Location:
Domtoren 6, Level 1

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Cryptocurrency Theft Sees 10 Jailed
In the latest data theft news circles, ten hackers have been arrested around the world following a series of ‘sim swapping’ attacks targeted at high-profile victims in the United States. The aim was to hijack phone numbers of famous musicians, sports stars and online influencers as well as family members which allowed them to steal...
Current Attack Trends on Organizations
Of the many threats that industry spanning worldwide organizations face and continue to be on the uprise, the most common and intractable is Ransomware. Whilst many organizations are adapting improvements to better combat and recover from attacks, ransomware threat actors are also adjusting their attack models also. By September 2020, 1 in every 4 attacks...
The Most Effective Techniques to Protect Yourself Online
As the year’s go on and more and more people turn their daily lives into internet soap operas, the ever growing list of what is considered a data breach and casualties continues to widen from marketers tracing every step you take online to photographs being pillaged on social networks. There are however tactics that can...