Seminars @

ECS uk

Enterprise Cyber Security

27 September 2022

Guoman Tower Hotel, London

Seminars @ ECS uk

Seminars

Away from the conference hall, you have the opportunity to deep dive into a subject that is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor-made with you in mind.

Solving Your Trust Issues with SASE

SEMINAR A

Zero Trust Security is an urgent priority for organizations with a vested interest in data security, but CISOs everywhere are struggling to find the best solution to enable Zero Trust measures without imposing restrictions and burdens on end-users or compromising their security stack.

The current web, email, and end-point security solutions are not sufficient to address the exponential growth and advancement of cyber threats. However, a disruptive solution utilizing isolation can provide 100% malware-free email and web browsing in a non-disruptive, scalable manner.

Join this session to learn more about the changing future of using SASE service models to achieve Zero Trust Security.

How to Design a Least Privilege Architecture

SEMINAR B

Implementing a least privilege architecture can reduce risk and minimize disruptions by allowing only the minimum required authority to perform a duty or task. Adding network micro-segmentation also restricts east-west movement to reduce the number of vulnerable pathways to applications. When combined, these methods create a granular security environment that provides strong attack resistance.

In this seminar, we will present examples of how to set up a least privilege stack, covering such key issues as where to start and what to prioritize. Additionally, we will present real-world use cases of least privilege stacks and effective micro-segmentation methods that.

Your Data Has Moved to the Cloud. Has Your Security Stack?

SEMINAR C

To protect productivity and enable modern businesses, today’s mobile workforce needs fast, secure, and reliable Internet access. Much of the currently deployed security technology is not equipped to secure today’s volume of Internet traffic, SaaS applications, or offer the security capabilities needed to overcome the challenges presented by today’s expanded attack surface. So, how should security teams secure work and keep up with the demands of the business and workforce?

During this discussion, we will answer that question and dive deep into how organizations are moving away from legacy security solutions to overcome the challenges that remote work presents today.

Detection to Proactive Remediation: Operationalizing Cloud Security Posture Management

SEMINAR D

You know that you can significantly reduce the probability of data breaches by simply configuring cloud correctly. But how do you really operationalize and automate a process that developers can leverage to fix and prevent misconfigured cloud services?

Attend this session to learn how to:

  • Get better visibility into misconfiguration risks & developer mistakes
  • Translate security and compliance requirements into company specific policies
  • Prioritize security findings based on risk & business needs
  • Engage developers to analyse, fix, and prevent misconfigurations
  • Build a feedback loop to optimize cloud security posture management

Working from Home – Keeping the Bad Guys Out

SEMINAR E

End User Computing (EUC) has emerged as a crucial enabling technology for remote work, as it allows employees to work anywhere, anytime, and from any device. But many are still seeking straight answers about the risks and rewards of this approach, as well as practical advice on how to get started.

We address :

  • How to keep your data safe?
  • How to centralize management operations?
  • Whether the end user be able to access data on the local device?
  • What operations models you need to consider when implementing an EUC solution

Holistic Incident & Change Management with AI & Analytics

SEMINAR F

In a digital economy where speed to market, speed to value, and speed to restore are more critical than ever, trusted service providers are expected to excel in both delivery as well as support. This basic understanding of value remains true in a digital economy where speed to value is also matched by an expectation of high-velocity service restoration.

For IT teams this means blending enhanced IT Service Management practices for production support and change enablement with automated pattern recognition, incident clustering, detection, and prevention through the effective use of machine learning and artificial intelligence.

In this engaging session, we will explore how the traditional approaches to Incident and Change Management must be enabled with practical applications of ML and AI.

Topics covered in this webinar will include:

  • The Five Objectives of a High-Velocity Organization
  • Moving from detect and respond to antifragile service organizations
  • Automating the acceleration of service restoration for both normal and major incident management
  • Applying a holistic approach to enabling successful changes

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

 Cyber Security Funding Continues to Skyrocket
Among the biggest record cash injections during and following the global pandemic, cybersecurity startups have been among the highest – including Beyond Identity securing $100m Series C funding. Beyond Identity Beyond Identity’s rise has seen the total invested into the startup reach a total of £205m, with Evolution Equity Partners leading the round on the...
UK Concern Over Russian Cyber-Attacks
Companies in the UK have been urged to vastly improve their digital security processes amid concerns of a swath of potential Russian cyber-attacks that are circling the ongoing political crisis in Ukraine. Updated Guidelines The NCSC (National Cyber Security Centre), part of the GCHQ intelligence agency, has recently updated its guidelines to inform firms that...
Hybrid Working Fuels Business Fears
Over 8 in 10 UK businesses are saying that hybrid working greatly increases their data breach risk, with over a fifth being unprepared for one when it would occur. Speed of response has been labelled as the main concern, and with business owners looking at 43% of their workforces to be hybrid working in the...