Seminars @

ECS uk

Enterprise Cyber Security

27 September 2022


Seminars @ ECS uk


Away from the conference hall, you have the opportunity to deep dive into a subject that is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor-made with you in mind.

Solving Your Trust Issues with SASE


Zero Trust Security is an urgent priority for organizations with a vested interest in data security, but CISOs everywhere are struggling to find the best solution to enable Zero Trust measures without imposing restrictions and burdens on end-users or compromising their security stack.

The current web, email, and end-point security solutions are not sufficient to address the exponential growth and advancement of cyber threats. However, a disruptive solution utilizing isolation can provide 100% malware-free email and web browsing in a non-disruptive, scalable manner.

Join this session to learn more about the changing future of using SASE service models to achieve Zero Trust Security.

How to Design a Least Privilege Architecture


Implementing a least privilege architecture can reduce risk and minimize disruptions by allowing only the minimum required authority to perform a duty or task. Adding network micro-segmentation also restricts east-west movement to reduce the number of vulnerable pathways to applications. When combined, these methods create a granular security environment that provides strong attack resistance.

In this seminar, we will present examples of how to set up a least privilege stack, covering such key issues as where to start and what to prioritize. Additionally, we will present real-world use cases of least privilege stacks and effective micro-segmentation methods that.

Your Data Has Moved to the Cloud. Has Your Security Stack?


To protect productivity and enable modern businesses, today’s mobile workforce needs fast, secure, and reliable Internet access. Much of the currently deployed security technology is not equipped to secure today’s volume of Internet traffic, SaaS applications, or offer the security capabilities needed to overcome the challenges presented by today’s expanded attack surface. So, how should security teams secure work and keep up with the demands of the business and workforce?

During this discussion, we will answer that question and dive deep into how organizations are moving away from legacy security solutions to overcome the challenges that remote work presents today.

Detection to Proactive Remediation: Operationalizing Cloud Security Posture Management


You know that you can significantly reduce the probability of data breaches by simply configuring cloud correctly. But how do you really operationalize and automate a process that developers can leverage to fix and prevent misconfigured cloud services?

Attend this session to learn how to:

  • Get better visibility into misconfiguration risks & developer mistakes
  • Translate security and compliance requirements into company specific policies
  • Prioritize security findings based on risk & business needs
  • Engage developers to analyse, fix, and prevent misconfigurations
  • Build a feedback loop to optimize cloud security posture management

Working from Home – Keeping the Bad Guys Out


End User Computing (EUC) has emerged as a crucial enabling technology for remote work, as it allows employees to work anywhere, anytime, and from any device. But many are still seeking straight answers about the risks and rewards of this approach, as well as practical advice on how to get started.

We address :

  • How to keep your data safe?
  • How to centralize management operations?
  • Whether the end user be able to access data on the local device?
  • What operations models you need to consider when implementing an EUC solution

Holistic Incident & Change Management with AI & Analytics


In a digital economy where speed to market, speed to value, and speed to restore are more critical than ever, trusted service providers are expected to excel in both delivery as well as support. This basic understanding of value remains true in a digital economy where speed to value is also matched by an expectation of high-velocity service restoration.

For IT teams this means blending enhanced IT Service Management practices for production support and change enablement with automated pattern recognition, incident clustering, detection, and prevention through the effective use of machine learning and artificial intelligence.

In this engaging session, we will explore how the traditional approaches to Incident and Change Management must be enabled with practical applications of ML and AI.

Topics covered in this webinar will include:

  • The Five Objectives of a High-Velocity Organization
  • Moving from detect and respond to antifragile service organizations
  • Automating the acceleration of service restoration for both normal and major incident management
  • Applying a holistic approach to enabling successful changes

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Hybrid Working Fuels Business Fears
Over 8 in 10 UK businesses are saying that hybrid working greatly increases their data breach risk, with over a fifth being unprepared for one when it would occur. Speed of response has been labelled as the main concern, and with business owners looking at 43% of their workforces to be hybrid working in the...
China the Focus for Cyber Sabotage
The UK and allies, including the US and Canada, have released recent statements accusing the Chinese government of “systematic cyber-sabotage”, believing that state-sponsored hackers were behind an early 2021 attack that compromised around the figure of 400,000 worldwide servers and leaving them open and exposed to cybercriminals. Tied to Beijing In the UK alone, more...
The ransomware that shows up everywhere but the headlines
The most reported ransomware strain of 2021 so far – accounting for around 71% of the total – is not a headline grabbing, multi-million-dollar ransom threat targeting a large enterprise, but a file-encrypting virus called DJVU or STOP ransomware that targets home users and has more than 290 variations. It’s important to keep things in perspective and to remember...