Seminar Presentations @


Enterprise Cyber Security

11 September 2023

Dubai Habtoor Palace, Dubai

Seminar Presentations @ ECS UAE & GULF

Discover, Protect & Control – Data Security for a Zero Trust World


To operate securely in today’s mobile and cloud-first world, organisations must protect their data and control who has access to it. Being able to discover, protect, and control critical assets enables organisations to modernize data security for a zero-trust world.

In this presentation you’ll learn more about how we help our customers:

  • Protect sensitive data and secure user access to that data
  • Accelerate compliance and streamline data security
  • Secure root of trust for IOT and digital payments

Universal Privilege Management – A Modern Approach to PAM


Virtually every cybersecurity breach today involves the exploitation of privileged access.

Privileges are initially exploited to infiltrate an IT environment; once compromised by threat actors, privileges are further leveraged to move laterally, access assets, install malware, and inflict damage.

In this session, learn the key steps involved in achieving Universal Privilege Management, and how it is used to secure every user, session, and asset across your IT environment.

Topics covered include:

  • Why relying on password management alone leaves dangerous gaps in protection  – Disrupting the cyberattack chain with privileged access security controls
  • Essential steps to achieving rapid leaps in risk reduction
  • Keys to a frictionless PAM solution that is invisible to end users

Silver Linings: Immune System Technology for Cloud & SaaS


Cloud and SaaS platforms have created digital environments where businesses can innovate, collaborate, and share more than ever before. However, this is often at the cost of visibility and control.

Join us as we discuss the challenges of securing cloud and SaaS applications and learn why self-learning AI is best-in-class in protecting organizations’ dynamic workforces and constantly changing digital infrastructure.

The Role of AI in a Changing Security Paradigm: Why Prevention Is Always Better than Cure


The security professional’s job has become an endless game of cat and mouse, with continual pursuits of invisible attackers that can out-think, outrun, and outsmart most security systems.

To combat these attackers and other threats, enterprises are increasingly turning to endpoint detection and response (EDR) solutions that provide advanced levels of endpoint protection.

Attend this session so you can learn:

  • How AI-driven cybersecurity offers organisations a strong defence against both legacy and emerging threats
  • How organizations can embrace a new approach to EDR that ensures their endpoints are not weak links against cyberthreats
  • Discover how a new, revolutionary approach leverages a foundational math model built on artificial intelligence that prevents breaches

Security from Endpoint to Cloud – Securing Productivity from anywhere


As we continue to adapt to permanent hybrid working there is a need to keep employees productive on any device while they work with corporate data across multiple sources.

For many organisations this presents significant challenges and blind spots remain.

This session will look at the issues associated with hybrid working and show how to effectively move towards a Zero Trust model.

Topics covered –

  • Trends in hybrid working models
  • The risks and threats linked to public clouds and unmanaged endpoints – phishing, ransomware, data leakage
  • How to enable ‘work from anywhere’ without compromising privacy
  • How to effectively bridge security from endpoint to cloud

Four Common Mistakes in IRM and How to Build an Effective Incident Response Plan


In its report, The State of Ransomware 2020, we found more than half of organisations were hit by ransomware in the last year, and nearly three-quarters of attack victims said the cybercriminal succeeded in encrypting their data.

It’s a growing dilemma for businesses, who are reliant on their cyber security to offer an optimum resolution to posing threats and maintaining the quality of their daily usage online.

But for IT professionals and executives, it’s easy to undervalue basic reasons on how to stay cyber safe.

This presentation highlights the four common cybersecurity incident response mistakes: 1. Waiting too long to react 2. Declaring “mission accomplished” too soon 3. Relying on complete visibility 4. Assuming you can handle your issues on your own.

Many firms have conceded that cyber security is an ongoing task that requires full investment and time to make their stakeholders completely satisfied, and here, we focus on ways it can help your business within three key areas: protection, visibility and expertise.

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

What’s New In The Cato CTRL SASE Threat Report?
Cato’s Cyber Threat Research Lab (Cato CTRL) recently unveiled its first SASE threat report, issuing a comprehensive and exhausting insight into issues and insights with enterprise and network threats.  Based on Cato’s ability to analyse networks extensively and granularly, the report pinpoints threats by combining strategic, tactical, and operational standpoints via the MITRE ATT&CK framework....
Platform-Wide AI and Enterprise Security: The Recall Issue
Whenever an AI product due for rollout is delayed suddenly, many questions begin circulating in the media. The official reasoning why will open the floodgates of many people online spouting their ideas of what the problem has been. Microsoft has recently revealed the delay of their controversial artificial intelligence (AI) powered Recall feature for Copilot+PCs....
Enterprise Security
Incognito Mode Won’t Protect Your Enterprise Security
Many enterprises have set a precedent that online browsing within IT departments or other company-based computers should be performed under incognito windows, such as those offered by Google Chrome browsers and other providers. While online search and work activity may feel secure with your identity and preferences set to a private mode, according to research...