Seminars @

ESRM americas


2 September 2021

Brought to you by Whitehall Media

Seminars @ ESRM americas

The Seminars will take place from 12:15 – 13:00

Evaluate cutting-edge technology and solution providers through our Live Web Seminars by attending solution provider sessions. Connect with your fellow IAM and IT security leaders and dive into thoughtful conversations spurred by powerful sessions and hear directly from the experts behind the latest IAM innovations.

All sessions will be available on-demand after, so you won’t miss anything.  Session times are subject to change. Participants can also connect with peers and experts to ask questions, share insights, and get the most from the leaders in the industry

PLEASE NOTE: All-Conference Sessions (including slides) will be presented in English ONLY
Delegates will be able to attend two seminars at the event ‘live’ as they will run in two sessions.
All event footage will be available on-demand for a maximum of 2 hours after the session has closed.

Integrated risk management: release the potential


The successful path from GRC to truly integrated risk management can be realised through six key building blocks.

Discover how to develop a compliance driven GRC or risk management programme into a truly responsive, dynamic, and integrated RMP and understand the limits of traditional approaches to risk management in the era of increased digital risk.

Adopting a full life cycle approach to cloud security: convergence is key


Cloud native applications require different rules and techniques compared to traditional approaches to network security. Using the same security product on end user facing endpoints as you would for server workloads, and continuing to do so during cloud migrations, simply does not meet today’s security requirements.

We address:

  • supporting application growth with a dynamic approach
  • shifting your security options
  • combine CWPP with emerging CSPM
  • account for all evolution in security needs

Zero-trust network access: business enabler


The limitations of traditional VPNs have been illuminated the Covid-19 pandemic. As a result, enterprises are increasingly adopting zero trust network access as a business enabler. ZTNA allows businesses to control remote access to specific applications at a time when the surge towards remote working looks set embed itself as a preferred method of working for many employers and employees.

We address, how ZTNA keeps business apps hidden from the internet, communicates only to the ZTNA service provider, and can only be accessed via a ZTNA provider’s cloud service.

Automating third party risk management


With the right technology in place, businesses can better manage the increasingly complex nature of third-party risk management. The implementation and management of a fully scalable automated TPRM can make your organisation more effective and efficient.

Join the growing list of security and risk leaders who understand that without automation and augmentation businesses will fail in their efforts to securely manage what is an ever-expanding list of partners, contractors, agents, and vendors.

Detect and prioritise threats


Being able to provide your security teams with the right kind of technology to detect and prioritise threats is vital if you are to defend against the growing list of hostile actors and the wide variety of ways in which breaches occur. By having the AI security system in place, you will be better able to identify and prioritise threats which can affect the entire business.

We address how the right platform can help you deliver intelligent insights at speed in order for your security team to act quicker.

Data leak detection: assessing your level of exposure


Your enterprises sensitive information is already outside of your network, and to a very large extent, outside of your control. This leaves your data vulnerable to being retrieved and embedded within and across various layers of the internet, from the surface web to the dark web.

With the right platform, you can continuously monitor every layer of the internet and gain a comprehensive understanding of your level of exposure as well as what internal remediation may be required.

We address:

  • surface web
  • deep and dark web
  • connected storage

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Insider Cybersecurity Risks On Ascent
The ongoing struggle in managing remote working staff members is continuing to open up gaping holes in corporate cybersecurity larger than at any time prior to the pandemic, with the insider threat now raised to critical levels. Poll Positions Cybersecurity vendor Netwrix Took a poll of close to 1000 IT professionals focused on how COVID-19...
Ransomware Achieves High Score Over Capcom
Video Games are one of the biggest enterprises in the modern world with many industry giants providing access to online gaming platforms. However, what happens when the games you love to play take away more than your player lives? This is the current situation many people at Japanese game powerhouse Capcom have been faced with...
Mashable: Latest Data Breach Victim
Data breaches have seen no sign of slowing over the 2020 period with every major chain, brand and online source having minor to major incidents, some even resulting in fines within the millions for not implementing up to date security measures to prevent theft and protect consumer data. The most recent victim comes in the...