Seminars @

ESRM americas


2 September 2021

Brought to you by Whitehall Media

Seminars @ ESRM americas

The Seminars will take place from 12:15 – 13:00

Evaluate cutting-edge technology and solution providers through our Live Web Seminars by attending solution provider sessions. Connect with your fellow IAM and IT security leaders and dive into thoughtful conversations spurred by powerful sessions and hear directly from the experts behind the latest IAM innovations.

All sessions will be available on-demand after, so you won’t miss anything.  Session times are subject to change. Participants can also connect with peers and experts to ask questions, share insights, and get the most from the leaders in the industry

PLEASE NOTE: All-Conference Sessions (including slides) will be presented in English ONLY
Delegates will be able to attend two seminars at the event ‘live’ as they will run in two sessions.
All event footage will be available on-demand for a maximum of 2 hours after the session has closed.

Integrated risk management: release the potential


The successful path from GRC to truly integrated risk management can be realised through six key building blocks.

Discover how to develop a compliance driven GRC or risk management programme into a truly responsive, dynamic, and integrated RMP and understand the limits of traditional approaches to risk management in the era of increased digital risk.

Adopting a full life cycle approach to cloud security: convergence is key


Cloud native applications require different rules and techniques compared to traditional approaches to network security. Using the same security product on end user facing endpoints as you would for server workloads, and continuing to do so during cloud migrations, simply does not meet today’s security requirements.

We address:

  • supporting application growth with a dynamic approach
  • shifting your security options
  • combine CWPP with emerging CSPM
  • account for all evolution in security needs

Zero-trust network access: business enabler


The limitations of traditional VPNs have been illuminated the Covid-19 pandemic. As a result, enterprises are increasingly adopting zero trust network access as a business enabler. ZTNA allows businesses to control remote access to specific applications at a time when the surge towards remote working looks set embed itself as a preferred method of working for many employers and employees.

We address, how ZTNA keeps business apps hidden from the internet, communicates only to the ZTNA service provider, and can only be accessed via a ZTNA provider’s cloud service.

Automating third party risk management


With the right technology in place, businesses can better manage the increasingly complex nature of third-party risk management. The implementation and management of a fully scalable automated TPRM can make your organisation more effective and efficient.

Join the growing list of security and risk leaders who understand that without automation and augmentation businesses will fail in their efforts to securely manage what is an ever-expanding list of partners, contractors, agents, and vendors.

Detect and prioritise threats


Being able to provide your security teams with the right kind of technology to detect and prioritise threats is vital if you are to defend against the growing list of hostile actors and the wide variety of ways in which breaches occur. By having the AI security system in place, you will be better able to identify and prioritise threats which can affect the entire business.

We address how the right platform can help you deliver intelligent insights at speed in order for your security team to act quicker.

Data leak detection: assessing your level of exposure


Your enterprises sensitive information is already outside of your network, and to a very large extent, outside of your control. This leaves your data vulnerable to being retrieved and embedded within and across various layers of the internet, from the surface web to the dark web.

With the right platform, you can continuously monitor every layer of the internet and gain a comprehensive understanding of your level of exposure as well as what internal remediation may be required.

We address:

  • surface web
  • deep and dark web
  • connected storage

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

The Enterprise Security Threat of Mobile Devices
In the rush to ensure workforces could successfully operate remotely during the pandemic, businesses left themselves in one of the biggest vulnerable positions possible when it came to cybercriminals. Remote Working Problem Whilst businesses sighed a breath of relief in being able to quickly push their remote working plan into effect, it came at the...
MobiKwik Denial on Data Breach, Security Researchers Provide Proof
Digital payments firm MobiKwik has been quick to deny certain claims by security researchers who flagged that a substantial amount of consumer data was made available on the dark web due to a system breach. Shortly after the denial by the company which is currently planning for an initial public offering, a swathe of security...
Make sure the doors are locked before trying to profile the burglar
For years we have been searching for a miracle cure for the common cold. Bizarrely, during 2020 almost no one had a cold, because of COVID we have all stayed away from each other, caught sneezes, worn masks and washed our hands. We have eaten better (some people have anyway), we have exercised more, in...