Enterprise Security & Risk Management

26 March 2019

Victoria Park Plaza




26th March 2019

The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.



Discover the essentials to include in your incident response plan

An incident response plan should be set up to prepare for a data breach, especially given the inevitably of such a breach occurring.

This seminar is designed to provide you with expert advice on formulating an incident response plan, devising the team necessary to combat it and ensure that the damage done is as limited as possible.

  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Lessons Learned


Sponsored by:
Incident Response, Training and a 23 Tonne Truck

Mike Spradbery, Senior Technical Leader, IBM Security UK & Ireland

Join this interactive session where we will explore incident response, the need for cyber security training from the boardroom down and how this all relates to a 23 tonne truck.


Sponsored by:
Public Cloud: Risks and Security Considerations

Pascal Gennens, EMEA Security Evangelist, Radware

Organisations are moving applications and workloads to the cloud. Motivations, strategies and objectives behind migrating are quite differing from one organization to the next and even between applications within the organization. Moving assets and applications to the public cloud comes with new risks of exposure. Reaching for the benefits and opportunities of native cloud services and its new technologies such as serverless will shift your security paradigm away from the traditional protections we have come to trust. The attack surface of the public cloud is now defined by privileges and access controls while what once was an insider threat is now to be considered a public threat.

Securing the public cloud infrastructure is only partly the responsibility of your cloud service provider; cloud security is a shared responsibility. Securing your cloud infrastructure only gets you so far. Once applications and/or APIs get published, you are exposing your assets and resources in a completely new way and will require more advanced protections against intrusions, exploits, breaches and attempts to interrupt the availability of your services. More than half of the traffic processed by your online service will consist of automated bot traffic. Managing and distinguishing the good from the bad bots will allow your online business to thrive, failing to do so will seriously inhibit your chances for success.


Sponsored by:

AI: Positive forces at work, or false positives?

David Atkinson, Founder & CEO, Senseon

False positives or ‘innocent anomalies’ are a huge distraction for over-stretched security teams who would be better off investigating genuine malicious activity. Join David Atkinson, Founder and CEO of Senseon as he shares insight into his unique AI approach that gathers context and triangulates threats across the entire digital estate. Find out how Senseon automates investigation, reduces false positives and simplifies the security stack to save you time and precious resource.


Sponsored by:
Cloud Sacrifice – Not all Clouds are created equal

Paul Martini, Chief Executive Officer, iboss

Hear from Paul Martini, CEO at iboss discussing the topic of Cloud Sacrifice and how not all clouds are created equal. How do you make the right choice when transitioning from an on-premise appliance-based security solution, to a cloud solution whilst ensuring no security capabilities are sacrificed?


Security in an IoT enabled world

As ever more mobile and IoT devices connect to the internet, the potential for damaging security breaches can only increase. We consider ways in which you can get the upper hand over the burgeoning cast of ‘bad actors’ and consider

  • What security you should be embedding into your IoT initiatives
  • How you can ensure data privacy while maximising data utility
  • Ways to identify if any credentials and devices are compromised
  • Key incident response mechanisms in the event of a breach