26th March 2019
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.
Discover the essentials to include in your incident response plan
An incident response plan should be set up to prepare for a data breach, especially given the inevitably of such a breach occurring.
This seminar is designed to provide you with expert advice on formulating an incident response plan, devising the team necessary to combat it and ensure that the damage done is as limited as possible.
- Lessons Learned
Why AI needs to be part of your defence
Cyber-attackers are leveraging automation technology to launch strikes, while many organizations are still using manual efforts to aggregate internal security findings and contextualizing them with external threat information. Using these traditional methods, it can take weeks or months to detect intrusions, during which time attackers can exploit vulnerabilities to compromise systems and extract data. To address these challenges, organisations are exploring the use of AI in their day-to-day cyber risk management operations.
- Identification of threats
- Risk assessment
- Orchestration of remediation
The role of analytics in security and risk analysis
Analytics tools are not simply a means by which an organisation can measure business performance and interrogate existing data, but also as a tool by which one can test the strength of security infrastructure, assess vulnerabilities and query suspicious activity. This seminar is will provide an invaluable insight into the power of analytics in supporting and fortifying your security architecture.
The implications of a data breach for large scale enterprises
- GDPR’s specific breach notification rule
- How a breach can affect multiple locations and jurisdictions
- How to navigate this complex new environment
- Coordinating people, managing processes and investing in the right technology
How security can enable your digital transformation
Whilst the cyber threat cuts across all industries and sectors its important to understand what requirements your business requires. To reflect your unique functions and operations it’s important to understand how best to deploy and monitor for effectiveness. This seminar is designed to assess your needs and advise accordingly.
- Balancing need to grow with security, determining how to balance these two while enabling delivery
- Staying ahead of the changing tech landscape, overcoming legacy technology challenges
- Enabling new working practices
- Supporting ever growing customer demands
Security in an IoT enabled world
As ever more mobile and IoT devices connect to the internet, the potential for damaging security breaches can only increase. We consider ways in which you can get the upper hand over the burgeoning cast of ‘bad actors’ and consider
- What security you should be embedding into your IoT initiatives
- How you can ensure data privacy while maximising data utility
- Ways to identify if any credentials and devices are compromised
- Key incident response mechanisms in the event of a breach
Keeping your cloud secure
Join this seminar to better understand how you can implement context-aware preventative controls as part of your cloud infrastructure, how to set policies for workload placement and ensure compliance.
- Do you know how to best protect data in transition?
- How to best protect your assets and ensure resilience?
- To ensure necessary separation of users?
- To implement an appropriate governance framework?
Getting your board to buy into your security programme
How to build a business case for security so that achieves CFO buy in
- How traditional ROI analysis to justify security investments is ineffective
- The importance of employing a Total Economic Framework
- How to win the attention of the CFO
- The four vital components to determine investment value
The biggest security breaches of 2018/9
Join us for a discussion of recent high-profile breaches
- How did they occur?
- What was the response?
- What worked and what didn’t?
- What can you learn from the breaches?