Wednesday 18 March 2019
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.
Main Conference Plenary Room
Phishing: How it can land a big target
Scott Lester, Cyber Lab Manager, 6point6
The session will cover the continuing threat posed by phishing and spear-phishing cyber attacks, both of which remain amongst the most prevalent and effective form of attack across almost every industry. We’ll provide an overview of the threats, and talk through the steps 6point6 Cyber Lab followed when setting-up an example phishing capability. We will also present a spear-phishing process demo, beginning with the selection and researching of the target(s) through to crafting the email and executing the attack. We\’ll then cover exactly what an attacker can do from the moment their email triggers the first click from the target…
Integrating threat detection and response into your security operations
In recognition of the shift from threat prevention to threat detection, organisations are increasingly investing in solutions which seek out threats rather than sit and wait.
By 2022, half of all security operations centres will have adopted an integrated incident response, threat intelligence and threat-hunting analytics.
We address how best security and risk leaders can build and outsource a security operations centres which are able to support the integration of threat intelligence, security alerts and automated responses.
Prioritising investment in data security governance frameworks
Without a strong understanding of what is meant by effective data governance, the increasing complexity of data security has the potential to disrupt key business processes which support organisational functionality.
We explore how best to deploy a data protection model which supports your unique business requirements.
- Deploying a business-centric data security governance framework
- Identifying and classifying data assets
- Selecting a suitable technology to minimise risks
- Address data security by starting with the perceived business risk
There exists an increasing number of solutions designed to overcome the obvious shortcomings in the traditional method of gaining access to the network and having your identity verified.
In order to combat hackers who are able to easily target passwords in order to gain access to enterprise applications, organisations are turning to solutions which relate the device to the user.
In this session, we explore the use of cloud-based access control which incorporates multifactor authentication, passwordless single sign-on, and a powerful trust engine that leverages a variety of factors.
Addressing the skills shortage by supplementing your security team
The number of unfilled security roles is expected to reach 1.5m by the end of 2020.
Whilst the advancements of AI and automation have reduced the need for people to analyse typical security alerts, more complex alerts still require the attention of the human eye.
Attend this seminar in order to understand:
- How best to support your security team by fusing our solution with an on-demand operational service
- Support product adoption through the integration of security teams
- Full management outsourcing or targeted support and advice
- Flexibility when choosing the package which suits your demands
Adopting a continuous threat intelligence analytical platform
Realising the need to adopt a strategic approach to security which complements the need to balance security friction with transactional risk, is a difficult task.
We explore how best to deploy a threat intelligence analytics platform which is capable of continuously assessing risk and trust even after access has been extended to business users, end-users and third parties.
In particular, we will address email and network security as two security domains that are moving in this direction in order to continuously detect anomalies even after authentication has been verified.
How security can enable your digital transformation
Whilst the cyber threat cuts across all industries and sectors its important to understand what requirements your business requires. To reflect your unique functions and operations it’s important to understand how best to deploy and monitor for effectiveness. This seminar is designed to assess your needs and advise accordingly.
- Balancing need to grow with security, determining how to balance these two while enabling delivery
- Staying ahead of the changing tech landscape, overcoming legacy technology challenges
- Enabling new working practices
- Supporting ever-growing customer demands
Keeping your cloud secure
Join this seminar to better understand how you can implement context-aware preventative controls as part of your cloud infrastructure, how to set policies for workload placement and ensure compliance.
- Do you know how to best protect data in transition?
- How to best protect your assets and ensure resilience?
- To ensure necessary separation of users?
- To implement an appropriate governance framework?