Seminars @


Enterprise Security & Risk Management

24 March 2022


Seminars @ ESRM


Away from the conference hall you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.

PAM: Foundational Security for Digital Transformation


As businesses constantly evolve and grow, so does an organization’s attack surface.

The pace and velocity of technology transformation in enterprises has created a difficult environment for security teams to defend against complex threats.

In this session, you will understand how Privileged Access Management (PAM) can support the security team as an enabler to digital transformation, while providing one of the most effective ways to stop lateral movement by threat actors.

We address:

  • What Is Digital Transformation and why should we care about it?
  • Why automation isn’t just for the business
  • How to mitigate identity risk with PAM

Best Practices to Mature Your Third-Party Risk Programme


It’s likely your company has some means for managing third-party risk, but like many organizations, you probably have untapped opportunities to improve your supplier risk program.

What are best-in-class organizations doing today to streamline vendor onboarding, make ongoing monitoring more efficient and ultimately drive more risk out of the business?

Join us during this session and learn key strategies to mature your Supplier Risk Management program.

Attendees will learn how to:

  • Onboard new suppliers faster while keeping risk out
  • Build a scoring system to calculate inherent risk and auto-scope due diligence
  • Incorporate industry-standard questionnaires into assessment processes
  • Improve vendor response rates and submission quality by reducing vendor fatigue
  • Leverage external content to assist in ongoing vendor monitoring Join us for this informative session and learn how to incorporate best practices into your supplier risk management program

Cyber Attack Simulation-visualise your response


In this special attack simulation, get an inside look at how multi-stage attack campaigns operate today.

You will witness the attacker’s infiltration and watch the malicious operation as it moves across the entire environment.

See the many opportunities an attacker has to advance the operation, how defenders can end the attack before crown jewels are compromised.

After running the simulation, see the attack from our Defence Console, which combines endpoint protection (NGAV), endpoint detection and response (EDR), and now extended detection and response (XDR) to help you find and stop malicious operations, wherever they start.

You’ll come away with new knowledge on today’s attack campaigns and insights on how defenders can gain the upper hand.

The session will share the attacker’s mindset, how it impacts our strategies as defenders, and why we can reveal more of the malicious operation with new technologies like Extended Detection and Response (XDR).

Business-Driven Security Management


Managing your network security policy across on-premises firewalls and cloud security controls is a delicate balancing act. On the one hand you need to reduce risk by minimizing the attack surface, on the other you must enable productivity by provisioning connectivity for your critical business applications.

However, network security policy management processes have always been complex, time-consuming, and riddled with errors. They don’t have to be.

On premise and in the cloud, we simplify and automate network security policy management to make your enterprise more agile, more secure and more compliant – all the time.

Make risk-aware decisions with confidence


An effective governance, risk, and compliance (GRC) framework helps an organization align its information technology with business objectives, while managing risk and meeting regulatory compliance requirements.

With the right GRC platform you can simplify how you manage risk and regulatory compliance, powered by AI and data.

As a key feature, our GRC platform is highly scalable and runs anywhere. From behind a firewall to any cloud.

We simplify GRC by centralising siloed ERM functions within a single, transparent environment.

By doing so, we leverage a wide array of technologies and capabilities to minimise the need for user training and help standardise and automate an organisations response to GRC challenges.

TPM for the modern enterprise


Gain control over your network of vendors when managing vendor risk with our innovative third-party risk management software solution.

Our Third-Party Risk Management software solution automates the third-party risk management process and allows you to integrate with broader IT risk management processes and even your data privacy programme.

  • Monitor third-party progress through the built-in workflow, prioritized by their importance to the business
  • Create your own and edit existing questions through a fully configurable question library
  • Configure sophisticated assessments using screening or conditional questions

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Killware is the Next Big Cyberthreat
It may sound like some scary direct-to-DVD horror movie or video game, but the safety of industries, businesses and the general public are gleaming no entertainment or enjoyment about the next big threat. As ransomware has seen a huge increase over the last two years thanks to the global pandemic and the pandora’s box it...
The New Dark Web is Telegram
During October 4th’s full blackout of Facebook, Messenger, Instagram and WhatsApp, millions of people suddenly found themselves scrambling for the 6-hour window towards other means of communication, such as Twitter and LinkedIn. To continue talking with friends and family, many flocked to alternative communication tools such as Viber and Telegram to communicate. In the case...
United Nations Under Data Attack
Threat actors have accessed the United Nation’s proprietary project management software, Umoja, earlier this year stealing information to be used in further attacks. Attacking the UN The threat actor stole credentials from a United Nation’s employee to breach sections of the UN’s network in April of 2021 and steal critical data. The overall aim was...