Seminars @



31 March 2022

Brought to you by Whitehall Media

Seminars @ ESRM


At 12:30 delegates will have the opportunity to break away from the conference hall you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.

Times are changing. Threats are evolving. Prepare yourself. A look back at the top security threats in 2021 & lessons learned


Sam Hector, Senior Security Sales Manager, IBM Technology, UKI
Martin Cook, Senior Sales Engineer, ReliaQuest
Stuart Wilson, Managing Director,

Join our panel discussion to explore the key findings of IBM’s recent X-Force Threat Intelligence Index report and gain a comprehensive overview of the global threat landscape.

You will find out just how big the impact of Log4J was, why Ransomware wasn’t the UK’s most common attack, and what lessons we learned that you can take forward to better protect your business in 2022.

Sam Hector
Senior Security Sales Manager, IBM Security UK and Ireland
view profile
Room / Location:
Main Conference Room @ 12:30 GMT

Mitigate Risks and Grow Revenue with an Identity-First Security Policy


Matthew Berzinski, Senior Director, Product Management, ForgeRock

Password-and username-related breaches increased by over 450% in 2020. Meanwhile, 43% of internal breaches were the result of unauthorised access. Either of these attacks has the ability to lower customer confidence in your brand and drive them to the competition. Today’s modern identity and access management (IAM) solutions help organisations grow revenue and customer confidence while mitigating the risks of identity fraud, cybersecurity breach, and unauthorised access.

Join ForgeRocker Matthew Berzinski to get practical insights on how purpose-built, enterprise-grade IAM capabilities can help you:

– Protect customer trust and loyalty by enforcing an identity centric security posture with context-based monitoring & assessment capabilities
– Deliver exceptional experiences by building a real-time view of customer needs and engagement behaviours with a complete 360 degree of their identity
– Mitigate unauthorised access and enforce least privilege by leveraging Artificial Intelligence to automate workforce Identity Governance and enforce Zero Trust policies in real time

Matthew Berzinski
Senior Director, Product Management ForgeRock
view profile
Room / Location:
Room A @ 12:30 GMT

‘Shifting left’; changing behaviours to embrace AppSec Transformation


Patrick Doherty, Senior Sales Engineer, Checkmarx

To stay ahead of the game in application security requires a well-designed and well-tuned AppSec program, but how do you know where your organisation is on the AppSec maturity curve? How do you create a company-wide culture that understands and embraces the importance ‘shifting left’? And how can you measure the success and ROI of your AppSec investments?

Join Patrick Doherty, Senior Sales Engineer, Checkmarx to learn more about:

• What is ‘shifting left’, its importance and how to encourage organisation wide adoption
• How to assess your current state of AppSec maturity, identifying areas of weakness and the tools & mindset needed to be successful
• Building a structured AppSec Program that not only demonstrates & measures ROI but is agile enough to adapt to the evolving threat landscape

Patrick Doherty
Senior Sales Engineer, Checkmarx
view profile
Room / Location:
Room B @ 12:30 GMT

Ransomware: One of your biggest risks – don’t let it in


Adenike Cosgrove, Cybersecurity Strategy, International, Proofpoint

Mitigating the risk of ransomware to your business has become the job of every security product and service available today. But measuring the impact of technology on the risk of exposure is rarely achievable until it’s too late.

Endpoint security and EDR solutions will help you respond once you already have a ransomware problem. So how do you measurably reduce the risk of the problem occurring before it’s too late?

We’ll discuss common attack vectors for ransomware and demonstrate how you can quicky reduce your risk by improving your email protection – the number one ransomware threat vector.

Adenike Cosgrove
Cybersecurity Strategy, International, Proofpoint
view profile
Room / Location:
Room C @ 12:30 GMT

Cross-Cloud Hacking: Stealing Salesforce Data via GitHub & Slack


James Dawson, Cloud Security Architect, Varonis

Watch an attacker exploit a user’s personal Gmail account to gain access to a corporate GitHub repo and move laterally through Slack to Salesforce, stealing highly confidential customer data. We’ll show you exactly how this attack is performed, then highlight how Varonis can both pro-actively reduce the blast radius of cloud attacks as well as making it easier to discover and prevent cross-cloud attacks.

James Dawson
Cloud Security Architect, Varonis
view profile
Room / Location:
Room D @ 12:30 GMT

New Strategies for Operational Resilience & Supplier Risk Management


Joel Brandon, Sales Director, EMEA, ProcessUnity

In the UK, rapid technological advancements, changing consumer behaviors, and increasing cybersecurity concerns have led regulators to consider new strategies to address economic stability through outsourcing and third parties. As a result, operational resilience has become a leading focus for the UK Prudential Regulation Authority (PRA).  How prepared are you for the Prudential Regulatory Authority’s (PRA) new guidelines on outsourcing and third-party risk management? The PRA’s revised requirements that go into effect later this month set new standards for outsourcing arrangements, including how to assess materiality, rules around concentration risk and new expectations around compliance.

Join ProcessUnity for a session on the proposed changes and tips on how to approach the changing regulatory landscape.

Attendees will learn:

– How outsourcing will change once the guidelines are enacted
– Best practices to develop an appropriate methodology for assessing materiality
– Guidance to help you understand outsourcing risks and the steps needed to minimize them
– Insight on implementing a robust contingency plan to ensure compliance and protect operational resiliency

Joel Brandon
Sales Director, EMEA, ProcessUnity
view profile
Room / Location:
Room E @ 12:30 GMT

Choosing the Right Data Protection Strategy: offline, immutable, or air-gapped?


Tim Jeffcoat, Systems Engineer, Veeam

Now more than ever, it’s critical for businesses to remain confident that their data is protected and always available, whether it’s on premises, at the edge or in the cloud. But with an ever-evolving threat landscape, what is the best strategy to protect key business data? Join us to discuss answers to this question, including a demo of a key data protection best-practise. You’ll also see the findings of Veeam’s third annual study of Data Protection Trends, which asked 3,000 IT decision makers and IT professionals about their data protection drivers and strategies heading into 2022.

Tim Jeffcoat
Systems Engineer, Veeam
view profile
Room / Location:
Room F @ 12:30 GMT

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Hotel Hostility as Hackers Target the Hospitality Sector
Among the top three targeted industries by cyber hackers around the world, hotels and the hospitality businesses are suddenly feeling the increase of the growing cybercrime rates. Rich Mining Despite being bricks-and-mortar enterprises, they are considered one of the richest mines for data by hackers looking to utilise the data for nefarious purposes. Even before...
Increased Attack Threat Following Ukraine Crisis
Ever since the first stages of the Ukraine invasion by Russia, widespread predictions relating to cyber operations launching parallel to the fighting have highlighted the threat of collateral damage across the entire global corporate sector. Fresh Threats For those in the insurance industry still recovering from the widespread surge in ransomware attacks, Russia’s Ukraine actions...
Enterprise Shift in Cyber Protection
Throughout the last few years, the cyber landscape has been dominated by rising levels of ransomware attacks, increasing by 105% in 2021 alone. Sophos’ report (State of Ransomware 2021) revealed that an average ransom paid out now equals $170,404 with remediation costs at $1.85m – ten times the size of the ransom payment on average....