Seminar Presentations @


Enterprise Security & Risk Management

13 March 2024

Pullman Hotel St Pancras, London

Seminar Presentations @ ESRM uk

How To Create Successful Malware and How to Defend with Zero Trust


Eoin McGrath, Solution’s Engineer, Threatlocker

A world where anyone can create successful malware or have AI generate it for them, it’s important to know how malware can be successful so you can better defend. Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.

Eoin McGrath – Seminar
Solution's Engineer, Threatlocker
view profile
Room / Location:
Main Conference Room

Managing the Top Risk & Security Concerns for a Successful Cloud Migration


Alex Noble, Cloud Security Lead EMEA, Rapid7

  • This seminar explores strategies and best practices for addressing the critical challenges associated with moving to the cloud.
  • Participants will gain insights into how to navigate the potential risks and bolster security measures to ensure a smooth and secure transition to cloud-based solutions, ultimately facilitating a successful migration process.


Alex Noble – Seminar
Cloud Security Lead EMEA, Rapid7
view profile
Room / Location:
Hyde Park Room 6

Digital Operational Resilience Act: Key Provisions and Best Practices


Joel Brandon, Director, ProcessUnity

The EU’s Digital Operations Resilience Act (DORA) came into force on January 16th 2023, and will be enforceable starting January 27th 2025. Organisations looking to achieve compliance must determine how this regulation will impact their supplier ecosystem and what the regulatory authorities expect them to accomplish by the 2025 deadline.

To protect your organisation from the mounting cybersecurity threat and to achieve compliance in time for DORA enforcement, it is necessary to understand the ICT-related practices regulated by DORA and the tools available to help you achieve compliance. This presentation will provide an overview of the key provisions of DORA and their implications for Third-Party Risk Management (TPRM) teams, list best practices for DORA preparation and review key considerations for teams looking to implement the DORA framework.

Join this session for a discussion about:

  • Key DORA provisions
  • Entities regulated under DORA
  • Implications for third-party risk management teams
  • Best practices for achieving DORA compliance
  • Considerations for DORA implementation
Joel Brandon
Director, ProcessUnity
view profile
Room / Location:
Hyde Park Room 1

Prioritizing AppSec as Part of Resilient Application Development


Patrick Doherty, Senior Solutions Engineer, Checkmarx

A successful AppSec Program is vital to a successful online business. However, getting AppSec right is hard. It requires not just your own team, but also buy-in and active participation from across the organization – especially developers. If you’re turning your attention to ramping up your AppSec, you need to make sure it fits your business and is successful.

The real question then is: where do you start? How can your team quickly make an impact, and where should you go from there? At Checkmarx, we help organizations answer this question for themselves every day. Join us for this round table discussion and learn about how your industry peers think about AppSec, and how to lead your team to jumpstart your own AppSec program, no matter what stage of development you might be in.

Patrick Doherty
Senior Solutions Engineer, Checkmarx
view profile
Room / Location:
Hyde Park Room 2

“Best Practices” in Responding To Cyber Incidents to Mitigate Business Impact


Sinu Peter, Cyber Security Director, CyberProof
Jaimon Thomas, VP Customer Engineering, CyberProof

For enterprises that have migrated to the cloud, the ability to detect & respond quickly is essential to mitigate the potential business impact of an attack. Known for its unconventional methods and use of advanced extortion techniques, BlackCat has quickly risen to prominence in the cybercrime community. As this ransomware group forges its way to gain more clout, we examine its operations and discuss how organizations can shore up their defenses against it. We will share experiences of how we handled a BlackCat ransomware attack and worked effectively with our client, in real time, to eliminate the threat. The incident response is described from the perspective of the Digital Forensics & Incident Response team, and it focuses on demonstrating “Best Practices” regarding incident management. As the threats we face continue to evolve, the streams of data being collected and processed is key to understanding threat coverage within an organisation. We will also discuss how to prioritise event sources and build a cloud-native, cost-optimised data lake to enable continuous threat hunting and detect advanced threats.

Jaimon Thomas
VP Customer Engineering, CyberProof,
view profile
Sinu Peter
Cyber Security Director, CyberProof
view profile
Room / Location:
Hyde Park Room 3

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Questions Around Enterprise Generative AI You Should Be Asking
There has been a lot of talk about enterprise generative AI over the last few months as its use has become more implemented. However, the real questions should be asked by security teams about their providers’ approach to data privacy, transparency, user guidance, and secure design and development. There is no doubt that GenAI is...
Enterprise Security Practices You Can Perform at Home
Security is equally important in the home as it is in the workplace. Enterprise security involves areas of identity management access control, application auditing, and protection of data and information. It is strictly abided to preserve and protect the business from outside hackers and threat actors. However, a similar level of personal security does not...
risk management conference london
Online Safety Protection Guide for Enterprise Employees
Cybersecurity may be the biggest issue in the online world, with ever-evolving apps and programs designed to keep you safe from online threats, but the real world poses genuine threats that your devices can help to protect you from. The question for enterprise employees is – are you utilising the safety features that devices like...