Wednesday 27th November 2019
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.
Security management convergence: breaking down silos
The issue of siloed physical and InfoSec teams is only increasing in complexity. With a security management programme which prioritises convergence, you can begin the process of bringing together physical and InfoSec security professionals to move beyond such silos that have
traditionally restricted the ability to adopt a single view of security risks.
- Identifying risk
- Assessing risk
- Mitigating risk
- Being prepared to respond to unforeseen events
Understand data risk in your third-party ecosystem
What do we mean by risk in the extended enterprise? And how do we identify and then assess these risks?
Given the highly interconnected technology ecosystem, organisations are required to rely on third party vendors to meet their operational needs. Such a development has only increased the challenge of privacy management. Therefore, it is vital that businesses have a reliable mechanism to analyse vendor engagements and assess vendor compliance considering strengthened regulatory compliance.
We address the specific use case of third-party management and associated implications for risk decision-making across the extended enterprise and enabling organisations to conduct vendor due diligence both during the initial vendor onboarding phase and during re-audit.
Mobile security for digital business
Effective mobile device management software gives you visibility and control of iOS, macOS, Android, and window devices by enabling you to get the most out of MDM without being labour intensive.
By attending this seminar, you will discover how cognitive insights and contextual analytics simplify device, app, content, data and network security can empower your business.
Implementing adaptive security architecture
Naturally, the primary concern of enterprise IT security teams is preventing a cyberattack. This has produced a climate in which incident response rather than a continuous response mindset has developed in which systems are assumed to be compromised and require continuous monitoring and remediation.
Implementing an adaptive security architecture has proven benefits for enterprise security and risk mitigation, but many have either implemented poorly performing models or have not yet moved towards adoption.
We address the key stages of adaptive security architecture, how it informs policy, maintains compliance and how you can successfully implement.
How to measure your cyber-security performance
Ensuring maximum competitiveness requires a continuously improving mindset. Such a mindset is equally valid in cyber-security.
Having the tools to harvest and digest security benchmarking information is vital for CIO’s. Being able to map the progress and performance of your cyber-security is key if you are to understand the level at which it is functioning. Increasing visibility means being able to evaluate the resources required to fix issues and prepare for future difficulties.
- How to get a complete picture of your organisation’s security performance
- Be able to make comparisons with your peer’s IT security capabilities
- Learn why benchmarking is critical for today’s CIO’s
- How to clearly communicate benchmarking data to your board
Leveraging ML and AI to improve security
Successfully leveraging machine learning and AI algorithms to defend against advanced, previously unseen cyber-threats means being at the cutting edge of enterprise security.
- Being able to to pre-empt emerging threats
- Reduce incident response time
- Achieve 100% visibility of your entire business cloud, network and IoT environments
- How automation and autonomous response can enable security teams to neutralise in-progress attacks, prioritise resources and lower risk
Implementing Process Automation for optimised operational performance
Achieving process automation is the priority for 80% of enterprises.
The reason for such a focus on automation is because it can transform critical business capabilities, enable greater speeds of growth and establish digital dominance over competitors. But, as with all technologically informed innovations in business performance, process automation, and the achievement of it, has become a process, with many organisations struggling to achieve implementation across the enterprise.
Whether you are looking to begin the process of automating key business processes, assessing your current automation capabilities, or looking to build the case for implementation, this seminar is designed to give you a clear outline of how to achieve optimised operational performance through automation.
Defending the cloud: defending against phishing attacks
As cloud services mature, the ability to understand the tools and services available to your business which an attacker can use to create relevant phishing attacks to gain access to vital cloud services is of great importance.
This seminar is designed to educate you on how customised phishing attacks are launched through insight gained by observing your cloud services and what you can do to protect against such malicious innovations.