Seminars
Away from the conference hall you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.
The Seminars will take place from 12:15 – 13:00
Delegates will be able to attend one seminar at the event. No pre-selection is required – delegates will be able to select which session they attend onsite.
Tackling your biggest IAM challenges
SEMINAR A
Tackling, taming, and mastering your IAM needs is the top enterprise objective of our time thanks to the global nature of today’s business environment. From the need to facilitate regionally dispersed remote access demands to onboarding and offboarding in line with business demands, the IAM landscape has never been more fraught with risk.
We address, how a fully managed, universal IAM platform, from strategy, deployment, management, automation, analytics, and optimisation, can alleviate your security and risk concerns.

Room / Location:
Domtoren 1, Level 1
Zero trust security: a fundamental approach to enterprise security and risk
SEMINAR B
A context-rich security and risk ecosystem is one in which an established governance framework is able to expertly share business-critical information between security tools which protect connections between users, data, and resources.
By pivoting towards zero trust your organisation will provide themselves with the best opportunity to protect its data, resources, and people.
We address:
- Understand users, data, and resources
- Protect your business and grant access with ease
- Resolve security incidents without interrupting operations
- Adopt a continuous improvement mindset with flexible policies and practices

Room / Location:
Domtoren 3, Level 1
Protect your web and app-based operations
SEMINAR C
In order to not only thrive but survive in today’s globalised business environment in which start-ups threaten the capitalisation of longstanding brands, enterprises must maintain access points to employee web and app-based services and operations.
The growth in employee mobile access requests is, however, a relative goldmine to hackers looking to take advantage of its reduced security features.
We look at, how to best assess current and future web use requirements, the layered protection you need to address the threat, and how both businesses and users can protect devices, applications, and transactions.

Room / Location:
Domtoren 4, Level 1
Enterprise-level cloud security
SEMINAR D
As workloads continue to shift from on-prem to the cloud, businesses are having to account for the security implications this brings.
By automating, centralising, and simplifying your cloud architecture, you will drive your business forward, improve defences and reduce risk.
We address:
- Transform your security practices
- Adopt a more reactive security posture
- Enable an automated and elastic approach
- Stay ahead of all threats

Room / Location:
Domtoren 5, Level 1
Integrate your human and technology capabilities
SEMINAR E
By deploying an endpoint detection and response capability which is able to dramatically reduce the time-to-action queries which enterprises must investigate and resolve on an all too frequent basis, you will add a powerful layer of technology-enabled security to your key digital assets.
From your email, endpoints, servers, cloud workloads, and networks, the need to secure your most at-risk features is clear to all but the solution is not.
Join us as we address how to leverage superior detection technology designed to protect against a growing list of threats and attacks.

Follow us on social
Keep up to date with what's going on by following us on social media.