Seminars @


Enterprise Security & Risk Management

24 November 2021

Business Design Centre, London

Seminars @ ESRM uk


Away from the conference hall you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.

The Seminars will take place from 12:15 – 13:00

Delegates will be able to attend one seminar at the event. No pre-selection is required – delegates will be able to select which session they attend onsite.

Tackling your biggest IAM challenges


Tackling, taming, and mastering your IAM needs is the top enterprise objective of our time thanks to the global nature of today’s business environment. From the need to facilitate regionally dispersed remote access demands to onboarding and offboarding in line with business demands, the IAM landscape has never been more fraught with risk.

We address, how a fully managed, universal IAM platform, from strategy, deployment, management, automation, analytics, and optimisation, can alleviate your security and risk concerns.

Room / Location:
Domtoren 1, Level 1

Zero trust security: a fundamental approach to enterprise security and risk


A context-rich security and risk ecosystem is one in which an established governance framework is able to expertly share business-critical information between security tools which protect connections between users, data, and resources.

By pivoting towards zero trust your organisation will provide themselves with the best opportunity to protect its data, resources, and people.

We address:

  • Understand users, data, and resources
  • Protect your business and grant access with ease
  • Resolve security incidents without interrupting operations
  • Adopt a continuous improvement mindset with flexible policies and practices
Room / Location:
Domtoren 3, Level 1

Protect your web and app-based operations


In order to not only thrive but survive in today’s globalised business environment in which start-ups threaten the capitalisation of longstanding brands, enterprises must maintain access points to employee web and app-based services and operations.

The growth in employee mobile access requests is, however, a relative goldmine to hackers looking to take advantage of its reduced security features.

We look at, how to best assess current and future web use requirements, the layered protection you need to address the threat, and how both businesses and users can protect devices, applications, and transactions.

Room / Location:
Domtoren 4, Level 1

Enterprise-level cloud security


As workloads continue to shift from on-prem to the cloud, businesses are having to account for the security implications this brings.

By automating, centralising, and simplifying your cloud architecture, you will drive your business forward, improve defences and reduce risk.

We address:

  • Transform your security practices
  • Adopt a more reactive security posture
  • Enable an automated and elastic approach
  • Stay ahead of all threats
Room / Location:
Domtoren 5, Level 1

Integrate your human and technology capabilities


By deploying an endpoint detection and response capability which is able to dramatically reduce the time-to-action queries which enterprises must investigate and resolve on an all too frequent basis, you will add a powerful layer of technology-enabled security to your key digital assets.

From your email, endpoints, servers, cloud workloads, and networks, the need to secure your most at-risk features is clear to all but the solution is not.

Join us as we address how to leverage superior detection technology designed to protect against a growing list of threats and attacks.

Room / Location:
Domtoren 6, Level 1

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

The Enterprise Security Threat of Mobile Devices
In the rush to ensure workforces could successfully operate remotely during the pandemic, businesses left themselves in one of the biggest vulnerable positions possible when it came to cybercriminals. Remote Working Problem Whilst businesses sighed a breath of relief in being able to quickly push their remote working plan into effect, it came at the...
MobiKwik Denial on Data Breach, Security Researchers Provide Proof
Digital payments firm MobiKwik has been quick to deny certain claims by security researchers who flagged that a substantial amount of consumer data was made available on the dark web due to a system breach. Shortly after the denial by the company which is currently planning for an initial public offering, a swathe of security...
Make sure the doors are locked before trying to profile the burglar
For years we have been searching for a miracle cure for the common cold. Bizarrely, during 2020 almost no one had a cold, because of COVID we have all stayed away from each other, caught sneezes, worn masks and washed our hands. We have eaten better (some people have anyway), we have exercised more, in...