Seminars @


Enterprise Security & Risk Management

23 November 2022


Seminars @ ESRM uk


Away from the conference hall you have the opportunity to deep dive into a subject which is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor made with you in mind.

Solving the ‘work anywhere and access everything’ security challenge


The corporate world has changed in many ways. Some forced, some desired. The end-user experience of working within an organization, large or small, is now paramount to the success of that company.

With over half of employees working remotely, and over 40% expecting this to last for at least the next year, the way companies organize and implement their security operations must change to meet the needs of their end-users, without compromising security.

In this seminar you will learn:

  • How remote and hybrid work has impacted your end-users, security, and IT teams
  • Ways to implement effective threat prevention
  • Different strategies for working smarter, not harder when it comes to deploying security controls

Managing Multi-Cloud Security in 2021


93% of enterprises already have a multi-cloud strategy in place (Flexera 2020 State of Cloud Report). Multi-cloud security protects data and applications from advanced, sophisticated security threats. Some other benefits include reduced costs and better service delivery. But what are the main multi-cloud security trends you can expect to see in 2021?

We address:

  • The benefits of multi-cloud solutions for your security posture
  • The challenges associated with a multi-cloud strategy and how to navigate and overcome these challenges
  • The cloud security landscape of 2021

Reducing the Exposure of External and Internal Assets


Organizations are in a constant race to discover, prioritize and remediate vulnerable assets. Vulnerability assessments don’t consider the effectiveness of compensating controls and the exploitability of vulnerabilities resulting in wasted efforts on non-critical patching.

We have developed a holistic approach that discovers, analyses and challenges the IT infrastructure to prioritize remediation based on the context of your specific environment. This approach combines Attack Surface Management (ASM) – to discover externally accessible assets and identify and prioritize assets that are exposed to exploitation and a CVE centric approach to Security Control Validation to validate the effectiveness of compensating controls.


Attend this seminar to learn how these methodologies enable security teams to identify and prioritize remediation activity of internal and external vulnerabilities that are critical to the security of their organization.

Securing Business Networks in the New Remote Reality


Companies have had to pivot to remote work policies as quickly as possible, with network security often taking a backseat to business continuity. Now, remote working increasingly looks to be a permanent corporate fixture, with Global Workplace Analytics predicting that up to 30% of the workforce will be partially working from home by the end of 2021. Half-baked security protocols can no longer cut it in this new remote reality.

Join this session as we discuss the most critical vulnerabilities of a new remote system and how to safeguard against cyber threats:

  • VPNs and how to choose the right one
  • Threat Hijacking Attacks: what are they and how to protect against them
  • Understanding Your Endpoints and building scalable endpoint management
  • Making Cloud Security work for your organization

Mutually Assured Security: Securing yourself, your customers and your vendors


We are all striving to implement the best security practices to protect our companies. Hackers are looking to target our organization’s external surface in hopes of getting access to and/or stealing sensitive data.

Join this seminar to learn:


  • The top vulnerabilities in a corporate network
  • Suggested first steps in securing a corporate network
  • How cybersecurity pros stay safe in our digital world

Breaking the Chain: Hindering ransomware attacks


Ransomware is a clear and present danger to companies and global supply chains. With ransomware attacks crippling multiple sectors on a global scale, companies must pivot to a proactive approach to interrupt the kill chain whenever possible.

Attend this seminar as we cover:

  • Recent ransomware attacks – what you can learn from their prevention tactics and response following the attack
  • How threat actors choose their targets, locate infiltration points, infect systems, and extort organisations
  • Best Practices to disrupt the ransomware kill chain at multiple points

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Google Takes Stand on Android Enterprise Security
This past week, Google launched the Android Enterprise Vulnerability Rewards Program, the latest boosting of Android Enterprise security, accompanied by several new capabilities and tools within Android 12. Boasting Features Android 12, currently available on Pixel phones and launching on multiple devices later in the year, boasts more default enterprise security features over its operating...
Killware is the Next Big Cyberthreat
It may sound like some scary direct-to-DVD horror movie or video game, but the safety of industries, businesses and the general public are gleaming no entertainment or enjoyment about the next big threat. As ransomware has seen a huge increase over the last two years thanks to the global pandemic and the pandora’s box it...
The New Dark Web is Telegram
During October 4th’s full blackout of Facebook, Messenger, Instagram and WhatsApp, millions of people suddenly found themselves scrambling for the 6-hour window towards other means of communication, such as Twitter and LinkedIn. To continue talking with friends and family, many flocked to alternative communication tools such as Viber and Telegram to communicate. In the case...