12 May 2020
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre-selection is required – delegates will be able to select which session they attend onsite.
Hybrid Cloud or Multi-Cloud security for the Public Sector
In this seminar we look at how your organisation can:
- Prevent and detect intrusions and breaches
- Get consistent protection and visibility across cloud, virtualised data centres
- Integrate security with your DevOps processes
- Automate manual processes
- Learn how to migrate and protect your data with multi-cloud and hybrid cloud
Implementing complete endpoint protection
User privacy protections, respecting data confidentiality and national infrastructure protection are intimately tied to endpoint protections. We look into possible solutions your organisation can implement to ensure that users – the entry point to sensitive data – are secure.
Going Passwordless: Alternative forms of access
Can your work smart card become your identity solution to access all your applications? Millions of smart cards have been issued this year on the public sector. Should we be giving them more power? We look at the potential of more flexible ways of accessing data, and how smart cards can unlock potential.
Managing Privileged Accounts
IAM has become an indispensable component of security. Today, privileged access control, remote access control or remote access management and revocation are vital tasks that need to be performed accurately. We take a look at how PAM can help you know exactly who accesses what, when, and why – all of the essential prerequisites for setting up a proper security policy that is accountable and traceable.
The Serious Incident Response Playbook
Preventing an incident is vital, but sometimes the damage is inevitable. In this seminar, we will showcase the latest solutions to mitigate incidents and rapidly respond and enhance breach notification decision-making. We aim to provide you with the tools and techniques to adapt to future risks.
Mitigating Third Party Risks
Third-party risk management entails a time-consuming task, but such is its importance that it cannot be overlooked. Fewer than 1 in 5 businesses (18%), and around 1 in 7 charities (14%), require their suppliers to have, or adhere to, any cyber security standard or good practice guides. In this seminar, we discuss the best platforms that reduce costs and time to ensure the safety of your vendors and to restrict their access to your network.
It takes only one small click to put your data security at risk. The ultimate solution would be to disconnect entirely from the internet. But since that is neither realistic nor feasible, we look at how secure browsing can help, especially when it is a truly isolated platform that allows you to not only browse but also view and download documents remotely in the cloud without
compromising your data.
Compliance made simple
Maintaining regulatory compliance (HIPAA, HITECH, GDPR) seems a simple task to perform but may take time and require investment. To improve audit performance, we explore the best solutions for automating the process to ensure regulatory compliance.