Seminars @


Government IT Security

26 May 2022


Seminars @ GOVSEC


Connect with your fellow leaders and dive into thoughtful conversations spurred by powerful sessions and hear directly from the experts behind the latest innovations.

The Tale of the Changing Threat Landscape


Simon Walsh, Cyber Security Architect, Trend Micro

Trend Micro blocked over 94 billion threats in 2021, a 42% year on year increase, and malicious actors are likely to step up their attacks once again this year.

Against this background, Simon will discuss the 2021 ransomware attack on the Irish Health Service Executive, and how one hospital successfully defended themselves against same, something he was intricately involved with from day one.

Simon will also look at how a unified approach to threat detection and response can help you discover your attack surface, assess your risk, and ultimately mitigate it.

Simon Walsh
Cyber Security Architect, Trend Micro
view profile
Room / Location:
Session 3 @ 13:30

The Path to Zero Trust by Securing Privileged Identities


Brian Chappell, Chief Security Strategist, BeyondTrust
Brendan Casey, Solutions Engineer, BeyondTrust

Attacks on identity and privileged access pathways are relentless, with the stakes of a cyber-breach never higher. Securing privileged identity within your organisation has never been more important as it is the foundation of a successful Zero Trust implementation. Zero Trust is built on foundations that are essential across your cybersecurity strategy, delivering greater value from existing cyber investments.

In this interactive workshop, Brian will outline:
• Why protecting identities is fundamental to achieving Zero Trust
• Practical steps you can take NOW to secure your privileged identities
• The pivotal role Privileged Access Management plays in achieving Zero Trust

Brian Chappell
Chief Security Strategist, BeyondTrust
view profile
Brendan Casey
Solutions Engineer, BeyondTrust
view profile
Room / Location:
Session 3 @ 13:30

Best Practices in Identity Centric Cyber Resilience


Alan Radford, Global Identity and Access Management Strategist, One Identity
Alistair Holmes, Software Sales Engineering, Quest

Our view on cyber resilience is that organizations should always assume a breach has occurred, as even the best perimeter defenses can do nothing to stop bad guys from eventually breaking in. That’s why you must have strong internal security and governance. With our unique focus on identity-centered security coupled with market-leading AD management, Quest and One Identity help organizations secure their internal Microsoft environment to protect the most critical and targeted assets … Active Directory accounts and Office 365 resources.

Alan Radford
Global Identity and Access Management Strategist, One Identity
view profile
Alistair Holmes
Software Sales Engineering, Quest
view profile
Room / Location:
Session 3 @ 13:30

The Benefits of Adopting External Data Controls in Both Multi-Cloud and Hybrid Worlds


Romi Hamplova, Cyber Security Specialist, Thales

Embracing the cloud transformation brought to light new challenges in data ownership, data sovereignty and data security best practices. With continued data breaches making the headlines we will talk about how digital sovereignty and data encryption are linked together and essential areas to consider when transitioning to cloud or operating in an hybrid space. We will showcase how you can grasp control of your current cloud footprint as well as maintaining the ownership of your data without relinquishing control to your Cloud Service Provider (CSP).

We will share our experience working with governments departments in our capacity as a trusted data security advisor and demonstrate how to adhere to key compliance requirements. We will decipher some of the common encryption terms (EKMS, BYOK, HYOK, BYOE, CMEK, etc) and emphasise the most important best practices. Thales CPL is a Market leader and innovator in data security, encryption and key management.


Romi Hamplova
Cyber Security Specialist, Thales
view profile
Room / Location:
Session 3 @ 13:30

REVIL: Pick your Path


Adrian Culley, Senior Security Engineer, Cybereason

Today’s Ransomware actors are operating to devastating effect as evidenced by recent attacks such as Colonial Pipeline and JBS attacks, showing that a successful attack can disrupt any business. Cyber Security leadership in several countries have warned about the prevalence and impact of these attacks. In this session, we will walk through the steps and effects of the REVIL ransomware attack as if it were on your infrastructure. Cybereasons’ recent best ever results in MITRE round 4 highlight our unique ability to stop ransomware before it starts. As we do so you will be able to learn how these attacks can be identified, mitigated and stopped, whilst considering your current state of readiness.

 Adrian Culley
Senior Security Engineer, Cybereason
view profile
Room / Location:

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

New Cyber Security Regulations Via EU Commission
The European Commission (EC) has proposed new regulations to establish common cyber and information security measures to bolster resilience and response capacity against a wider range of cyber threats. New Rules Under the new proposal cybersecurity regulation published on March 22 2022, all European Union (EU) institutions, bodies, offices and agencies are required to have...
Identity Transformation in the Public Sector
SailPoint talked to Jason Corbishley, CISO, Police Digital Service; and Kurt Frary, Deputy Director of Information Management & Technology / CTO Norfolk County Council, about what identity management means to them. Identity is at the heart of access controls. As more and more people choose to work from home, public sector organisations have had to...
Youtube, TikTok and Instagram Exposed in 223 Million Account Data Breach
In data breach news, this month saw a database of almost 235 million social media profiles exposed on the internet from such recognisable platforms as Youtube, Instagram and TikTok. The research undertaken has identified that information breached could open users up to phishing and impersonation scamming as well as unwarranted email usage. On August 1st,...