Seminar Presentations @

GOVSEC & CyberGov

Government IT and Cyber Security

30 November 2023

Victoria Park Plaza Hotel, London

Seminar Presentations @ GOVSEC & CyberGov

The Purpose and Future of Endpoint Security: Stopping Cyber Threats or Making You Feel Good?


Eoin McGrath, Solution’s Engineer, Threatlocker


The plethora of security vendors operating in today’s marketplace can be overwhelming. With so many options, it’s easy to be distracted with the latest, greatest, shiny tool.

Join Eoin McGrath for a deep dive into the purpose of cybersecurity and how you can use that to your operational advantage today.

Eoin McGrath – Seminar
Solution's Engineer, Threatlocker
view profile
Room / Location:
Main Conference Room

Staying Ahead of the Curve: Navigating Cyber Threat Intelligence in the Evolving Threat Landscape

Erick Thek, Cyber Threat Intelligence Manager, Trend Micro

In an era where the public sector faces an ever-evolving landscape of cyber threats and supply chain vulnerabilities, the imperative to proactively protect critical assets, mitigate risks, and maintain compliance with regulations has never been greater. This seminar dives into themes such as NIS2 compliance, attack surface risk management, and the significance of adopting a proactive stance against emerging threats.

As we explore the challenges public sector organisations encounter, from budget constraints to a shortage of skilled professionals, we will highlight the urgency of staying on the front foot with streamlined security measures. Our discussion will encompass the need for a comprehensive cyber assessment framework and the development of robust processes and policies to bolster the security posture and promote cyber hygiene. Furthermore, we will lead you through the intricacies of hybrid cloud adoption, demonstrating how it can serve as both a solution and a potential risk factor in this complex landscape. In the end, you will understand how to effectively assess, manage, and minimise access risks, making your organization resilient in the face of an ever-changing threat landscape. Join us to gain practical insights and strategies for securing your public sector entity in a world under attack.

Erick Thek – seminar
Cyber Threat Intelligence Manager, Trend Micro
view profile
Room / Location:
Edward 1 Room

AI Powered Identity: Fact or Fantasy?


Rob Byrne, Field Strategist, One Identity
Chris Thorpe, EMEA Cloud Solutions Architect, Quest Software

AI and Machine Learning promise to revolutionize our lives and work practices for the better, not least in the domain of Cyber Security. But is it really “Intelligence”? Is it overhyped and what are the risks it entails? Can AI make my life easier, “just figure things” out and protect my organisation from attacks and risk? How much value can you really offer your organization by bringing these new technologies to bear? Is this a quick win and is my organization mature enough to avail of these new capabilities?​ In this breakout session Chris and Rob will share their experience and best practice helping organizations unlock the value of Identity Intelligence. They will explain pragmatic steps towards the promised AI powered future and explain how your organization can begin to incorporate Identity centered Analytics, Insight and Intelligence into your Cyber Security strategies.​

Rob Byrne
Field Strategist, One Identity
view profile
Chris Thorpe
EMEA Cloud Solutions Architect, Quest Software
view profile
Room / Location:
Edward 3 Room

Cybersecurity in Crisis: Aligning Compliance Strategies to Combat the Triple Threat of Ransomware, Data Breaches, and Extortion Attacks


Richard Cassidy, Field CISO, Rubrik 

“Cybersecurity in Crisis: Aligning Compliance Strategies to Combat the Triple Threat of Ransomware, Data Breaches, and Extortion Attacks”, presents an invaluable opportunity for executives and security leaders to explore, strategise, and mitigate the risks that are threatening our digital landscape.

This cybersecurity seminar is not just about acknowledging the looming threats of ransomware, data breaches, and cyber extortion, but rather understanding their evolution, intricacies, and the implications for your organisation. More importantly, it aims to bridge the gap between reactive firefighting and proactive planning, casting light on the crucial role that compliance plays in this  4th industrial revolution and how to re-think your cyber security strategies to gain an upper hand on the front line of cyber-security warfare.

In a world where cyber threats can cripple organisations overnight, compliance is no longer a tick-box exercise but a strategic imperative. The discussions will be far-reaching, encompassing how to balance business agility with robust security, and how regulatory compliance can serve as an enabler for businesses rather than an obstacle.

This session is a must-attend event for executives who understand that being prepared is not a luxury, but a necessity in today’s interconnected business world.

Richard Cassidy
Field CISO, Rubrik
view profile
Room / Location:
Edward 5 Room

Work Protected: Picking the right battles to avoid over-consolidation


Max Linscott, Director, Market Strategy, Mimecast

Single sourcing technology concentrates cost, complexity and risk. 

  • How consolidated communications infrastructure offers a rich target for the bad guys
  • How the technology choices you make can make Microsoft safer and smarter
  • How you can help your people stay safe and secure by picking the most effective partners for M365
Max Linscott
Director, Market Strategy
view profile
Room / Location:
Edward 7 Room

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

How to Design Your Security Integrations
A Mimecast product manager shares tips for integrating best-of-breed tools via APIs to more quickly identify, analyze and respond to threats. In a rapidly evolving threat environment, effective cyber defense requires a diverse set of focused, best-of-breed security tools. Integrating those tools is key to faster threat identification and response, helping security teams do more...
8 Questions CISOs Should Be Asking About AI
Blog By: Illumio  Trevor Dearing | Industry Solutions Marketing Director Chief information security officers (CISOs) are faced with the daunting task of protecting their organizations against increasingly sophisticated threats — and this will only get more difficult in the years to come with the rise of artificial intelligence (AI). AI is now a tool for both...
Risk management and Cyber Intelligence is key to public sector security
Blog By: One Identity This year the UK government broke new ground in protecting national infrastructure by launching the GovAssure programme. The GovAssure programme promises to be transformative change in government cyber security, by bringing rigour and objectivity to the table. In short, this initiative aims to audit all government departments by semi-independent entities. GovAssure...