Seminars @ 12:30
Connect with your fellow leaders and dive into thoughtful conversations spurred by powerful sessions and hear directly from the experts behind the latest innovations.
The Purpose and Future of Endpoint Security: Stopping Cyber Threats or Making You Feel Good?
SEMINAR
A
Eoin McGrath, Solution’s Engineer, Threatlocker
The plethora of security vendors operating in today’s marketplace can be overwhelming. With so many options, it’s easy to be distracted with the latest, greatest, shiny tool.
Join Eoin McGrath for a deep dive into the purpose of cybersecurity and how you can use that to your operational advantage today.
SEMINAR A
Eoin McGrath, Solution’s Engineer, Threatlocker
The plethora of security vendors operating in today’s marketplace can be overwhelming. With so many options, it’s easy to be distracted with the latest, greatest, shiny tool.
Join Eoin McGrath for a deep dive into the purpose of cybersecurity and how you can use that to your operational advantage today.


Eoin McGrath – Seminar
Solution's Engineer, Threatlocker
view profileRoom / Location:
Main Conference Room
Staying Ahead of the Curve: Navigating Cyber Threat Intelligence in the Evolving Threat Landscape
SEMINAR
B
Erick Thek, Cyber Threat Intelligence Manager, Trend Micro
In an era where the public sector faces an ever-evolving landscape of cyber threats and supply chain vulnerabilities, the imperative to proactively protect critical assets, mitigate risks, and maintain compliance with regulations has never been greater. This seminar dives into themes such as NIS2 compliance, attack surface risk management, and the significance of adopting a proactive stance against emerging threats.
As we explore the challenges public sector organisations encounter, from budget constraints to a shortage of skilled professionals, we will highlight the urgency of staying on the front foot with streamlined security measures. Our discussion will encompass the need for a comprehensive cyber assessment framework and the development of robust processes and policies to bolster the security posture and promote cyber hygiene. Furthermore, we will lead you through the intricacies of hybrid cloud adoption, demonstrating how it can serve as both a solution and a potential risk factor in this complex landscape. In the end, you will understand how to effectively assess, manage, and minimise access risks, making your organization resilient in the face of an ever-changing threat landscape. Join us to gain practical insights and strategies for securing your public sector entity in a world under attack.
SEMINAR B
Erick Thek, Cyber Threat Intelligence Manager, Trend Micro
In an era where the public sector faces an ever-evolving landscape of cyber threats and supply chain vulnerabilities, the imperative to proactively protect critical assets, mitigate risks, and maintain compliance with regulations has never been greater. This seminar dives into themes such as NIS2 compliance, attack surface risk management, and the significance of adopting a proactive stance against emerging threats.
As we explore the challenges public sector organisations encounter, from budget constraints to a shortage of skilled professionals, we will highlight the urgency of staying on the front foot with streamlined security measures. Our discussion will encompass the need for a comprehensive cyber assessment framework and the development of robust processes and policies to bolster the security posture and promote cyber hygiene. Furthermore, we will lead you through the intricacies of hybrid cloud adoption, demonstrating how it can serve as both a solution and a potential risk factor in this complex landscape. In the end, you will understand how to effectively assess, manage, and minimise access risks, making your organization resilient in the face of an ever-changing threat landscape. Join us to gain practical insights and strategies for securing your public sector entity in a world under attack.


Erick Thek – seminar
Cyber Threat Intelligence Manager, Trend Micro
view profileRoom / Location:
Edward 1 Room
AI Powered Identity: Fact or Fantasy?
SEMINAR
C
Rob Byrne, Field Strategist, One Identity
Chris Thorpe, EMEA Cloud Solutions Architect, Quest Software
AI and Machine Learning promise to revolutionize our lives and work practices for the better, not least in the domain of Cyber Security. But is it really “Intelligence”? Is it overhyped and what are the risks it entails? Can AI make my life easier, “just figure things” out and protect my organisation from attacks and risk? How much value can you really offer your organization by bringing these new technologies to bear? Is this a quick win and is my organization mature enough to avail of these new capabilities? In this breakout session Chris and Rob will share their experience and best practice helping organizations unlock the value of Identity Intelligence. They will explain pragmatic steps towards the promised AI powered future and explain how your organization can begin to incorporate Identity centered Analytics, Insight and Intelligence into your Cyber Security strategies.
SEMINAR C
Rob Byrne, Field Strategist, One Identity
Chris Thorpe, EMEA Cloud Solutions Architect, Quest Software
AI and Machine Learning promise to revolutionize our lives and work practices for the better, not least in the domain of Cyber Security. But is it really “Intelligence”? Is it overhyped and what are the risks it entails? Can AI make my life easier, “just figure things” out and protect my organisation from attacks and risk? How much value can you really offer your organization by bringing these new technologies to bear? Is this a quick win and is my organization mature enough to avail of these new capabilities? In this breakout session Chris and Rob will share their experience and best practice helping organizations unlock the value of Identity Intelligence. They will explain pragmatic steps towards the promised AI powered future and explain how your organization can begin to incorporate Identity centered Analytics, Insight and Intelligence into your Cyber Security strategies.


Rob Byrne
Field Strategist, One Identity
view profile
Chris Thorpe
EMEA Cloud Solutions Architect, Quest Software
view profileRoom / Location:
Edward 3 Room
Cybersecurity in Crisis: Aligning Compliance Strategies to Combat the Triple Threat of Ransomware, Data Breaches, and Extortion Attacks
SEMINAR
D
Richard Cassidy, Field CISO, Rubrik
“Cybersecurity in Crisis: Aligning Compliance Strategies to Combat the Triple Threat of Ransomware, Data Breaches, and Extortion Attacks”, presents an invaluable opportunity for executives and security leaders to explore, strategise, and mitigate the risks that are threatening our digital landscape.
This cybersecurity seminar is not just about acknowledging the looming threats of ransomware, data breaches, and cyber extortion, but rather understanding their evolution, intricacies, and the implications for your organisation. More importantly, it aims to bridge the gap between reactive firefighting and proactive planning, casting light on the crucial role that compliance plays in this 4th industrial revolution and how to re-think your cyber security strategies to gain an upper hand on the front line of cyber-security warfare.
In a world where cyber threats can cripple organisations overnight, compliance is no longer a tick-box exercise but a strategic imperative. The discussions will be far-reaching, encompassing how to balance business agility with robust security, and how regulatory compliance can serve as an enabler for businesses rather than an obstacle.
This session is a must-attend event for executives who understand that being prepared is not a luxury, but a necessity in today’s interconnected business world.
SEMINAR D
Richard Cassidy, Field CISO, Rubrik
“Cybersecurity in Crisis: Aligning Compliance Strategies to Combat the Triple Threat of Ransomware, Data Breaches, and Extortion Attacks”, presents an invaluable opportunity for executives and security leaders to explore, strategise, and mitigate the risks that are threatening our digital landscape.
This cybersecurity seminar is not just about acknowledging the looming threats of ransomware, data breaches, and cyber extortion, but rather understanding their evolution, intricacies, and the implications for your organisation. More importantly, it aims to bridge the gap between reactive firefighting and proactive planning, casting light on the crucial role that compliance plays in this 4th industrial revolution and how to re-think your cyber security strategies to gain an upper hand on the front line of cyber-security warfare.
In a world where cyber threats can cripple organisations overnight, compliance is no longer a tick-box exercise but a strategic imperative. The discussions will be far-reaching, encompassing how to balance business agility with robust security, and how regulatory compliance can serve as an enabler for businesses rather than an obstacle.
This session is a must-attend event for executives who understand that being prepared is not a luxury, but a necessity in today’s interconnected business world.
Work Protected: Picking the right battles to avoid over-consolidation
SEMINAR
E
Max Linscott, Director, Market Strategy, Mimecast
Single sourcing technology concentrates cost, complexity and risk.
- How consolidated communications infrastructure offers a rich target for the bad guys
- How the technology choices you make can make Microsoft safer and smarter
- How you can help your people stay safe and secure by picking the most effective partners for M365
SEMINAR E
Max Linscott, Director, Market Strategy, Mimecast
Single sourcing technology concentrates cost, complexity and risk.
- How consolidated communications infrastructure offers a rich target for the bad guys
- How the technology choices you make can make Microsoft safer and smarter
- How you can help your people stay safe and secure by picking the most effective partners for M365
Follow us on social
Keep up to date with what's going on by following us on social media.