Evaluate cutting-edge technology and solution providers through our Live Web Seminars by attending solution provider sessions. Connect with your fellow IAM and IT security leaders and dive into thoughtful conversations spurred by powerful sessions and hear directly from the experts behind the latest IAM innovations.
All sessions will be available on-demand after, so you won’t miss anything. Session times are subject to change. Participants can also connect with peers and experts to ask questions, share insights, and get the most from the leaders in the industry
PLEASE NOTE: All Conference Sessions (including slides) will be presented in English ONLY
Delegates will be able to attend two seminars at the event ‘live’ as they will run in two sessions.
All event footage will be available on demand for a maximum of 2 hours after the session has closed.
Managing security events with advanced behaviour analytics
Our approach to the growing cyber threat is to adopt a big data, open source, data science-centric position in order to give your cyber security team enhanced capabilities to keep pace. Adding behaviour profiling to your real time stream, as well as an advanced ability to slit windowed analytics over long periods of time, our solution provides a platform for security data science with deep, context relevant personalisation which expertly maps your security response and provides for advanced detection.
Getting the best price of taxpayers’ money: open source software in the public sector
By selecting the best architecture and approach to address the unique application, data and workload requirements for your organisation, you will ensure that you are operating at the cutting edge of open source technology.
The most effective hybrid multi-cloud platform is based on open technologies, such as Linux and Kubernetes. Used correctly, they allow you to securely deploy, run and manage your data and applications on the cloud of your choice.
By attending this session, you will understand how to establish the platform necessary to support the required infrastructure and the value of adopting an independent common operating environment.
How to adopt a strategic approach to cyber security in the public sector
With as many as 25% of UK public sector organisations having evidenced that they are unprepared for a cyber-attack, it is clear that action needs to be taken in order to better defend against data breaches which threaten to destabilise much of the UK’s public infrastructure, from the NHS to the Ministry of Defence.
- Effective implementation of critical security controls
- Identification of best practice and its cross-agency value
- Prioritisation of external and insider threats
- Where best to direct resource investment
- How to operate in an agile fashion
- Adopting a DevOps mindset
- Mapping new and emerging threats
Software Asset Management in the public sector
By attending this session, you will advance your understanding of what it means to adopt an exemplar software asset management framework which will provide you with greater visibility and control of your IT estate. With greater visibility and control comes the ability to reduce cost pressures, ease the burden on staff productivity through the automation of manual processes and ensure that you are able to maintain a deeper level of governance.
Safeguarding your digital transformation with PAM
As the means by which services are designed and delivered to citizens continues to evolve, governments are made to rely upon increasingly complex and interconnected public sector IT systems. Such highly tailored digital services are also increasingly being characterised by open, cloud-based architectures which support automation.
This transition requires an alternative approach to security as the highly collaborative, cross-departmental nature of the public sector relies upon greater degrees of security, access to critical assets, applications and services.
By attending this session, you will learn how to maintain control by adopting a PAM security platform which will prevent attacks occurring at the core of your digital transformation.
Artificial Intelligence: the how, why and where of implementation
It is important to not lose the true value of AI as you reflect upon where best it can complement your current processes and workflows. Like many other disruptive technologies, AI is an evolutionary force with many new innovations to come as previously unimagined contexts are illuminated by previous business cases.
Its ability to identify online threats or automate tasks, depending on where you wish to apply, is clear. The question remains, however, are we paying enough attention to the cyber-security risks related to AI adoption?
- Identifying the right process or workflow for implementation
- Building the business case for AI
- Discovering best practice example
- Adopting a risk-based approach to AI
Compliance with cloud-based web security: maintaining compliance, defending against malware and preventing data loss
With the great migration of apps towards the cloud the traditional network perimeter has witnessed significant erosion as the attack surface widens. This development has mandated a need for a more muscular cloud-based internet security features.
By attending this session, you will discover how to best protect users regardless of the device in use or the location from which access has been secured as our cloud-based security platform ensures traffic security, compliance, filtering and defence from malware and data loss.