A series of one-hour seminars running at 11am and 1pm of the event will allow delegates to understand complex areas of specific interest.

GDPR - Regulation, myths and encryption

Mark Penny

The GDPR comes into force on the 25th May 2018. A maelstrom of information is available from a variety of sources, explaining the Regulation and its many facets. But how do you sort the real news from the fake news? Some of the available information on GDPR from certain sources is to put it kindly, somewhat inaccurate.

This seminar looks at what the Regulation does and does not say. It looks at what is new in terms of data protection and GDPR and what is not. It attempts to explode some myths and counter some of the #gdprubbish. Finally, it looks at some specific areas of GDPR where Thales might be able to help as part of an overall approach because no technology solution is a silver bullet to GDPR.

Securing your workloads in the cloud

Steven Broadwell

Discovering and preventing malicious attacks in today’s ever evolving threat landscape is an on-going challenge that affects organisations of all types.  The coming together of mobile working and cloud services provides businesses with significant benefits, but also introduce new risks and security challenges that must be addressed. 

We need to evolve the way that we secure our organisations to adapt to the changing landscape without compromising on the protection we provide to our services. Symantec is in the unique position to provide visibility, protection, detection and response across the key control points. Join Symantec to hear how we can help you to protect your data, employees and services using our Integrated Cyber Defence Platform

Using AI to catch in-progress cyber attacks

Matt Walmsley

Cyber attackers operate undetected for an average of 146 days but obtain admin credentials in less than 3, and 53% of attacks are only discovered after notification from an external party. The complexity and velocity of attacks is increasing whilst traditional security capabilities become overwhelmed. Detecting active attacks, reducing dwell time and accelerating incident response is a top priority.

In this session, you will learn how different artificial intelligence techniques can be combined to automate the detection of in-progress cyber-attacks within your network. We’ll explain how automated threat hunting can even handle encrypted traffic, whilst still maintaining the privacy of your users. Then we’ll share a case study of a real attack detected using this AI approach.

We’ll close by demonstrating how to integrate such a capability into your existing security technology stack to force multiply your security response capability, and close your cyber detection gap.

Operating IT security for GDPR compliance and resilience to ransomware

Dirk Schrader, CISSP, CISM

Planning, coordinating, and implementing IT security operations concepts will make it easier to prepare compliance to GDPR (and others) and to stay ahead with the daily battle against wide-spread malware and targeted attacks.
Those responsible for IT security face pressure to find responses to the ever-increasing malware attacks and at the same time turn IT into a GDPR compliant one.
This session will address some of the operational concepts that help achieving both goals while increasing IT security effectiveness and efficiency.

Supported by: