A series of thirty minute seminars running at 11:45am, 12:20pm of the event will allow delegates to understand complex areas of specific interest.
Real-time Threat Mitigation: Unveiling SOC Success Stories

Join us as we delve into real-life scenarios where SenseOn's advanced threat detection capabilities played a pivotal role in identifying and mitigating cyber threats. Learn how our SOC stories showcase the effectiveness of proactive threat hunting and rapid incident response.

It's more than phishing - how to supercharge your security awareness program

Tell people not to click a link, pat each other on the back, and ride off into the sunset. If only security awareness training was that simple.

In this session, Javvad Malik, Lead Security Awareness Advocate for KnowBe4, will explain how to take your security awareness to the next level and prevent it from going stale. Changing behaviours and creating a culture of security can only be achieved by adopting the right mindset and techniques.

In this session you will learn:
● Why you need to brand the security department the right way
● The psychological approach to getting your message across
● Practical advice on building a strong security culture

Achieving Radical Resilience

Cybercriminals are relentlessly attacking enterprises of all sizes, resulting in the need for round-the-clock protection and observability across organizations. With backups being your last line of defense, it is essential for backup teams and security professionals to work together to ensure survivability after an attack.

Join us as we delve into the many enhancements and features available in Veeam Data Platform 23H2 as we discuss why security integration is critical for your backups.
Some of the areas that we’ll explore include:
• Detecting and responding to malware infections
• Expanding visibility into your existing tools
• Centralized data protection monitoring with Veeam Threat Center

Exposing the Battlefield: Understanding Hackers' Attack Surfaces

This presentation delves into the myriad ways hackers identify and exploit vulnerabilities in systems, highlighting the diverse attack surfaces ranging from different types of assets like software, domain, networks, to human factors. It offers insights into the hackers' perspective, demonstrating how they find and leverage these surfaces to access, control, or damage systems, thereby underscoring the importance of robust defense strategies.