Seminars:
A series of thirty minute seminars running at 11:25am, 12:00am and 13:30pm of the event will allow delegates to understand complex areas of specific interest.
11:25
|
Debunking cybersecurity myths with real facts.
Most of us are familiar with the story of Achilles, the heroic Greek warrior that survived many great battles during the Trojan War. Legend has it that Achilles gained the power of invincibility as a baby after his mother dipped him in the River Styx held only by his heel. This, ultimately, proved his undoing as it was in that same heel that he was fatally shot with a poisoned arrow. This popular Greek myth provides a useful analogy in the context of enterprise security, as even the greatest security systems and procedures can have their Achilles moment in light of seemingly remote vulnerabilities. Over the course of this talk, we’ll share with you our methods, findings and learnings. We hope this will help you to look at your IT estate in a different way, anticipating the threats that others ignore.
|
11:25
|
A Live Cyber-Attack Simulation
Get inside the brains of the most sophisticated attackers and see how world-class defenders are using their skills and tools in the most efficient and smartest way. You will witness the attacker’s infiltration and see the malicious operation as it moves across the entire environment. See how many opportunities an attacker has to advance the operation and how many opportunities the defender has to destroy the attack before it reaches its target. |
12:00
|
Detect, investigate & respond to insider threats before damage is done
|
12:00
|
Building an Effective Operating Centre
User and system compromise, insider abuse, and policy violations are very real threats that today’s organisations must face if they wish to remain safe. In a bid to demonstrate how to utilise and build an effective Security Operation Centre, Chris addresses these risks. |
13:30
|
Overcoming Today’s Most Pressing Third-Party Risk Management Challenges
Review the drivers and challenges organizations face when managing third-party vendor risk |
13:30
|
Defending Yourself Against Digital Risks Beyond Your Control
Your business today operates in an open, digital world, in environments that are beyond control. The threat landscape is no longer contained within your perimeter. Bad actors have quickly recognized this and have pivoted the majority of their tactics and efforts to leverage this new world. They no longer target only your networks and data but have extended their targets to your employees, customers, brand and partners This presentation will explore the breadth of the digital landscape today, highlight some key trends and tactics the bad guys are deploying and provide some recommendations on how you should approach your strategy and tactics to defend yourself against digital risks. |