Seminars:

A series of thirty minute seminars running at 11:25am, 12:00am and 13:30pm of the event will allow delegates to understand complex areas of specific interest.

11:25
Presentation From: Sophos

Overview Coming soon

11:25
Presentation From: SecureData

Overview Coming Soon

12:00
Managing the Modern Attack Surface with Predictive Prioritization

The network is unrecognizable as cloud, containers, custom web apps, IoT and OT all warp the perimeter. Unsurprising then, that security continues to struggle with measuring and managing the modern attack surface. In 2018, there were 16,500 new vulnerabilities disclosed. The Tenable data science team estimates that only 3% of these vulnerabilities actually will be exploited. Even if you know it’s flawed, finding and fixing issues is easier said than done, especially as GDPR fines threaten to eradicate profit margins. This session will help explain how, by taking a predictive and threat-based approach to vulnerability remediation, organizations can expect a 97% reduction in the number of critical and high vulnerabilities they need to patch, focusing on the issues that matter most to their organization and improving the efficiency of scarce security personnel and budget resources. Focus on what matters most and reduce your cyber exposure gap.

12:00
Presentation From: Netacea

Overview Coming Soon

13:30
Presentation From: Sonatype

Overview coming soon

13:30
Simplifying Digital Transformation: How CASB can help reduce the causes of slow cloud adoption

Dave will share the lessons he has learned from over 70 customer implementations of CASB technology – the good, the bad and the downright ugly. Learn about the main blockers to painless cloud adoption in a digital transformation journey and some of Dave’s best practices to avoid the main causes that slow down the use of cloud, such as over-sharing through the use of file sharing and collaboration tools and how to protect Administrators from becoming compromised. Finally, Dave will look at sophisticated anomaly detection to protect your most popular cloud applications such as O365, Box and Salesforce from attack. The workshop will involve real-world customer use cases and the odd demo or two – plenty of useful content for you to digest.

 

Supported by: