Seminars:
A series of thirty minute seminars running at 11:25am, 12:00am and 13:30pm of the event will allow delegates to understand complex areas of specific interest.
01:30
|
Can we change behaviours in real-time? A behavioural science approach
• Explore what’s not working about current approaches to security awareness and the human factor in security |
01:30
|
People, Process & Partners: Building a Future-Ready Security Monitoring Strategy
Cybercrime is rapidly increasing every year, with ransomware attacks taking place every 11 seconds by 2022, according to Cybersecurity Ventures. Organisations should be treating attacks as a matter of ‘when’ not ‘if’. This means cybersecurity must be a top priority and SOCs must have the visibility to deal with any threats that may come their way. In this presentation, Guy Grieve, Enterprise Sales Engineer at LogRhythm, examines how organisations can build an effective security monitoring strategy to overcome the constant cyber risks of today’s threat landscape. He explains how security teams can leverage the SOC Visibility Triad to provide overlapping fields of visibility, simplified threat hunting and enhanced response capabilities to strengthen their cybersecurity posture. |
11:25
|
7 Key Considerations for Choosing the Right Email Security Platform
|
11:25
|
The Evolution of Managed Services in Cyber Security
Join Practice Director of SCC Cyber, Paul Allen, on a deep-dive discussion into the changes in approach since Gartner first developed the concept on Managed Deception and Response in 2016. Evolving from a technology centric and use case driven capability, to a risk focused dynamic model. |
12:00
|
Choosing the Right Data Protection Strategy
Now more than ever, it’s critical for businesses to remain confident that their data is protected and always available, whether it’s on premises, at the edge or in the cloud. But with an ever-evolving threat landscape, what is the best strategy to protect key business data? Join us to see a presentation with answers to this question, including a sneak-peek of an upcoming Veeam product release. |
12:00
|
What is the internet map and how to leverage internet intelligence for threat hunting and exposure management?
What if there was one place to understand everything on the internet? The map of the internet, that proactively protects your organization or nation against advanced threat actors and empowers your security teams with critical information needed to find, monitor threat and exposures. |