9 - 10 OCTOBER 2019 / EXCEL LONDON
Register Interest
IP EXPOCyber SecurityDeveloperAI and AnalyticsIoTBlockchain

Seminars

Here is a list of all confirmed Seminars for 2018.

All |  Date:
3rd October
4th October 
Select a speaking company
Cloud Security 16
  • Wed 3rd Oct 11:00 - 11:30
  • Low and Slow - Data Theft Under the Radar Matt Lock  |   Varonis UK Ltd  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 11:00 to 11:30

    Low and Slow - Data Theft Under the Radar

    We hear about data breaches on almost a daily basis and we are all very aware how these potentially affect our daily lives, but how do these breaches actually happen. What are the steps hackers take to infiltrate, discover and steal valuable information?
    Varonis tracks, stops and helps eliminate these situations by usitilising the metadata they gather to provide organisations insight into high risk data and potential rogue accounts. This presentation will walk you through the steps they take, and the technology they use, to ensure any suspicious activity is caught, investigated and remediated as quickly as possible.

    Speaker

    Photo Speaker Name Profile
    Matt Lock Matt Lock View Profile
  • Wed 3rd Oct 11:40 - 12:10
  • Stepping into the cloud with confidence Paul D’Cruz  |   Cisco Systems  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 11:40 to 12:10

    Stepping into the cloud with confidence

    It’s no surprise that organizations are increasingly investing in the cloud for its key capabilities—ease of use, scalability, and cost savings. The cloud is changing the way we work. This also introduces new security risks. You can roll the dice and hope that someone else is keeping an eye on security. Or, you can ensure your security in the cloud with Cisco Stepping into the cloud with confidence solutions. In this session, you will see how things are changing, what the new risks are, and how you can protect yourself and your company as you take advantage of the many benefits of using the cloud.

    Speaker

    Photo Speaker Name Profile
    Paul D’Cruz Paul D’Cruz View Profile
  • Wed 3rd Oct 12:20 - 12:50
  • Automated Security in a Multi Cloud World Tech Leaders  |  Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 12:20 to 12:50

    Automated Security in a Multi Cloud World

    Businesses are moving and building new applications in cloud environments at an ever increasing pace. Learning how to manage the security and application services of these apps wherever they live can be a challenging and time consuming task.

    We show you how automation can help you deliver application security in a multi cloud world.

    Speakers

    Photo Speaker Name Profile
    Keiron Shepherd Keiron Shepherd View Profile
    Matthew Prickett Matthew Prickett View Profile
  • Wed 3rd Oct 13:00 - 13:30
  • Secure Your Crown Jewel Applications with Illumio Micro-Segmentation Adam Brady  |   Illumio  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 13:00 to 13:30

    Secure Your Crown Jewel Applications with Illumio Micro-Segmentation

    Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security to help protect your high value assets and the crown jewels of the company.

    Speaker

    Photo Speaker Name Profile
    Adam Brady Adam Brady View Profile
  • Wed 3rd Oct 13:40 - 14:10
  • Four keys to tackle software vulnerabilities in commercial and in-house software Jeroen Braak  |   Flexera  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 13:40 to 14:10

    Four keys to tackle software vulnerabilities in commercial and in-house software

    The world shifted to a paradigm that accepts that breaches will inevitably happen and they need to be detected and responded to in a more efficient fashion. However, the need and cost-effectiveness of prevention is still a reality that organizations have not been able to master, and application vulnerabilities remain at the top of security professionals concerns.

    With more than 50 new vulnerabilities disclosed every day in commercial software, it’s hard to stay focused and be effective. When you add vulnerabilities being introduced in the code being written in-house, the task just becomes unfeasible. Join us for this talk about how visibility, curation, prioritization and automation kick in for security, operations and engineering to work together towards a more secure software supply chain.

    Speaker

    Photo Speaker Name Profile
    Jeroen Braak Jeroen Braak View Profile
  • Wed 3rd Oct 14:20 - 14:50
  • The current state of cyber security is a 24x7x365 game Dan Pitman  |   Alert Logic   |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 14:20 to 14:50

    The current state of cyber security is a 24x7x365 game

    The lack of awareness around cyber threats and the risk that these pose to an organisation is a worrying state of affairs. Data breaches, hacks and various cyber attacks dominate the headlines on a regular basis. Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of threats you need to leverage software plus services to augment your security team and capabilities.
    Join Dan Pitman, Senior Solutions Architect, as he shares insights from Alert Logic’s 2018 Critical Watch Report, based upon findings from verified security incidents from thousands of companies around world.

    Speaker

    Photo Speaker Name Profile
    Dan Pitman Dan Pitman View Profile
  • Wed 3rd Oct 15:00 - 15:30
  • Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t) Brian Shorland  |   BlueCat Networks  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 15:00 to 15:30

    Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t)

    Long dismissed as mere network plumbing, DNS has emerged to combat adversaries using it to bypass security defenses like firewalls, IDSs, and endpoint agents. In this session BlueCat’s Brian Shorland, will break down two cyberattacks and illustrate how DNS was used despite often being understated in the report of an attack. Shorland shows how DNS can be used to provide visibility and control to secure sensitive data and critical systems, both to defend against unwanted or unauthorized access and detect abnormal or malicious behavior. Shorland also covers how to implement policy control before internal DNS caching, and DNS query monitoring for breach detection and forensic visibility.

    Speaker

    Photo Speaker Name Profile
    Brian Shorland Brian Shorland View Profile
  • Wed 3rd Oct 15:40 - 16:10
  • Your Move To The Cloud Secured Tech Leaders  |  Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 15:40 to 16:10

    Your Move To The Cloud Secured

    We’ll cover the security challenges organizations are facing in their move to the cloud, ways to address these obstacles, and how the future of cloud security is changing as new technologies like containers are deployed in enterprise cloud environments.

    Speakers

    Photo Speaker Name Profile
    Richard Jones Richard Jones View Profile
    Simon Crocker Simon Crocker View Profile
  • Wed 3rd Oct 16:20 - 16:50
  • Brought to you by Usecure

    Cloud Security Theatre

    Wed 3rd Oct 16:20 to 16:50

  • Thu 4th Oct 11:00 - 11:30
  • Automated Security in a Multi Cloud World Tech Leaders  |  Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 11:00 to 11:30

    Automated Security in a Multi Cloud World

    Businesses are moving and building new applications in cloud environments at an ever increasing pace. Learning how to manage the security and application services of these apps wherever they live can be a challenging and time consuming task.

    We show you how automation can help you deliver application security in a multi cloud world.

    Speakers

    Photo Speaker Name Profile
    Keiron Shepherd Keiron Shepherd View Profile
    Matthew Prickett Matthew Prickett View Profile
  • Thu 4th Oct 11:40 - 12:10
  • Cyber Attack Trends from the Threatscape Joe Nelson  |   eSentire  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 11:40 to 12:10

    Cyber Attack Trends from the Threatscape

    What are the latest trends in the cyber criminal underworld? Which attacks are you likely to be preventing as we move further into 2018? Who’s looking for vulnerability on your network? These questions and more, answered by eSentire’s Principal Solutions Architect, Joe Nelson.

    Speaker

    Speaker Name Profile
    Joe Nelson View Profile
  • Thu 4th Oct 12:20 - 12:50
  • Stepping into the cloud with confidence Paul D’Cruz  |   Cisco Systems  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 12:20 to 12:50

    Stepping into the cloud with confidence

    It’s no surprise that organizations are increasingly investing in the cloud for its key capabilities—ease of use, scalability, and cost savings. The cloud is changing the way we work. This also introduces new security risks. You can roll the dice and hope that someone else is keeping an eye on security. Or, you can ensure your security in the cloud with Cisco Stepping into the cloud with confidence solutions. In this session, you will see how things are changing, what the new risks are, and how you can protect yourself and your company as you take advantage of the many benefits of using the cloud.

    Speaker

    Photo Speaker Name Profile
    Paul D’Cruz Paul D’Cruz View Profile
  • Thu 4th Oct 13:00 - 13:30
  • Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t) Brian Shorland  |   BlueCat Networks  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 13:00 to 13:30

    Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t)

    Long dismissed as mere network plumbing, DNS has emerged to combat adversaries using it to bypass security defenses like firewalls, IDSs, and endpoint agents. In this session BlueCat’s Brian Shorland, will break down two cyberattacks and illustrate how DNS was used despite often being understated in the report of an attack. Shorland shows how DNS can be used to provide visibility and control to secure sensitive data and critical systems, both to defend against unwanted or unauthorized access and detect abnormal or malicious behavior. Shorland also covers how to implement policy control before internal DNS caching, and DNS query monitoring for breach detection and forensic visibility.

    Speaker

    Photo Speaker Name Profile
    Brian Shorland Brian Shorland View Profile
  • Thu 4th Oct 13:40 - 14:10
  • Why All Behaviours And Emotions In Your Network Today Are Important To Understand Harry Tinson  |   HANDD Business Solutions   |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 13:40 to 14:10

    Why All Behaviours And Emotions In Your Network Today Are Important To Understand

    If someone is on your network you should assume they’re in it.

    In a digitally changing world, a dynamic approach to security is something to be desired. The best malware behaves like a human – humans are vulnerable and unpredictable – not predictable strings of 1’s and 0’s.

    During this session Harry will run through user cases worked on with large organisations, outlining how data security has developed from a CISO’s chore into a strategic state of mind across the whole organisation.

    Speaker

    Photo Speaker Name Profile
    Harry Tinson Harry Tinson View Profile
  • Thu 4th Oct 14:20 - 14:50
  • Pathway to the Future of Security & SD-WAN David van Schravendijk  |   Cisco Meraki   |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 14:20 to 14:50

    Pathway to the Future of Security & SD-WAN

    SaaS applications are straining existing network infrastructure and cybersecurity threats are consistently evolving. Learn how a network can be re-architected to prepare for the upcoming digital transformation using simplicity. Security & SD-WAN can be delivered together intuitively and effectively.

    Speaker

    Photo Speaker Name Profile
    David van Schravendijk David van Schravendijk View Profile
  • Thu 4th Oct 15:00 - 15:30
  • Head in the Clouds? Let’s get serious about how to benefit from Cloud platforms whilst staying protected Richard Flanders  |   Check Point Software Technologies  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 15:00 to 15:30

    Head in the Clouds? Let’s get serious about how to benefit from Cloud platforms whilst staying protected

    Richard will look at the reasoning behind the current move towards Cloud-based resource usage and identify the many areas of risk that must be considered when a migration project is being planned. He will look closely at emerging threats and explain how these can be confronted using the appropriate Cloud security strategy and solutions. He will also look at the various different models of Cloud and define methodologies to assist any organisation to be compliant with current and future legislation that governs data usage and protection.

    Speaker

    Speaker Name Profile
    Richard Flanders View Profile
Top