Everyone is a target now – identifying advanced intruders and their methods – and reacting fast. What works?
How to benefit from the cloud securely. What to outsource, when to do it, and how, including due-diligence: Questions to ask when choosing your provider.
Sponsored by : Vanguard
Malicious insiders are in your network, and malicious outsiders will breach your network defences. Can you stop them at the resource level? Learn how.
Sponsored by : CipherCloud
While global cloud adoption continues to accelerate, organisations in many regions have been hesitant to use the cloud because of concerns over the privacy and sovereignty of sensitive data. The basic nature of the cloud makes data residency a slippery concept - data will inevitably cross national boundaries. Although cloud providers offer robust infrastructure, you have to take responsibility for the protection of your own data. This presentation will describe strategies for applying encryption and tokenisation to assure your compliance with data protection laws, while still taking full advantage of the cloud.
Sponsored by : Boldon James
Danny Maher of Boldon James’ Elite Partner, HANDD Business Solutions, takes a practical look at implementing Data Classification as part of a Data Centric Security and Governance approach. The session will consider the project steps needed to implement a successful enterprise data classification solution across your organisation and how it can realise the following key benefits: • Safeguard confidential Information • Increase employee awareness of the need to protect sensitive data • Enforce data security and governance policy • Enhance Data Loss Prevention • Harness the value of your ‘big’ data • Enhance the performance of IT security and data management solutions • Improve access control and auditability
Why attack - or defend - a fridge?
Discussion: How to secure data while meeting compliance, privacy regulations and expectations. Are new EU data protection regulations too onerous, or has privacy already been lost?
Sponsored by : Centrify
The number and variety of apps that are being adopted by organisations – from on premise to cloud-based and software as a service (SaaS) to mobile apps – is rapidly expanding and increasing. While IT continues to deliver new and varying apps, lines of business and even individuals are now also adopting apps independently of IT at an astonishing rate. As a result, employees typically need to authenticate with a dizzying array of systems, from a variety of PC and mobile devices, with each app representing another silo of identity for IT to manage. Identity-as-a-Service (IDaaS) is an emerging solution category for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS solution. Today, we would like to discuss six of the top considerations.
Sponsored by : Forum Systems
Today, organisations are challenged with the increasingly difficult task of improving interoperability and expanding accessibility without compromising security. In this session, Jason Macy, Forum Systems’ CTO, will discuss how enterprises can fulfill the demand of increased business integration without sacrificing security and protection. Topics covered will include: Architecture design, the key to enabling business agility. How to combine identity access control with data security. Simplifying your architecture to reduce costs.
Sponsored by : Websense
With cyber threat now a top concern for most CEOs, this session will focus on the value of adopting a risk-based, data-centric security strategy that aligns with corporate objectives. A summary of the latest threat-based telemetry will be shared alongside a review of the proposed requirements from the EU on Data Protection. The combination will form a compelling case for all organisations to reassess the basic infrastructure and compliance-only security programmes that exist today. This session will help bring you up to speed on the latest threat intel and cover the tactics and techniques today’s sophisticated adversary uses. We will also discuss the role of the security team to proactively identify and protect business assets followed by best practice guidelines on how to detect, respond and recover from a security incident.
Staff have their own devices. Do they connect to your network? Are you in control of how they are used for company business? What are your recovery or delete policies for lost and stolen devices?
Sponsored by : Zscaler
The biggest threat to an organisation's cyber security isn't malware, phishing scams or even hackers - it is its employees. IT departments have lost visibility and are no longer in control of the corporate network and outdated technology is commonly addressing the problem - focusing on, "looking inwards and at what's coming in," instead of "what's going on within the company and what's going out".
Sponsored by : Watchful Software
Today’s info protection environment is evolving rapidly, with paradigm shifts including BYOD devices, cloud environments, and increased regulatory oversight. This session addresses the new strategies evolving for this new world.
Sponsored by : Code42
Endpoint protection. Secure file sync and share. Both are massive opportunities for today’s enterprise thanks to their business benefits and widespread user appeal. But one size does not fit all, especially user-adopted consumer technologies. In this presentation, Andy will discuss why organisations must apply the right enterprise-ready tool for the job in order to properly manage, secure and protect data living on endpoints while continuing to enable a mobile and productive workforce.
Technologist, Adminstrator, Manager; or Director; MSc or MBA; integrated security or CIO, or DPO? What's the future for the head of information security?
Get your "passport" stamped at all sponsor stands for a chance to win prizes such as Lenovo Yoga 8" tablet, an Ai Ball, a Go Pro camera, an iPad mini, bluetooth speakers and more! Winners will be drawn during the cocktail hour in the Exhibition Hall and must be present to win.