Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Cyber security used to be focused purely on the perimeter, but advanced computing developments are changing the environment and the steps required to keep your organization breach-free. Improvements in AI and machine learning, advanced breach analysis and automated responses along with new schools of thought for cyber security strategy are all changing the game. Hear from the cutting-edge experts who are leading the way to the future of cybersecurity.
To close out 2016 we’ll be looking at the year in review; the big breaches and notable disclosed vulnerabilities. We’ll then use that information to assess the key threats that’ll be on the horizon in 2017 and what you can do to protect your organisation.
With millions of pieces of personal data lost last year, this month's Summit will focus on whether data breaches are inevitable and if the worst happens, how you should respond to protect your organisation.
The Privacy vs Security debate polarises audiences in the face of landmark data privacy rulings, whistle-blower revelations and headline grabbing data losses. Where should our priorities lie? Ensuring our sensitive data is protected or kept private?
This month’s Summit will focus on advanced threat protection, new vulnerabilities, reverse engineering, the human factor, zero day attacks, vulnerable apps and all the other elements that threaten your organisation's network.
Investigating and analysing the threatscape can provide a massive advantage when applied effectively, but what are the best steps to take? The industry's leading speakers will be at our August Summit, debating that exact question.
As disruptive technologies emerge, their defences need to evolve just as quickly. Securing the IOT; safe BYOD; cloud & virtualization security and developing secure apps from the ground up are some of the topics being debated this month.
Join the leading thinkers in the industry as they debate how to protect your organisation against zero-day attacks, advanced malware and the various techniques malicious actors use to bypass their target’s defences.
Join our Risk-based Security Summit to learn how to create a comprehensive risk management framework; report to the C-suite; develop company-wide security culture and the best ways to mitigate your most pressing risks.
Cloud computing continues to raise key questions; how can we encrypt the data we’ve stored; how can we monitor cloud usage; how can we provide secure access and protect the IoT; and finally how can we avoid the pitfalls of a cloud security skills gap? These are a few of the topics up for debate by our thought leaders at this Summit.