Share
Browse
  • Day 1 Session 4 Workshop 1
  • Day 1 Session 4 Workshop 2
  • Day 1 Session 4 Workshop 3
  • Day 1 Session 4 Workshop 4
#

Day 1 Session 4 Workshop 1

Continuation of Information Security and Cyber Risk Challenges
Rik Ferguson, Vice President Security Research, Trend Micro

Please note this was an extended workshop with a restricted audience. and audio recording of this workshop is available to eligible public sector cyber security professionals upon request. Please email events@softbox.co.uk  

The attendees enjoyed a candid, interactive, discussion about their own information security and cyber risk challenges. This was a great opportunity for those working in Local Government, healthcare and blue light services to discuss experiences, pool knowledge and together formulate solutions to shared challenges. 

Recommended reads:

  • Trend Micro's article 'CEO Fraud Email Scams Target Healthcare Institutions' in CyberTalk

Download the following Trend Micro documents:

  • NSS Labs' Breach Detection Systems Test Report.Trend Micro Deep Discovery™ Inspector has been recognized for the third consecutive year as a recommended breach detection system by NSS Labs. Deep Discovery achieved a 99.8 percent detection rate in the latest Breach Detection System test. Yet again Trend Micro has demonstrated a consistent ability to detect network and endpoint-based targeted attacks, advanced threats and ransomware.
  • Blog post reprint from Trend Micro's SIMPLY Security blog (February 2017). Trend Micro positioned highest and furthest among leaders for ability to execute and completeness of vision in the 2017 Gartner Magic Quadrant for Endpoint Protection Platforms. 
  • IDC Technology Spotlight report - Securing the Server Compute Evolution: Hybrid Cloud has Transformed the Datacentre (January 2017). This report, sponsored by Trend Micro, highlights how hybrid cloud architectures, underpinned by the growth of cloud computing and virtualisation, has transformed the way organisations should view server security. The market leader in server security every year since IDC started tracking the market has been Trend Micro.

Back to Day 1

On to Day 2

As Seen in CyberTalk link to article

Day 1 Session 4 Workshop 2

Threats are Evolving. A new approach to Cyber Security is required.
Richard Ferrier, Sales Engineer, LogRhythm

By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches,” according to Gartner Research.

It’s a simple concept: The earlier you detect and mitigate a threat, the less the ultimate cost to your business. By implementing an effective end-to-end threat management process that focuses on reducing detection and response times, you will have the ability to prevent high-impact security incidents, such as major data breaches. This process is known as Threat Lifecycle Management (TLM) and can help you improve the efficiency of your security operations.

TLM is a series of aligned security operations capabilities and processes. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from a security incident. You can enable effective TLM at a scale appropriate to your business through modern technology specifically in the areas of: • Advanced machine analytics, which are key to discovering potential threats quickly. • Security automation and orchestration capabilities, which increase analyst efficiency to support the entire threat investigation, through to full remediation and recovery.

Back to Day 1

On to Day 2

Day 1 Session 4 Workshop 3

EU GDPR. A fast start to compliance
Dr. Guy Bunker, Senior Vice President - Products and Marketing, Clearswift

Organisations globally who do business with the EU, no matter what size or vertical, are required to comply with the new EU General Data Protection Regulation (GDPR) when it comes into force in May 2018. For many, compliance may be seen as costly and disruptive. However, those who view it as an opportunity will be in the best position to not only comply, but evolve their organisation, improve their security posture and drive business growth through improved collaboration with customers and business partners.

While some organisations have started GDPR compliance projects already, for others, uncertainty is causing delay which is eating into valuable compliance preparation time. Compliance starts with people, but moves on to include reviewing policies and processes in light of the new legislation. Process optimisation and automation will increase efficiency and effectiveness as well as reducing costs. Technology is the final step, required to enforce polices and protect employees. The risks associated with failing to comply means all employees from Board Level down will need to embrace data protection changes and become more vigilant when handling, processing and securing information.

The challenge is knowing where to start. How to move from not understanding the scale of the problem, to becoming compliant and then remaining compliant.

In this workshop hosted by Dr Guy Bunker from Clearswift, Guy discussed where and how to start a GDPR compliance programme. He will look at how discovery tools can provide the fast start you need to understand the problem and drive towards compliance. How an Adaptive Data Loss Prevention (A-DLP) solution can detect and protect information as it flows across key business collaboration channels including email, web and cloud applications, without slowing down the business. Solutions which not only drive compliance in a timely manner, but reduce business risk every day – both inside and outside the organisation.

Back to Day 1

On to Day 2

Day 1 Session 4 Workshop 4

Proactive Defence for the Digital Transformation
Julian Anderson, Sector Sales Manager, Thales e-Security

Early drafts of the soon-to-be published Government Transformation Strategy outline plans to fundamentally change the way departments operate; making government simple for citizens to interact with. And as the UK government sets on its path to full digital transformation, there can be no denying that more and more services will be brought online and moved into the cloud – from tax returns to healthcare records – to make a faster, more agile and open service for citizens.

However, such transformation is happening within an increasingly precarious environment – one in which data breaches are at an all-time high and incidents of identity theft have risen by 57% in a single year. Data is the prize for these hackers and, as more government services are moved into the cloud, the concern for many UK citizens will be around their valuable, personal data falling into the hands of those with malicious intent. With the rise of cloud and the Internet of Things, it’s evident the threat of attack has moved from the perimeter to within an organisation’s walls, and consequently measures need to be put in place to take control of data – regardless of where it resides.

This workshop's aim was to shine a light on how organisations can take a proactive data defence strategy when it comes to digital transformation, taking a leaf out of enterprises’ book - learning from their expertise - to maximise the level of control organisations have over the data they look after, even when it is physically out of reach.

Back to Day 1

On to Day 2

As Seen In CyberTalk! Link to article

Find Out More

Get a Quote

Call Me Back

Enquiry Form