Conference Programme 2020

CCSE

Loading

Cloud Security and Digital Transformation – Are They Compatible?

12 Mar 2020
Theatre 3
Enterprise cloud security

Technology has disrupted traditional business models and over seventy percent of companies either have a digital transformation strategy in place or are in the process of implementing one in order to innovate and gain competitive advantage. Cloud computing has been a fundamental enabler to this disruption. Mainstream cloud adoption is here but the speed of that adoption is outpacing the abilities of traditional security methods and introducing business risk due to distributed assets and new attack surfaces.

Speakers
Joe Nelson, Director, Solutions Engineering, EMEA - eSentire

Latest News

  • 07-Apr-2020
    10:25

    Separating this pandemic from predecessors is that information technology is firmly on our side. In the absence of sport, Netflix is keeping families entertained. FaceTime or Zoom are connecting us safely from a distance while ordinary socialising presents a risk. And a plethora of cloud-based workplace tools are channelling business productivity from newly-distributed workforces.

    Nobody doubted our dependency on connectivity before coronavirus, but the degree to which the thread of the internet holding the fabric of society together during the crisis is striking. While restaurants, pubs, cinemas, cafes and more turned off their lights, data centres, network operations centres and internet exchanges geared up for an unprecedented rise in traffic. 

    The post Network strain: The risks and the reality appeared first on Techerati.

  • 07-Apr-2020
    09:43
    ManageEngine

    Tune in to this free webinar and learn about the right tools and techniques to oversee your organization's remote workforce, facilitate optimum productivity, maintain cyber hygiene, and ensure peace of mind for you and your IT team.

    The post Tips to create an effective remote access plan appeared first on Techerati.

  • 07-Apr-2020
    09:36

    The Covid-19 pandemic has led many companies to alter the way they conduct business, in many cases evolving to a new way of running operations. Some businesses have been fortunate where operating models have stayed in line with "Business as Usual". However, in most cases businesses have either had to adapt or evolve into a new operating model.

    Information security and cyber defence teams have a challenge ahead of them, they will not only have to run normal day-to-day operations but now must understand the new threat vectors that are being introduced that widen the threat landscape, and work to minimise cyber risk so businesses stay protected.

    The post Adopting a new operating model? Don’t leave your business exposed appeared first on Techerati.

Sponsors

Diamond Sponsor

  • Sophos

Headline Sponsor

  • IBM

Lead Sponsor

  • Oracle

Keynote sponsor

  • Eset
  • Menlo security

 

Theatre sponsors

  • IMSM
  • appcheck
  • Trend Micro
  • Manage engine
  • Crowdstrike
  • AppGate

 

Platinum Sponsor

  • Tresorit
  • Barracuda
  • CrowdStrike
  • cloudflare
  • KnowBe4

Stream Sponsors

  • BigID
  • Bitdefender
  • Sophos
  • Cloudflare
  • snyk

 

Stream Sponsors

  • IRM
  • McAfee
  • DarkTrace
  • Sophos

Gold Sponsors

  • Darktrace
  • Distology
  • Heficed
  • Egnyte
  • DivvyCloud
  • Whitesource
  • Exclusive Networks
  • vm ware- carbon black

Gold Sponsors

  • Esentire
  • TripWire
  • Wandera
  • IRM
  • NCC Group
  • SafeGuard Cyber

 

Silver Sponsors

  • Global SIgn
  • Code42
  • illumio
  • VeraCode
  • Locke & Mccloud

 

Silver Sponsors

  • Istorage
  • Neustar
  • Owl

 

Silver Sponsors

  • SOTI
  • cloudbric
  • PCYSYS
  • SentinelOne

 

Partners

Security Education Partner

  • ISC2

 

Event Partner

  • CyberSecurotyJobsite

 

Event Partner

  • Crest
  • tech HQ
  • cisco

 

Media Partner

  • CIO Applications
  • Jicara

 

Media Partner

  • CIO Net
  • Frontier Enterprise

 

Media Partner

  • Cyber Security Europe
  • Cyber Defense Magazine
  • Elite Business Magazine

 

Media Partner

  • Computing Security
  • Network computing
  • Storage magazine

 

Media Partner

  • CPO Magazine
  • Brilliance security magazine

 

Media Partner

  • UK Cyber Security Association
  • Digital agency network

 

Media Partner

  • Tech Target
  • Silicon

 

Media Partner

  • Start up city
  • Gigabit

 

Media Partner

  • Admin Magazine
  • DevOps Online

 

Media Partner

  • Alphr.com
  • Cloud pro

 

Media Partner

  • channel pro
  • IT Pro

 

TV Partner

  • disruptive live