CSE London Conference 2022

Subpage Hero

  

Loading

Securing Applications from Vulnerabilities with Zero Trust

03 Mar 2022
Cloud & Cyber Security Keynote
Securing Applications from Vulnerabilities with Zero Trust

In order to protect against the evolving threat landscape, we must change the way in which we protect our data against vulnerabilities. To adapt, organizations are operating within the framework that no user, network, or device can be trusted by default until proven otherwise. Join ThreatLocker CEO, Danny Jenkins, as he discusses how to secure applications from vulnerabilities using a Zero Trust model. 

2022 Sponsors

Tech Show London Headline Sponsor

  • IBM

 

Tech Main Stage Sponsor

  • Oracle

 

Diamond Sponsor

  • Threatlocker

 

Stream Sponsors

  • eSentire
  • Appgate
  • Checkpoint

 

Theatre Sponsor

  • Netskope
  • Sysdig

 

Platinum Sponsors

  • Aqua
  • Darktrace
  • Sentinel One
  • Snyk
  • Trend Micro
  • Forcepoint

 

Gold Sponsor

  • Crowdstrike
  • Orca Security

 

Silver Sponsor

  • Sectigo

 

2022 Partners

Media Partner

  • Linux Magazine
  • ADMIN Magazine
  • CyberSecurityJobSite.com
  • Elite Business
  • Top Business Tech
  • Cloud Industry Forum
  • ISACA London Chapter

 

Media Partner

  • Computing Security
  • CIOCoverage
  • TechUK
  • Packt

 

Media Partner

  • Crest
  • Paybis
  • CEX.io
  • Cyber Defense Magazine
  • CIOInsights
  • Computer Weekly

 

Security Education Partner

  • ISC2

 

Media Partner

  • Electronic Specifier
  • Startups Magazine
  • Enterprise Security Magazine
  • Trusted Computing Group
  • EM360

 

  • Soc.Os
  • Probely
  • Forcepoint

Subscribe to our newsletter!