Workshops



Getting Value from Cybersecurity Automation by Uleska

March 29 / 11:00 am – 11:45 am

As software development becomes more and more automated, how can security keep up, scale and add value to the organisation?

WATCH NOW
Value from Cyber Security

Practical Steps to Mitigate Your SaaS Supply Chain Risk by Ampliphae

March 29 / 12:00 pm – 12:45 pm

Many organisations are now adopting cloud-delivered software-as-a-service applications as part of their supply chain. The benefits of this move are clear, but the risks are not so obvious.

WATCH NOW
Ampliphae

Secure behaviour change – it’s time for security awareness to adapt by Think Cyber

March 29 / 2:00 pm – 2:45 pm

The shift to working from home and the technology transformation required has impacted organisations all over the world. And this comes with significant cybersecurity implications. But current approaches to securing the human user are outdated, infrequent, complex and are also often boring or patronising.

WATCH NOW
ThingCyber

Working from home is here to stay – is your CyberSecurity up to the job? by CyberHive

March 30 / 11:00 am – 11:45 am

Recent global events have driven a shift in working patterns, with working from home becoming the norm rather than an exceptional situation. In this workshop, CyberHive will discuss some of the ground rules for securing a remote workforce.

WATCH NOW
Cyberhive

How NVIDIA is accelerating the AI revolution

March 30 / 12:00 pm – 12:45 pm

The AI revolution is just getting started and promises to permeate every aspect of human life.

WATCH NOW

Cloud delivered security – why it’s the only path forward for securing hybrid infrastructure by Acreto

March 30 / 2:00 pm – 2:45 pm

Today’s hybrid infrastructure is driven by the rapid shift from on-premise applications to SaaS and cloud environments. Interconnecting and securing these new environments has proven to be complex and expensive and it requires a large number of security products.

WATCH NOW

Live Demo | Remote Working is here to stay. Cybersecurity for Files: the use of metadata by Storage Made Easy

March 31 / 10:00 am – 10:45 am

CISOs and CIOs have to contend with data compliance, data breaches and ransomware attacks. And with more and more people working from home, their jobs are only getting harder. Through an interactive workshop, Storage Made Easy will review this situation and deliver a demo.

WATCH NOW
Storage Made Easy

Building trust to succeed in a post-pandemic world by Dell Technologies

March 31 / 12:00 pm – 12:45 pm

The pandemic has accelerated the adoption of technology and many organisations have transformed their digital operations to continue to function and grow. How can organisations build greater trust and consumer confidence? Join Liz Green and Des O’Connor, UK Cyber Resilience leads at Dell Technologies, to explore.

WATCH NOW

Staring into the Black Box – The Do’s and Don’ts of building AI cybersecurity platforms at scale by Verified Visitors

March 31 / 2:00 pm – 2:45 pm

VerifiedVisitors will look at the fundamentals of applying machine learning to your cybersecurity framework. How can you measure algorithm performance, assess labelled data and unlabelled data separation, testing and cross validation in a performant machine learning pipeline to deliver demonstrable customer benefits? Join us to find out.

WATCH NOW
VerifiedVisitors