10th November 2026
Hilton London Canary Wharf
10th November 2026
Hilton London Canary Wharf
Days
Hours
Minutes

WEBINAR: Live Attack Simulation – Ransomware

Wednesday, March 24th @10:00 GMT If you’re concerned about ransomware, whether it’s beating Ryuk, stopping data exfiltration, or preventing the latest trend of “double extortion”, this session is for you.  Join Cybereason for a live attack simulation, where we’ll discuss the latest ransomware trends, walk through a multi-stage attack, and show the side by side […]

WHITE PAPER: Build better endpoint security to protect your entire network

By Quest As your IT environment grows, tracking and securing all the endpoints connecting to your network is a monumental task. Managing and deploying security updates is time-consuming and challenging because of the wide range of devices people use to get their work done. Every desktop, laptop, smartphone, tablet and internet-of-things (IoT) device connecting to […]

WHITE PAPER: 5 Steps to Battle Endpoint Cybercrime with KACE

By Quest Endpoint updates are becoming more complex and challenging than ever with Bring-your-own-device (BYOD) programs and internet-of-things (IoT) technologies. Each device connecting to your network increases the number of threats from malware and viruses. Read this white paper to learn five steps for building a unified endpoint security strategy that will give you: Clear […]

WEBINAR: Managing the Compliance & Security Nightmares Caused By A Remote Workforce

Webinar – March 11th, 12pm GMT  How do companies protect themselves with the right tools to mitigate compliance and security concerns? There are precautions and best practices that are being employed by many companies, and should be part of the security and compliance infrastructure as companies adapt to the new norm of both people and […]

Zero Trust: The practical way to look at cybersecurity

By LogRhythm Zero Trust is quickly becoming the security model of choice for enterprises and governments alike. The need to protect, defend and respond to threats is more apparent than ever as we continue to work from remote locations. Where to start Zero Trust is more than implementing a new software, it is a change […]

Remote Workforces Create New Security & Compliance Headaches

The new remote world has ushered in a host of security issues. Sensitive data now sits in laptops in employees’ houses and if an employee disconnects from the corporate VPN, the company goes blind. This massively increases the risk footprint and leaves the company out of compliance. Veriato utilizes AI-driven micro-agents that sit on the […]

WHITE PAPER: Get total endpoint security with KACE

As an IT professional, you’re likely under pressure to manage an increasingly complex environment, while also protecting your network and devices from cyberthreats. Read this white paper to discover how the KACE Unified Endpoint Manager by Quest enables you to streamline complex endpoint management tasks and gain greater control of both traditional and modern managed […]

Is your business CyberFit?

If your business relies on Microsoft 365, then it’s essential that you take the time to protect it by backing up your Microsoft 365.  Learn how Acronis Cyber BackUp can help avoid downtime, protect data and improve security.   We aim to protect your business, whilst eliminating complexity and reducing cost. We help you to upgrade cybersecurity […]

To succeed, enterprise cybersecurity needs IoT scale

By Nigel Thompson, VP Product Marketing at BlackBerry There are few things in cybersecurity that aren’t up for endless debate. Yet one thing that is universally agreed upon is that anything with an Internet address can and will be attacked. We’ve certainly witnessed this happening on a large scale with the proliferation of Internet of things […]

Hold tight for 2021: A volatile global outlook will continue to fuel fraud and cyber-threats

By Ian Newns, Fraud Specialist at RSA Security 2020 was full of surprises. But one thing that didn’t come as a revelation was the speed and agility with which the criminal community reacted to unfolding global events. We’ve often witnessed groups behind phishing attacks, for example, capitalise on breaking news stories and consumer behavioural change to […]