Skip to content

Webcasts and Events

Our industry-leading solutions help protect your organization, endpoint to cloud, against today’s threats.

Hybrid Cloud Security optimized for VMware, AWS, and Azure environments  to deliver the most complete set of security capabilities across physical, virtual and cloud environments. IDC ranked #1 in Global market share for server security for the sixth straight year.

Network Defense enables organizations to detect, adapt and respond to targeted attacks, and advanced persistent threats that are purpose built to bypass traditional security. NSS labs has ranked us as most effective recommended breach detection system.

User Protection
provides the broadest range of security techniques to protect users and their information anywhere, anytime, on any device.  Named a Leader in Gartner’s Magic Quadrant for Endpoint Protection Platforms for the 14th year in a row.


Book a meeting with our experts:

Raimund Genes
Global CTO
Trend Micro

Rik Ferguson
Vice President of Security Research
Trend Micro

David Sancho
Senior Anti-Malware Engineer
Trend Micro Threat Research

If you would like to schedule a private meeting with one of team please email


Visit our Keynotes:

“State of Vulnerabilities, Exploits and the Best Practices for Prioritising Remediation”
WEDNESDAY 08 Jun 2016, 11:45 - 12:45 [Information Security Exchange]
More than 6000 new unique vulnerabilities will likely be disclosed in 2016. CSOs, CISOs and IT security professionals are expected to keep their organisations safe from new flaws and existing vulnerabilities. When it comes to vulnerability remediation, many organisations are behind the eight ball due to a constant deluge of cyberthreats and acute shortage of Infosec professionals. To weather this perfect storm, IT departments must prioritise remediation. Qualys CTO Wolfgang Kandek and a panel of industry experts will discuss a year-long study of exploits and share best practices to improve remediation and reduce risk.

  • Learn the importance of identifying and prioritizing vulnerabilities to remediate first
  • Obtain insights from a year-long study of the most recent exploits, including Angler, Nuclear, SweetOrange and Magnitude
  • Become acquainted with issues such as root cause analysis, attack vector inspection, attack complexity and remediation information
  • Understand numerous trends which illuminate the nature of the problem and are helpful in creating a remediation plan
  • Hear details about real life exploit case studies as well as review aggregate results of all exploits included in the study



  • Wolfgang Kandek, Chief Technical Officer, Qualys
  • Jayson Jean, Director, Vulnerability Management, Verisign
  • Raimund Genes, Global Chief Technical Officer, Trend Micro

“How Cybercriminals Breached the ATM and Why you Should Care……”
WEDNESDAY 8 June, 16:00 - 16:25 [Tech Talks Theatre]
This session will reveal key findings of recent research on ATM Malware and identify how best to defend against these threats whether your business is in financial services or is simply a customer of a financial institution. Attendees will understand how lessons learned from the thought process of these cybercriminals can help them protect their own organizations from a malware attack.

  • Understand the internal architecture of an ATM and why they are becoming cybercriminal targets
  • Understand what ATM malware is and how the criminals use it to infect ATMs
  • Discover why criminals are targeting ATMs and what they are using those infections for
  • Identify the main ATM malware families are and what different infection strategies each of them uses
  • Understand how banks and ATM users can protect themselves from this threat and the security lessons that can be applied to all businesses

Speaker: David Sacho, Senior Anti-Malware Engineer, Trend Micro Forward Threat Research

“Fostering Better Engagement Between Business & Law Enforcement to Effectively Respond to Cybercrime”
THURSDAY 9 June, 10:50 - 11:40 [Keynote Stage]
It is recognised that information security breaches within enterprises are under-reported to law enforcement authorities. When a breach occurs an organisation’s first priority is usually to protect its reputation and to minimise business impact. As a result, reporting a criminal incident to the authorities might be a secondary consideration, especially when involvement from law enforcement has the potential to disrupt business operations. At the same time, if incidents are not reported, how can investigations be enabled and cyber-criminals be prosecuted? This panel will bring together law enforcement professionals and information security business leaders to discuss:

  • How organisation should engage with law enforcement post breach
  • When law enforcement should be notified
  • Strategies law enforcement bodies can apply to ensure that incidents are investigated thoroughly without compromising the business
  • Creating collaboration: How industry and law enforcement can work together to tackle growing cyber threats



  • Rik Ferguson, Advisor, Europol and Security Researcher, Infosecurity Europe Hall of Fame Alumni
  • Andrew Gould, Detective Chief Inspector Falcon – SCO7 Organised Crime Command, Metropolitan Police Service
  • Kurt Pipal, Assistant Legal Attaché, Office of the Legal Attaché, FBI
  • Brian Honan, Founder & CEO, BH Consulting (Moderator)

Follow us on social media:


Social Media

Connect with us on