Your Search

 

Information Security Exchange Sessions

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 14 results

|

Items per page:

Sort By
  • App-to-Cloud Security: Three Problems You Don’t Know You Have

    Tuesday10:30 - 11:3006 Jun 2017

    Information Security Exchange

    Mobile and cloud computing make productivity more portable than it has ever been though this progress is not without its perils. In the early days of SaaS, brow...

    • Language: English

  • Myths and Unknowns About SSH Privileged Access: For Today & The Cloud

    Tuesday11:45 - 12:4506 Jun 2017

    Information Security Exchange

    Everyone says they know SSH Keys are everywhere, but most aren’t sure on how best to manage and control the critical access they provide.  This “access gap” app...

    • Language: English

  • Enabling Secure Access for the Next Generation of Workers, Apps, Networks & Things

    Tuesday13:00 - 14:0006 Jun 2017

    Information Security Exchange

    For years, enterprises of every size and industry have been trusting the traditional remote access solutions. Today, remote access makes placed for secure acces...

    • Language: English

  • Your Network Needs Automated Real Time Breach Prevention!

    Tuesday14:15 - 15:1506 Jun 2017

    Information Security Exchange

    Organisations today compete in an increasingly complicated and globally connected world. Cyber technology serves as both an enabler and an inhibitor as they ada...

    • Language: English

  • Stop Building Walls Around Your Enterprise and Protect the Core of Your Business

    Tuesday15:30 - 16:3006 Jun 2017

    Information Security Exchange

    Most enterprises have spent considerable capital and resources on securing the perimeter of their business. However, in the new mobile app economy, most are lea...

    • Language: English

  • Elections, Deceptions & Political Breaches - What High Profile Attacks Can Teach Us About Enterprise Security

    Wednesday10:30 - 11:3007 Jun 2017

    Information Security Exchange

    In a world of high-profile espionage attacks, stolen data is being used by non-friendly adversaries to manipulate and influence public opinion. This, together w...

    • Language: English

  • Navigating Infosecurity’s Role in GDPR Compliance

    Wednesday11:45 - 12:4507 Jun 2017

    Information Security Exchange

    The EU General Data Protection Regulation will come into force in May 2018. IT security professionals will have less than twelve months to gain awareness of the...

    • Language: English

  • The Rise of IoT Botnets

    Wednesday13:00 - 14:0007 Jun 2017

    Information Security Exchange

    We all remember the epic attacks suffered by Krebs, OVH and Dyn in 2016. Attacks caused by IoT devices have changed the threat landscape considerably. Knowing t...

    • Language: English

  • Internet of Things & Bad Things

    Wednesday14:15 - 15:1507 Jun 2017

    Information Security Exchange

    IoT is one of the most commonly used terms in Cyber security today. It can mean many things to many people however understanding the risk that it poses to a bus...

    • Language: English

  • Securing Digital Cohesion with SDSN

    Wednesday15:30 - 16:3007 Jun 2017

    Information Security Exchange

    We’ve all seen digital disruption, business being taken exclusively online and data taking a new and incredibly valuable role. Right now we’re inside Digital Tr...

    • Language: English

  • Yesterday’s Email Security Systems Can’t Stop Today’s Email-borne Threats

    Thursday10:30 - 11:3008 Jun 2017

    Information Security Exchange

    During its session, Mimecast will take the audience inside the mind of a cybercriminal by demonstrating a live hack. Participants will leave the session with ne...

    • Language: English

  • A Laptop is Stolen Every 53 Seconds. Are You Ready?

    Thursday11:45 - 12:4508 Jun 2017

    Information Security Exchange

    You probably have a security gap with the laptops accessing your corporate apps. Many laptops have no security policies associated with them, with weak, easily-...

    • Language: English

Media Partners

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.