Your Search

 

2016 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 194 results

|

Items per page:

Sort By
  • Workshop 2: Dynamic Risk Management for Cyber Defence

    Tuesday10:00 - 12:0007 Jun 2016

    Security Workshops

    The PANOPTESEC project (www.panoptesec.eu) will deliver a beyond-state-of-the-art prototype of a cyber defence decision support system, demonstrating a risk bas...

    • Language: English

  • Workshop 3: Catch, Patch and Match – 3 Simple Steps to Secure Your Windows End Points

    Tuesday10:00 - 12:0007 Jun 2016

    Security Workshops

    See how LANDESK can protect against end point vulnerabilities that exist today whilst mitigating future attacks and proactively assist in protecting your busine...

    • Language: English

  • Case Study: Modern Malware Investigation Techniques

    Tuesday10:00 - 10:2507 Jun 2016

    Tech Talks

    Using a recent Gatak malware attack as an example, this session will walk through an overview of the tools and processes that can be used to detect, contain, in...

    • Language: English

  • Security Automation in the SDLC – Real World Cases

    Tuesday10:00 - 10:2507 Jun 2016

    Strategy Talks

    This presentation is available below in the documents section. How can we really automate secure coding? Agile, devOps, Continuous Integration, Orchestration, S...

    • Language: English

  • Workshop 1: CISSP Preview: Security & Risk Management

    Tuesday10:00 - 12:0007 Jun 2016

    Security Workshops

    Based on the (ISC)2 CISSP Certification – the Gold Standard in the Information Security Industry –  this workshop will cover the key principles every security p...

    • Language: English

  • Perceptions of Risk, Resilience and Operational Security

    Tuesday10:00 - 11:0007 Jun 2016

    Keynote Stage

    Opening Keynote Drawing on his experiences walking the Nile and the Himalayas and during deployments across Africa and Asia as a Captain in the Parachute Regime...

    • Language: English

  • Criminals Don’t Wear Orange Jumpsuits in Public

    Tuesday10:00 - 10:2507 Jun 2016

    Technology Showcase

    Nabbing criminals would be easier if they wore orange jumpsuits in public. Spotting malware is no different. If a webpage or a binary file had clear attributes ...

    • Language: English

  • Understanding the Insider Security Threat, and Developing Strategies to Counter it

    Tuesday10:00 - 10:1507 Jun 2016

    Cyber Innovation Showcase

    This presentation is available below in the documents section. Insider security incidents are the most costly type of security threat, but they arise different...

    • Language: English

  • Official Welcome

    Tuesday10:00 - 10:0507 Jun 2016

    Keynote Stage

    Opening remarks and welcome

    • Language: English

  • 4Secure Erase – the End of HDD Erasure Licenses

    Tuesday10:25 - 10:4007 Jun 2016

    Cyber Innovation Showcase

    This presentation is available below in the documents section. An introduction to 4Secure erase, a hardware based HDD erasure tool certified by CESG to provide...

    • Language: English

  • Keynote Presentation: Cybercrime: What Works in 2016

    Tuesday10:30 - 11:3007 Jun 2016

    Intelligent Defence

    James Lyne (@jameslyne) will review some of the cyber criminals’ main changes in tactics over the end of 2015 and the start of 2016, focusing on what they are d...

    • Language: English

  • Data Governance: How to Protect Your Assets

    Tuesday10:30 - 11:3007 Jun 2016

    Information Security Exchange

    Nathan will discuss the concerns for IT around locating, collecting, preserving and interrogating data in this age of mobile device proliferation, BYOD and clou...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.