Your Search

Filter by

 

2017 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 146 results

|

Items per page:

Sort By
  • Workshop 1: The Major Security Vulnerabilities of 2017 and Beyond

    Tuesday10:00 - 12:0006 Jun 2017

    Security Workshop

    This not to be missed session will focus on what businesses need to defend against – both now, and what is likely to pose problems in the future.  We will cover...

    • Language: English

  • Application Whitelisting - The Safest Way to Secure your Network

    Tuesday10:00 - 10:2506 Jun 2017

    Technology Showcase

    SecuLution secures computer systems against any unwanted software, such as viruses or ransomware - even if these are new and unknown to virus scanners. Only sof...

    • Language: English

  • Workshop 3: Taking Back the Upper Hand from DDoS Attackers

    Tuesday10:00 - 12:0006 Jun 2017

    Security Workshop

    The world has seen cyber attackers succeed in causing major disruptions, damage brand reputations, and steal corporate assets. In Europe over the past year alon...

    • Language: English

  • Internet Banking Safeguards Vulnerabilities

    Tuesday10:00 - 10:4506 Jun 2017

    Intelligent Defence

    All internet banking applications are different but all of them share many common security features which are very specific to this domain of web applications. ...

    • Language: English

  • Biometric Analysis: A New Dimension to Continuous Authentication

    Tuesday10:00 - 10:2506 Jun 2017

    Tech Talks

    As privileged users are the primary target of account hijacking, it is crucial to add session recording (PAM) data that enables the analysis of biometrical char...

    • Language: English

  • Financial Institutions on High Alert for Cyber-Attacks - How Effective IT Security Monitoring Fosters Resilient Financial Institutions

    Tuesday10:00 - 10:2506 Jun 2017

    Strategy Talks

    This talk will discuss the increasing cyber-attacks on financial institutions. Recent incidents worldwide have let the concerns about this sector’s vulnerabilit...

    • Language: English

  • Workshop 2: CISSP Preview: Security & Risk Management

    Tuesday10:00 - 12:0006 Jun 2017

    Security Workshop

    Based on the (ISC)2 CISSP Certification – the Gold Standard in the Information Security Industry –  this workshop will cover the key principles every security p...

    • Language: English

  • Opening Keynote Presentation

    Tuesday10:00 - 10:5006 Jun 2017

    Keynote Stage

    Details to be Announced

    • Language: English

  • Mobile App-to-Cloud Security: Three Problems You Don’t Know You Have

    Tuesday10:30 - 11:3006 Jun 2017

    Information Security Exchange

    Mobile and cloud computing make productivity more portable than it has ever been though this progress is not without its perils. In the early days of SaaS, brow...

    • Language: English

  • Two-factor Authentication in Android, iOS and Windows 10 Mobile Devices

    Tuesday10:40 - 11:0506 Jun 2017

    Tech Talks

    Two-factor authentication can be a roadblock to cloud acquisition. Learn about the different types of two-factor authentication employed by major mobile OS manu...

    • Language: English

  • Building an IR Capability to Meet Modern Threats & Comply with GDPR

    Tuesday10:40 - 11:0506 Jun 2017

    Strategy Talks

    It is known that a good Incident Response management plan is critical to the successful remediation of a breach or incident. However, with new stricter controls...

    • Language: English

  • Barbarians in the Throne Room

    Tuesday10:55 - 11:4006 Jun 2017

    Intelligent Defence

    "Often defenders worry about the intangible security problems. Defenders need to concentrate their efforts defending the enterprise by focusing on the fundament...

    • Language: English

Media Partners

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.