Your Search

Filter by


2017 Conference Programme


  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all


1 - 12 of 199 results


Items per page:

Sort By
  • Deep Cyber Tech is Out, Simple Is In - How To Keep Anybody Safe Online

    Tuesday10:00 - 10:1506 Jun 2017
    Cyber Innovation Showcase

    The session will highlight the challenges individuals and small businesses face in staying safe online and how companies can protect them at scale. You’ll also ...

    • Language: English

  • Workshop 3: Taking Back the Upper Hand from DDoS Attackers

    Tuesday10:00 - 12:0006 Jun 2017
    Security Workshop

    The world has seen cyber attackers succeed in causing major disruptions, damage brand reputations, and steal corporate assets. In Europe over the past year alon...

    • Language: English

  • Workshop 1: The Major Security Vulnerabilities of 2017 and Beyond

    Tuesday10:00 - 12:0006 Jun 2017
    Security Workshop

    This not to be missed session will focus on what businesses need to defend against – both now, and what is likely to pose problems in the future.  We will cover...

    • Language: English

  • Internet Banking Safeguards Vulnerabilities

    Tuesday10:00 - 10:4506 Jun 2017
    Intelligent Defence

    All internet banking applications are different but all of them share many common security features which are very specific to this domain of web applications. ...

    • Language: English

  • Open Secret

    Tuesday10:00 - 10:5006 Jun 2017
    Keynote Stage

    Opening Keynote Presentation Drawing on her experience as the first female Director General of MI5, a position she held until 1996, Dame Stella will discuss her...

    • Language: English

  • Application Whitelisting - The Safest Way to Secure Your Network

    Tuesday10:00 - 10:2506 Jun 2017
    Technology Showcase

    SecuLution secures computer systems against any unwanted software, such as viruses or ransomware - even if these are new and unknown to virus scanners. Only sof...

    • Language: English

  • Workshop 2: CISSP Preview: Security & Risk Management

    Tuesday10:00 - 12:0006 Jun 2017
    Security Workshop

    Based on the (ISC)2 CISSP Certification – the Gold Standard in the Information Security Industry –  this workshop will cover the key principles every security p...

    • Language: English

  • Financial Institutions on High Alert for Cyber-Attacks - How Effective IT Security Monitoring Fosters Resilient Financial Institutions

    Tuesday10:00 - 10:2506 Jun 2017
    Strategy Talks

    This talk will discuss the increasing cyber-attacks on financial institutions. Recent incidents worldwide have let the concerns about this sector’s vulnerabilit...

    • Language: English

  • Biometric Analysis: A New Dimension to Continuous Authentication

    Tuesday10:00 - 10:2506 Jun 2017
    Tech Talks

    As privileged users are the primary target of account hijacking, it is crucial to add session recording (PAM) data that enables the analysis of biometrical char...

    • Language: English

  • Protecting High-Value Data, Today & In The Quantum Era

    Tuesday10:25 - 10:4006 Jun 2017
    Cyber Innovation Showcase

    Learn how to improve access control for high-value data – protecting your organisation from insider threats, phishing and whaling – and enabling the use of thir...

    • Language: English

  • App-to-Cloud Security: Three Problems You Don’t Know You Have

    Tuesday10:30 - 11:3006 Jun 2017
    Information Security Exchange

    Mobile and cloud computing make productivity more portable than it has ever been though this progress is not without its perils. In the early days of SaaS, brow...

    • Language: English

  • SCADA Security – The Rise And Fall Of The IDS

    Tuesday10:40 - 11:0506 Jun 2017
    Technology Showcase

    Just like in the early days of IT security ICS/SCADA security relies on network monitoring. It’s easy to implement, but only addresses a fraction of the problem...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.