Your Search

 

Content: Incident Response & Security Operations

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 47 results

|

Items per page:

Sort By
  • Addressing One of the Largest Risks in Cybersecurity: Humans!

    Wednesday15:05 - 15:2005 Jun 2019
    Cyber Innovation Showcase

    Your employees today struggle to identify real cyber attacks, whilst traditional awareness campaigns has failed to drive cultural and behavioural change. HumanF...

    • Language: English

  • Addressing One of the Largest Risks in Cybersecurity: Humans!

    Tuesday11:20 - 11:3504 Jun 2019
    Cyber Innovation Showcase

    Your employees today struggle to identify real cyber attacks, whilst traditional awareness campaigns has failed to drive cultural and behavioural change. HumanF...

    • Language: English

  • AI: Past Failures, Current Capability & the Future of "Nation State" Defence

    Tuesday10:40 - 11:0504 Jun 2019
    Tech Talks

    With an increasing skills gap and wave of autonomous attacks, military, governments and global enterprises are asking industry to deliver “self-healing, self-de...

    • Language: English

  • Anatomy of a Cyber Attack: DNSpionage

    Wednesday11:20 - 11:4505 Jun 2019
    Tech Talks

    Threat actors continuously search for new techniques to compromise their victims. Recently, Cisco Talos identified a new malicious campaign named “DNSpionage”. ...

    • Language: English

  • Automating Business Security is Possible: Why do so Many Enterprises Not Know & Are They Missing Out?

    Thursday10:40 - 11:0506 Jun 2019
    Tech Talks

    Business certificate management is an often-overlooked but vital issue in the enterprise. Manual management can result in outages and time wastage; this talk ex...

    • Language: English

  • Be the Hunter, Not the Hunted: What the Latest Cyber Attacks Mean to the Defenders

    Tuesday13:30 - 14:1504 Jun 2019
    Insight Stage

    Threats & Attacks Throughout the past year we’ve seen quite a lot - from organisations being sprayed with malware by cybercrime groups to nation state backed A...

    • Language: English

  • Building a Secure Architectural Foundation for Next Generation Networks & Digital Transformation

    Tuesday15:20 - 15:4504 Jun 2019
    Technology Showcase

    Organisations have grown their security defences as they have responded to the rapidly evolving threat landscape. This has led to a disjointed, fragile security...

    • Language: English

  • Building an Intelligent Incident Response Plan: Lessons from the Front Line

    Thursday14:25 - 15:3506 Jun 2019
    Keynote Stage

    Panel Discussion Effective incident response brings together multiple stakeholders who must work together to deal swiftly with the incident. During this sessio...

    • Language: English

  • Building Cyber Resilience to Sustained & Persistent Cyberattacks

    Thursday14:00 - 14:2506 Jun 2019
    Strategy Talks

    Threat detection, threat intelligence and threat hunting – Enhancing business resilience to sustained and persistent cyberattacks. The talk will allow organisat...

    • Language: English

  • Building or Modernising Own CSIRT/SOC: Practical Tips

    Tuesday13:45 - 14:1504 Jun 2019
    Talking Tactics

    The presentation will centre around cybersecurity capability build-out via the establishment of governmental, sectorial and organisational Computer Security Inc...

    • Language: English

  • Combating Open Source Security Vulnerabilities Without Slowing Down Developers

    Tuesday16:00 - 16:2504 Jun 2019
    Tech Talks

    Development teams are facing nowadays an unprecedented challenge to accommodate requirements of application security while maintaining an agile development proc...

    • Language: English

  • Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

    Wednesday10:40 - 11:0505 Jun 2019
    Technology Showcase

    Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuf...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.