Your Search

 

Content: Threats, Exploits & Vulnerabilities

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 82 results

|

Items per page:

Sort By
  • "Yes We Can Get In. Now What?"

    Tuesday12:00 - 12:2504 Jun 2019
    Tech Talks

    The results of a red-team test (or breach) can be a thunderclap under a clear blue sky. The recommendations might look idealistic and expensive. Management migh...

    • Language: English

  • 10 Ways to Stop Phishing Attacks

    Tuesday14:30 - 15:0004 Jun 2019
    Talking Tactics

    77% of phishing attacks in 2018 targeted financial institutions and phishing sites now use SSL certificates and HTTPS to trick your Internet users. Unsurprising...

    • Language: English

  • A Journey of Self Driven Security Training

    Wednesday14:15 - 14:3005 Jun 2019
    Cyber Innovation Showcase

    This talk details a course of progression from engineer to security advocate, highlighting the importance of self driven teaching methodologies, the increased a...

    • Language: English

  • A Journey of Self Driven Security Training

    Tuesday10:55 - 11:1004 Jun 2019
    Cyber Innovation Showcase

    This talk details a course of progression from engineer to security advocate, highlighting the importance of self driven teaching methodologies, the increased a...

    • Language: English

  • Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx

    Wednesday11:20 - 11:3505 Jun 2019
    Cyber Innovation Showcase

    As we face an ever-larger number of increasingly more complex cyber threats in networks operating at ever greater speeds, the developers of tomorrow’s cybersecu...

    • Language: English

  • Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx

    Tuesday15:30 - 15:4504 Jun 2019
    Cyber Innovation Showcase

    As we face an ever-larger number of increasingly more complex cyber threats in networks operating at ever greater speeds, the developers of tomorrow’s cybersecu...

    • Language: English

  • Anatomy of a Cyber Attack: DNSpionage

    Wednesday11:20 - 11:4505 Jun 2019
    Tech Talks

    Threat actors continuously search for new techniques to compromise their victims. Recently, Cisco Talos identified a new malicious campaign named “DNSpionage”. ...

    • Language: English

  • Automating Business Security is Possible: Why do so Many Enterprises Not Know & Are They Missing Out?

    Thursday10:40 - 11:0506 Jun 2019
    Tech Talks

    Business certificate management is an often-overlooked but vital issue in the enterprise. Manual management can result in outages and time wastage; this talk ex...

    • Language: English

  • Automating Cryptographic Vulnerability Analysis in the CI Toolchain

    Thursday12:45 - 13:1506 Jun 2019
    Talking Tactics

    Accidental deployment of vulnerable cryptography can lead to significant data breaches - like the one that led to Uber paying a $200M fine in 2018. So companies...

    • Language: English

  • Be the Hunter, Not the Hunted: What the Latest Cyber Attacks Mean to the Defenders

    Tuesday13:30 - 14:1504 Jun 2019
    Insight Stage

    Threats & Attacks Throughout the past year we’ve seen quite a lot - from organisations being sprayed with malware by cybercrime groups to nation state backed A...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Wednesday14:40 - 15:0505 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • Case Study: Lessons Learned from the NotPetya Cyber-Attack

    Thursday12:25 - 13:1506 Jun 2019
    Keynote Stage

    In 2017 to NotPetya ransomware attack wreaked havoc on a range of global businesses including law firms, supermarkets and pharmaceuticals. The attack had a huge...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.