Your Search

 

Content: Cloud Security

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 24 of 27 results

|

Items per page:

Sort By
  • 10 Ways to Stop Phishing Attacks

    Tuesday14:30 - 15:0004 Jun 2019
    Talking Tactics

    77% of phishing attacks in 2018 targeted financial institutions and phishing sites now use SSL certificates and HTTPS to trick your Internet users. Unsurprising...

    • Language: English

  • Branch Security for Direct Internet Access

    Wednesday13:45 - 14:1505 Jun 2019
    Talking Tactics

    Allowing branch sites access to business critical cloud applications such as Office 365 over a public Internet link is an understandably growing trend. Join us ...

    • Language: English

  • Challenges in Securing Open Source Components

    Wednesday13:20 - 13:4505 Jun 2019
    Technology Showcase

    Open Source Components can provide a huge advantage for software developers in terms of speed of delivery and range of functionality but they can also represent...

    • Language: English

  • Cloud Key Management for Multinational Regulations

    Wednesday16:00 - 16:3005 Jun 2019
    Talking Tactics

    Understand strategies for key management architectures for cloud based applications that meet the needs of multinational corporations for GDPR, data privacy, da...

    • Language: English

  • Cloud Risk Decoder Ring: Shared Responsibility & Ways to Avoid Self-Inflicted Harm

    Thursday14:15 - 15:1506 Jun 2019
    Information Security Exchange

    With continuing cloud data breach headlines, IT and Security teams are experiencing the painful nuances of the shared responsibility model. With a new set of te...

    • Language: English

  • Cracking the Complexity Conundrum: How to Secure, Patch & Protect Complex, Dynamic Organisations

    Wednesday12:25 - 13:2505 Jun 2019
    Keynote Stage

    Panel Discussion Enterprises are more dynamic and complex than ever before.  From working practices, agile development and the latest technologies, to multiple...

    • Language: English

  • Demystifying Intelligence-Led Red Teaming: What It Is & How to Automate It

    Wednesday10:00 - 10:2505 Jun 2019
    Strategy Talks

    On May 2018, the European Central Bank published the TIBER-EU, a framework for testing financial sector resilience to cyber attacks. TIBER-EU framework puts an...

    • Language: English

  • How Modern Access Management Can Accelerate Digital Transformation

    Wednesday14:30 - 15:0005 Jun 2019
    Talking Tactics

    Learn how modern access management can accelerate digital transformation by making it simpler, safer and more cost-effective for your users to access the apps a...

    • Language: English

  • How the UK’s Data Protection Act of 2018 Impacts Your GDPR Programme

    Wednesday12:45 - 13:1505 Jun 2019
    Talking Tactics

    While the UK's Data Protection Act of 2018 complements the GDPR, there are several key pieces that impact how individual's personal data is managed. The Act sup...

    • Language: English

  • How to Find Infrastructure Shadow IT in the Cloud

    Tuesday15:15 - 15:4504 Jun 2019
    Talking Tactics

    The cloud has enabled increases in agility and cost savings in IT, but has allowed employees to buy and provision out-of-policy cloud infrastructure without app...

    • Language: English

  • How to Secure Your Data in the Cloud

    Tuesday16:00 - 16:2504 Jun 2019
    Technology Showcase

    The cloud revolution is upon us. More and more organisations are moving their critical data to the cloud due to the tremendous potential of cloud platforms. But...

    • Language: English

  • Predicting the Unpredictable: A Look Into the 2019 Cyber Threat Landscape

    Tuesday14:40 - 15:0504 Jun 2019
    Technology Showcase

    Learn about the latest cyber threat landscape & how you can stay one step ahead always.

    • Language: English

  • Protecting Your Network’s Precious Jewels with Micro-Segmentation

    Wednesday16:40 - 17:0505 Jun 2019
    Technology Showcase

    As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. Regardless of how many different firewalls you use, it’s merel...

    • Language: English

  • Protecting Your People & Securing the Cloud with CASB

    Tuesday12:40 - 13:0504 Jun 2019
    Technology Showcase

    Driven by Microsoft Office 365, digital transformation is remaking every aspect of modern business. And although early initial hesitations about cloud-based ser...

    • Language: English

  • Risk Management for the Cloud

    Wednesday15:30 - 16:1505 Jun 2019
    Insight Stage

    Protecting your customer data and mitigating risk is highly complex, especially when pursuing a multi-cloud strategy. To do this, your teams need the tools that...

    • Language: English

  • Taming the Storm Clouds: Managing Network Security Across the Hybrid & Multi-Cloud Estate

    Tuesday14:00 - 14:2504 Jun 2019
    Technology Showcase

    Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visib...

    • Language: English

  • The Battle to Protect Public Services Against Phishing Attacks

    Wednesday12:00 - 12:3005 Jun 2019
    Talking Tactics

    A growing priority for Nikola Howard, Data Centre Manager at the London Borough of Camden, has been the need to keep employee and residents’ inboxes safe from t...

    • Language: English

  • The Key to Securing Your Hybrid Cloud Starts with "ABC"

    Tuesday11:20 - 11:4504 Jun 2019
    Technology Showcase

    Many enterprises are adopting a cloud-first strategy to drive their business. As cloud deployments increase, security requirements increase with them, leading t...

    • Language: English

  • The World’s Most Sought-After Security Researchers...Working For You

    Thursday10:30 - 11:0006 Jun 2019
    Talking Tactics

    Cisco’s Talos organisation is an elite team of 250 of the world’s most sought-after security researchers analysing billions of security signatures and postures ...

    • Language: English

  • The World’s Most Sought-After Security Researchers...Working For You

    Tuesday10:30 - 11:0004 Jun 2019
    Talking Tactics

    Cisco’s Talos organisation is an elite team of 250 of the world’s most sought-after security researchers analysing billions of security signatures and postures ...

    • Language: English

  • Understanding & Leveraging GDPR Regulations to Justify IT Security Spend

    Wednesday15:20 - 15:4505 Jun 2019
    Strategy Talks

    This session draws upon Apricorn’s survey of over 100 IT security professionals which emphasises the security challenges IT executives face when balancing data ...

    • Language: English

  • Using Shipbuilders Wisdom to Protect Data Centres & Clouds

    Tuesday13:20 - 13:4504 Jun 2019
    Technology Showcase

    In today’s modern, hyper-connected and threat-laden enterprise landscape, the time has come to shift from traditional walls-based protection into a flexible sec...

    • Language: English

  • Workshop 1: With Your Head in the Cloud? Zero Trust Secure Access is Here to Help!

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    Rohini Kasturi, Chief Development Officer with Pulse Secure shares his vision on Zero Trust Secure Access Harvey Durrant, ICT Strategist, shares his vision o...

    • Language: English

  • Workshop 2: Speed & Precision: The Keys to Stopping Modern Adversarie

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight an...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.