Your Search

Reset Search
 

Content: Cyber Physical

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 7 of 7 results

|

Items per page:

Sort By
  • Cybersecurity for CNI & II Symposium

    Tuesday10:15 - 12:5004 Jun 2019
    Cybersecurity for CNI & II Symposium

    Building Cyber Resilience in Critical National Infrastructure & Industrial Infrastructure When: Tuesday 4th June, 10.15-12.50 Where: Pillar Hall, Olympia As ...

    • Language: English

  • Device Authentication with ICMetrics

    Thursday10:00 - 10:2506 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Current secure device authentication and encryption technology has serious limitations in assuring the identity of a given device and its...

    • Language: English

  • Modern Cyber Threats & Prioritising Security Controls to Combat Them

    Wednesday10:40 - 11:0505 Jun 2019
    Strategy Talks

    Another year, another security show, what silver bullets are you hunting for this go round? In reality the threats we face today may be more sophisticated than ...

    • Language: English

  • Regulating the IoT. A Dream too far?

    Wednesday11:45 - 12:3005 Jun 2019
    Geek Street

    In this presentation you’ll get a potted history of the shambles that is IoT security. You’ll gain an understanding of systemic security issues, and how and why...

    • Language: English

  • Securing Smarter Cities: Practical Protocol & Policy

    Thursday10:00 - 10:2506 Jun 2019
    Tech Talks

    Attendees will learn of the security and privacy successes – and failures – of smart city initiatives. By examining components of smart cities (transport system...

    • Language: English

  • The Digital Risk Dilemma: How to Protect What You Don’t Control

    Tuesday12:40 - 13:0504 Jun 2019
    Strategy Talks

    Everyday more of your attack surface moves to web infrastructure that you neither own nor directly control. To protect your digital assets and thwart malicious ...

    • Language: English

  • ZTE Router Vulnerabilities: A Demonstration on the Security Risks of the IoT

    Wednesday13:00 - 13:4505 Jun 2019
    Geek Street

    Positive Technologies researchers have discovered a number of vulnerabilities in a ZTE wifi router, used by 750-800 thousand devices globally. This presentation...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.