Your Search

  • Topic Area

Reset Search
 

Content: Governance, Risk & Compliance

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 8 of 8 results

|

Items per page:

Sort By
  • Automated Cyber Value-at-Risk for Application Security

    Wednesday15:30 - 15:4505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Uleska are leading the way in the automation of cyber value-at-risk determination for application security testing, and this session will...

    • Language: English

  • Bringing Rapid Prototyping to the Threat Model Process

    Tuesday15:30 - 16:1504 Jun 2019
    Geek Street

    Introduction to the Rapid Threat Model Prototyping methodology, a radical departure from standard architectural threat modeling. This new methodology allows sof...

    • Language: English

  • Evasive Malware: How Attackers Bypass Dynamic Analysis

    Wednesday14:00 - 14:2505 Jun 2019
    Tech Talks

    Mimecast’s Chief Scientist of Advanced Malware, Meni Farjon, will showcase high and low-level, known and unknown techniques for malware authors to evade current...

    • Language: English

  • Evasive Phishing: New Attacks, Techniques & Trends

    Wednesday16:00 - 16:2505 Jun 2019
    Tech Talks

    We are experiencing a ‘perfect phishing storm’ of increasing sophistication, volume, and targeting in phishing attacks, driven by the maturation of the phishing...

    • Language: English

  • Overcome the Tech & Politics of Securing Critical National Infrastructure (CNI)

    Thursday14:00 - 14:2506 Jun 2019
    Tech Talks

    The National Cyber Security Centre (NCSC) has warned that hostile states will attempt deadly cyberattacks against UK infrastructure, but argues that the UK gove...

    • Language: English

  • Personality Traits Meet Cybersecurity

    Tuesday16:40 - 17:0504 Jun 2019
    Strategy Talks

    The art of “people hacking” tricks people into unwillingly participate in scams. Certain personality traits make people more (and less) likely to fall prey to s...

    • Language: English

  • The Devil Inside

    Thursday13:20 - 13:4506 Jun 2019
    Tech Talks

    Identifying, building and acting on insider threat cases. This will include discussion of criminal trends and investigative practices, as well as balancing data...

    • Language: English

  • Workshop 3: CISSP Preview: A Risk Based Approach to Security

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Risk and security remain inextricably linked, this workshop examines practical approaches to the effective management of this important relationship, including ...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.