Your Search

  • Date

    • 5th June 2019 (Wednesday) Remove
Reset Search
 

Content: Governance, Risk & Compliance

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 21 results

|

Items per page:

Sort By
  • Automated Cyber Value-at-Risk for Application Security

    Wednesday15:30 - 15:4505 Jun 2019
    Cyber Innovation Showcase

    Uleska are leading the way in the automation of cyber value-at-risk determination for application security testing, and this session will discuss the challenges...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Wednesday14:40 - 15:0505 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Wednesday11:45 - 12:0005 Jun 2019
    Cyber Innovation Showcase

    Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding routes and the learning jou...

    • Language: English

  • Don’t Acquire Your Next Breach: Managing Vendor Risk Under the GDPR

    Wednesday11:45 - 12:4505 Jun 2019
    Information Security Exchange

    Managing vendor risk before, during and after onboarding is a continuous effort under the GDPR and impending data protection regulations. While outsourcing oper...

    • Language: English

  • Evasive Malware: How Attackers Bypass Dynamic Analysis

    Wednesday14:00 - 14:2505 Jun 2019
    Tech Talks

    Mimecast’s Chief Scientist of Advanced Malware, Meni Farjon, will showcase high and low-level, known and unknown techniques for malware authors to evade current...

    • Language: English

  • Evasive Phishing: New Attacks, Techniques & Trends

    Wednesday16:00 - 16:2505 Jun 2019
    Tech Talks

    We are experiencing a ‘perfect phishing storm’ of increasing sophistication, volume, and targeting in phishing attacks, driven by the maturation of the phishing...

    • Language: English

  • How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks

    Wednesday13:50 - 14:0505 Jun 2019
    Cyber Innovation Showcase

    There are five technical information security controls that if implemented correctly are known to eliminate 95% of cyber attacks. These are well documented as p...

    • Language: English

  • How the UK’s Data Protection Act of 2018 Impacts Your GDPR Programme

    Wednesday12:45 - 13:1505 Jun 2019
    Talking Tactics

    While the UK's Data Protection Act of 2018 complements the GDPR, there are several key pieces that impact how individual's personal data is managed. The Act sup...

    • Language: English

  • How to Optimise Investment in Cybersecurity Tools, Technologies & Products

    Wednesday14:40 - 15:3005 Jun 2019
    Keynote Stage

    Panel Discussion - CISOs in Conversation Peddling fear, uncertainty and doubt is a criticism that is frequently levelled at information security vendors with a...

    • Language: English

  • Integrating Cyber Risk into an Enterprise Risk Management Strategy: The CRO’s Perspective

    Wednesday13:45 - 14:2505 Jun 2019
    Keynote Stage

    Cyber risk is listed one of the top 10 risks in terms of both likelihood and risk  in the WEF Global Risk Report 2019. There is no doubt that cyber risk is a co...

    • Language: English

  • Monitoring Active Directory & Windows: Indications you are Under Attack

    Wednesday13:20 - 13:4505 Jun 2019
    Tech Talks

    Most attackers will take the path of least resistance when trying to breach your environment. It makes sense that monitoring the common attack paths could resul...

    • Language: English

  • National or Sectorial Cybersecurity Capability Build-Out: Capability Assessments, CSIRT/SOCs, Threat Landscapes & CIIs

    Wednesday15:15 - 15:4505 Jun 2019
    Talking Tactics

    The session will cover cybersecurity capability build-out via cybersecurity capability assessment, establishment of cybersecurity framework, role of threat land...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.