Your Search

 

Content: Governance, Risk & Compliance

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 57 results

|

Items per page:

Sort By
  • Automated Cyber Value-at-Risk for Application Security

    Wednesday15:30 - 15:4505 Jun 2019
    Cyber Innovation Showcase

    Uleska are leading the way in the automation of cyber value-at-risk determination for application security testing, and this session will discuss the challenges...

    • Language: English

  • Back to the Future: A Data Breach Prevention Plan

    Thursday11:20 - 11:4506 Jun 2019
    Technology Showcase

    Great Scott! Every day you see headlines about huge enterprises being attacked, but is this a problem only for the “giants”? Not at all. There is no big or smal...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Thursday13:20 - 13:4506 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Wednesday14:40 - 15:0505 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • Black Mirrors: The Dark Web, The Enterprise & Platform Criminality

    Thursday13:00 - 13:4506 Jun 2019
    Geek Street

    Respected criminologist, Dr. Mike McGuire, delves into the murky world of platform criminality, crossing into the black mirror of the dark web to understand the...

    • Language: English

  • Bringing Rapid Prototyping to the Threat Model Process

    Tuesday15:30 - 16:1504 Jun 2019
    Geek Street

    Introduction to the Rapid Threat Model Prototyping methodology, a radical departure from standard architectural threat modeling. This new methodology allows sof...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Wednesday11:45 - 12:0005 Jun 2019
    Cyber Innovation Showcase

    Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding routes and the learning jou...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Tuesday15:05 - 15:2004 Jun 2019
    Cyber Innovation Showcase

    Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding routes and the learning jou...

    • Language: English

  • Building Brand Infosec: Engaging Employees to Drive Secure Behaviour

    Tuesday11:25 - 12:3504 Jun 2019
    Keynote Stage

    Panel Discussion High profile breaches over the last 12 months have demonstrated that no matter how much sophisticated security technology is in place, it cann...

    • Language: English

  • Cryptojacking: What You Need to Know

    Tuesday10:00 - 10:2504 Jun 2019
    Tech Talks

    In his talk, Chris Marrison, Consulting Solutions Architect at Infoblox, will provide a brief yet informative history on everything ‘crypto’, including crypto c...

    • Language: English

  • Don’t Acquire Your Next Breach: Managing Vendor Risk Under the GDPR

    Wednesday11:45 - 12:4505 Jun 2019
    Information Security Exchange

    Managing vendor risk before, during and after onboarding is a continuous effort under the GDPR and impending data protection regulations. While outsourcing oper...

    • Language: English

  • Enabling Through-Life ISMS Value

    Thursday14:00 - 14:2506 Jun 2019
    Technology Showcase

    The SABSA Methodology is well regarded for Enterprise Security Architecture, but how can it benefit the implementation and operation of a security program withi...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.