Your Search

 

Content: Governance, Risk & Compliance

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

37 - 48 of 57 results

|

Items per page:

Sort By
  • Strengthening Collaboration Between Law Enforcement & Business

    Thursday13:30 - 14:1006 Jun 2019
    Keynote Stage

    One of the continuing challenges facing the information security community is the conflicting objectives of law enforcement and business. In the event of a brea...

    • Language: English

  • Taming the Storm Clouds: Managing Network Security Across the Hybrid & Multi-Cloud Estate

    Tuesday14:00 - 14:2504 Jun 2019
    Technology Showcase

    Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visib...

    • Language: English

  • The Cloud-First Approach to Sustainable Data Governance

    Thursday13:00 - 14:0006 Jun 2019
    Information Security Exchange

    Businesses are driving an explosion in unstructured data. The volume of global business data doubles every 1.2 years, and unstructured content will soon count f...

    • Language: English

  • The Devil Inside

    Thursday13:20 - 13:4506 Jun 2019
    Tech Talks

    Identifying, building and acting on insider threat cases. This will include discussion of criminal trends and investigative practices, as well as balancing data...

    • Language: English

  • The Digital Risk Dilemma: How to Protect What You Don’t Control

    Tuesday12:40 - 13:0504 Jun 2019
    Strategy Talks

    Everyday more of your attack surface moves to web infrastructure that you neither own nor directly control. To protect your digital assets and thwart malicious ...

    • Language: English

  • The Future of Cyber Employment

    Wednesday12:35 - 12:5005 Jun 2019
    Cyber Innovation Showcase

    For every 100 cyber jobs posted on Indeed.com there are only 32 applicants, a skills gap that TechCrunch describes as a gigantic problem for 2019. According to ...

    • Language: English

  • The Impact of Protocol Evolution on Network Security

    Wednesday14:40 - 15:0505 Jun 2019
    Tech Talks

    New protocols such as TLS 1.3, QUIC, DNS over HTTPS are designed to enhance privacy and end-user experience. However, these new protocols also have an impact on...

    • Language: English

  • The Key to Securing Your Hybrid Cloud Starts with "ABC"

    Tuesday11:20 - 11:4504 Jun 2019
    Technology Showcase

    Many enterprises are adopting a cloud-first strategy to drive their business. As cloud deployments increase, security requirements increase with them, leading t...

    • Language: English

  • The Song Remains the Same: Moving the Cybersecurity Dial…

    Tuesday16:00 - 16:2504 Jun 2019
    Strategy Talks

    We're still victim of vulnerabilities which are more than 20 years old despite the evolution of cyber security solutions in the same period.  How can we truly ...

    • Language: English

  • Troll Hunting Using Behavioural Analytics

    Tuesday14:00 - 14:2504 Jun 2019
    Tech Talks

    Influence operation on the web and in social media today target everything from elections to corporate interests and high profile individuals. In this talk we p...

    • Language: English

  • Two Attacks for the Price of One? Defending Against Multi-Intent Malware

    Tuesday15:20 - 15:4504 Jun 2019
    Tech Talks

    Malware engineers are diversifying their businesses with multi-intent malware, where a single successful compromise can open up multiple streams of revenue. In ...

    • Language: English

  • Using Shipbuilders Wisdom to Protect Data Centres & Clouds

    Tuesday13:20 - 13:4504 Jun 2019
    Technology Showcase

    In today’s modern, hyper-connected and threat-laden enterprise landscape, the time has come to shift from traditional walls-based protection into a flexible sec...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.