Your Search

 

Content: Governance, Risk & Compliance

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 57 of 57 results

|

Items per page:

Sort By
  • Automated Cyber Value-at-Risk for Application Security

    Wednesday15:30 - 15:4505 Jun 2019
    Cyber Innovation Showcase

    Uleska are leading the way in the automation of cyber value-at-risk determination for application security testing, and this session will discuss the challenges...

    • Language: English

  • Back to the Future: A Data Breach Prevention Plan

    Thursday11:20 - 11:4506 Jun 2019
    Technology Showcase

    Great Scott! Every day you see headlines about huge enterprises being attacked, but is this a problem only for the “giants”? Not at all. There is no big or smal...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Thursday13:20 - 13:4506 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Wednesday14:40 - 15:0505 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • Black Mirrors: The Dark Web, The Enterprise & Platform Criminality

    Thursday13:00 - 13:4506 Jun 2019
    Geek Street

    Respected criminologist, Dr. Mike McGuire, delves into the murky world of platform criminality, crossing into the black mirror of the dark web to understand the...

    • Language: English

  • Bringing Rapid Prototyping to the Threat Model Process

    Tuesday15:30 - 16:1504 Jun 2019
    Geek Street

    Introduction to the Rapid Threat Model Prototyping methodology, a radical departure from standard architectural threat modeling. This new methodology allows sof...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Wednesday11:45 - 12:0005 Jun 2019
    Cyber Innovation Showcase

    Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding routes and the learning jou...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Tuesday15:05 - 15:2004 Jun 2019
    Cyber Innovation Showcase

    Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding routes and the learning jou...

    • Language: English

  • Building Brand Infosec: Engaging Employees to Drive Secure Behaviour

    Tuesday11:25 - 12:3504 Jun 2019
    Keynote Stage

    Panel Discussion High profile breaches over the last 12 months have demonstrated that no matter how much sophisticated security technology is in place, it cann...

    • Language: English

  • Cryptojacking: What You Need to Know

    Tuesday10:00 - 10:2504 Jun 2019
    Tech Talks

    In his talk, Chris Marrison, Consulting Solutions Architect at Infoblox, will provide a brief yet informative history on everything ‘crypto’, including crypto c...

    • Language: English

  • Don’t Acquire Your Next Breach: Managing Vendor Risk Under the GDPR

    Wednesday11:45 - 12:4505 Jun 2019
    Information Security Exchange

    Managing vendor risk before, during and after onboarding is a continuous effort under the GDPR and impending data protection regulations. While outsourcing oper...

    • Language: English

  • Enabling Through-Life ISMS Value

    Thursday14:00 - 14:2506 Jun 2019
    Technology Showcase

    The SABSA Methodology is well regarded for Enterprise Security Architecture, but how can it benefit the implementation and operation of a security program withi...

    • Language: English

  • Evasive Malware: How Attackers Bypass Dynamic Analysis

    Wednesday14:00 - 14:2505 Jun 2019
    Tech Talks

    Mimecast’s Chief Scientist of Advanced Malware, Meni Farjon, will showcase high and low-level, known and unknown techniques for malware authors to evade current...

    • Language: English

  • Evasive Phishing: New Attacks, Techniques & Trends

    Wednesday16:00 - 16:2505 Jun 2019
    Tech Talks

    We are experiencing a ‘perfect phishing storm’ of increasing sophistication, volume, and targeting in phishing attacks, driven by the maturation of the phishing...

    • Language: English

  • How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks

    Wednesday13:50 - 14:0505 Jun 2019
    Cyber Innovation Showcase

    There are five technical information security controls that if implemented correctly are known to eliminate 95% of cyber attacks. These are well documented as p...

    • Language: English

  • How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks

    Tuesday11:45 - 12:0004 Jun 2019
    Cyber Innovation Showcase

    There are five technical information security controls that if implemented correctly are known to eliminate 95% of cyber attacks. These are well documented as p...

    • Language: English

  • How the UK’s Data Protection Act of 2018 Impacts Your GDPR Programme

    Wednesday12:45 - 13:1505 Jun 2019
    Talking Tactics

    While the UK's Data Protection Act of 2018 complements the GDPR, there are several key pieces that impact how individual's personal data is managed. The Act sup...

    • Language: English

  • How to Build Business Confidence when Migrating your Most Sensitive Data to the Cloud

    Thursday12:40 - 13:0506 Jun 2019
    Strategy Talks

    Today’s security threats combined with the cost-efficiencies of the cloud have forced businesses to look towards hosted platforms when sharing and managing thei...

    • Language: English

  • How to Find Infrastructure Shadow IT in the Cloud

    Tuesday15:15 - 15:4504 Jun 2019
    Talking Tactics

    The cloud has enabled increases in agility and cost savings in IT, but has allowed employees to buy and provision out-of-policy cloud infrastructure without app...

    • Language: English

  • How to Optimise Investment in Cybersecurity Tools, Technologies & Products

    Wednesday14:40 - 15:3005 Jun 2019
    Keynote Stage

    Panel Discussion - CISOs in Conversation Peddling fear, uncertainty and doubt is a criticism that is frequently levelled at information security vendors with a...

    • Language: English

  • Hunting for Zero-Days

    Thursday12:00 - 12:2506 Jun 2019
    Tech Talks

    New vulnerabilities are being found in code daily. Infact, 18,000+ new vulnerabilities are estimated to be disclosed in 2018, with a current growth rate of 27 p...

    • Language: English

  • Integrating Cyber Risk into an Enterprise Risk Management Strategy: The CRO’s Perspective

    Wednesday13:45 - 14:2505 Jun 2019
    Keynote Stage

    Cyber risk is listed one of the top 10 risks in terms of both likelihood and risk  in the WEF Global Risk Report 2019. There is no doubt that cyber risk is a co...

    • Language: English

  • It’s all About Peanut Butter: Building a Multi-Disciplinary Infosec Team to Manage Cyber Risk

    Tuesday12:55 - 13:3504 Jun 2019
    Keynote Stage

    Keynote Presentation Ever been told that security always says NO? Or asked why we need information security when we’re merely in the business of selling peanut...

    • Language: English

  • Monitoring Active Directory & Windows: Indications you are Under Attack

    Wednesday13:20 - 13:4505 Jun 2019
    Tech Talks

    Most attackers will take the path of least resistance when trying to breach your environment. It makes sense that monitoring the common attack paths could resul...

    • Language: English

  • National or Sectorial Cybersecurity Capability Build-Out: Capability Assessments, CSIRT/SOCs, Threat Landscapes & CIIs

    Wednesday15:15 - 15:4505 Jun 2019
    Talking Tactics

    The session will cover cybersecurity capability build-out via cybersecurity capability assessment, establishment of cybersecurity framework, role of threat land...

    • Language: English

  • Navigating Complex Regulatory Oversight to Ensure Privacy, Security & Compliance

    Wednesday16:40 - 17:3005 Jun 2019
    Keynote Stage

    Panel Discussion Regulatory risk is a key challenge for organisations with the threat of huge fines in the event of a breach. Whilst GDPR is still forefront of...

    • Language: English

  • Overcome the Tech & Politics of Securing Critical National Infrastructure (CNI)

    Thursday14:00 - 14:2506 Jun 2019
    Tech Talks

    The National Cyber Security Centre (NCSC) has warned that hostile states will attempt deadly cyberattacks against UK infrastructure, but argues that the UK gove...

    • Language: English

  • Personality Traits Meet Cybersecurity

    Tuesday16:40 - 17:0504 Jun 2019
    Strategy Talks

    The art of “people hacking” tricks people into unwillingly participate in scams. Certain personality traits make people more (and less) likely to fall prey to s...

    • Language: English

  • Practical DevSecOps: The Simple Free Pipeline Anyone Can Create

    Wednesday12:40 - 13:0505 Jun 2019
    Tech Talks

    After this talk, you'll be able to establish your own DevSecOps pipeline immediately. This reference implementation can be adapted easily to almost any tools an...

    • Language: English

  • Privileged Access Management Made Easy

    Tuesday16:00 - 16:3004 Jun 2019
    Talking Tactics

    Keeping sensitive information secure, maintaining data regulation compliance, and enabling privileged users to work efficiently, at the right levels of access, ...

    • Language: English

  • Protecting Your Network’s Precious Jewels with Micro-Segmentation

    Wednesday16:40 - 17:0505 Jun 2019
    Technology Showcase

    As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. Regardless of how many different firewalls you use, it’s merel...

    • Language: English

  • Putting Your Cyber Posture to The Test: Live Demo of Hacking an Enterprise

    Wednesday16:40 - 17:0505 Jun 2019
    Tech Talks

    How secure are your IT systems? Can your information security defences withstand the force of a machine-based hacking attack? The new technology, Automated Pene...

    • Language: English

  • Secure Behaviour Change: The Application of Behavioural Science to Security Awareness

    Thursday15:20 - 15:4506 Jun 2019
    Strategy Talks

    ThinkCyber discuss proven behavioural change techniques such as "nudge theory" and their application in the context of security awareness. By working through re...

    • Language: English

  • Securing SMEs Symposium

    Tuesday14:00 - 16:3004 Jun 2019
    Securing SMEs Symposium

    Implementing Information Security Controls to Manage Risk in the SME When: Tuesday 4th June, 14.00-16.30 Where: Pillar Hall, Olympia The 2018 Verizon Data Br...

    • Language: English

  • Security at the Speed of DevOps: Building In, Not Bolting On

    Tuesday15:20 - 15:4504 Jun 2019
    Strategy Talks

    Security embedded within DevOps reduces risk exposure up to 80%. Adopt security automation in the DevOps process, providing automation and actionable data to de...

    • Language: English

  • SSH Keys: Security Asset or Liability?

    Tuesday13:20 - 13:4504 Jun 2019
    Strategy Talks

    All enterprises rely on SSH for routine administrative tasks by systems administrators, as well as for secure machine-to-machine automation of critical business...

    • Language: English

  • Strengthening Collaboration Between Law Enforcement & Business

    Thursday13:30 - 14:1006 Jun 2019
    Keynote Stage

    One of the continuing challenges facing the information security community is the conflicting objectives of law enforcement and business. In the event of a brea...

    • Language: English

  • Taming the Storm Clouds: Managing Network Security Across the Hybrid & Multi-Cloud Estate

    Tuesday14:00 - 14:2504 Jun 2019
    Technology Showcase

    Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visib...

    • Language: English

  • The Cloud-First Approach to Sustainable Data Governance

    Thursday13:00 - 14:0006 Jun 2019
    Information Security Exchange

    Businesses are driving an explosion in unstructured data. The volume of global business data doubles every 1.2 years, and unstructured content will soon count f...

    • Language: English

  • The Devil Inside

    Thursday13:20 - 13:4506 Jun 2019
    Tech Talks

    Identifying, building and acting on insider threat cases. This will include discussion of criminal trends and investigative practices, as well as balancing data...

    • Language: English

  • The Digital Risk Dilemma: How to Protect What You Don’t Control

    Tuesday12:40 - 13:0504 Jun 2019
    Strategy Talks

    Everyday more of your attack surface moves to web infrastructure that you neither own nor directly control. To protect your digital assets and thwart malicious ...

    • Language: English

  • The Future of Cyber Employment

    Wednesday12:35 - 12:5005 Jun 2019
    Cyber Innovation Showcase

    For every 100 cyber jobs posted on Indeed.com there are only 32 applicants, a skills gap that TechCrunch describes as a gigantic problem for 2019. According to ...

    • Language: English

  • The Impact of Protocol Evolution on Network Security

    Wednesday14:40 - 15:0505 Jun 2019
    Tech Talks

    New protocols such as TLS 1.3, QUIC, DNS over HTTPS are designed to enhance privacy and end-user experience. However, these new protocols also have an impact on...

    • Language: English

  • The Key to Securing Your Hybrid Cloud Starts with "ABC"

    Tuesday11:20 - 11:4504 Jun 2019
    Technology Showcase

    Many enterprises are adopting a cloud-first strategy to drive their business. As cloud deployments increase, security requirements increase with them, leading t...

    • Language: English

  • The Song Remains the Same: Moving the Cybersecurity Dial…

    Tuesday16:00 - 16:2504 Jun 2019
    Strategy Talks

    We're still victim of vulnerabilities which are more than 20 years old despite the evolution of cyber security solutions in the same period.  How can we truly ...

    • Language: English

  • Troll Hunting Using Behavioural Analytics

    Tuesday14:00 - 14:2504 Jun 2019
    Tech Talks

    Influence operation on the web and in social media today target everything from elections to corporate interests and high profile individuals. In this talk we p...

    • Language: English

  • Two Attacks for the Price of One? Defending Against Multi-Intent Malware

    Tuesday15:20 - 15:4504 Jun 2019
    Tech Talks

    Malware engineers are diversifying their businesses with multi-intent malware, where a single successful compromise can open up multiple streams of revenue. In ...

    • Language: English

  • Using Shipbuilders Wisdom to Protect Data Centres & Clouds

    Tuesday13:20 - 13:4504 Jun 2019
    Technology Showcase

    In today’s modern, hyper-connected and threat-laden enterprise landscape, the time has come to shift from traditional walls-based protection into a flexible sec...

    • Language: English

  • View from the Board: Managing Organisational Complexity & Risk

    Wednesday11:25 - 12:0505 Jun 2019
    Keynote Stage

    Keynote Presentation During this presentation Dame Inga Beale, former CEO of Lloyds of London will share her perspective on how to change business and culture a...

    • Language: English

  • What’s New with the ePrivacy Regulation? Key Considerations for Tomorrow’s Electronic Communications

    Tuesday11:15 - 11:4504 Jun 2019
    Talking Tactics

    The ePrivacy Regulation will have a profound effect on marketing activities moving forward. Faced with the legal and financial ramifications of ignoring a consu...

    • Language: English

  • Whose Transformation is it Anyway? How IT Security Teams can Support Digital Services

    Wednesday13:00 - 14:0005 Jun 2019
    Information Security Exchange

    Ask any CIO what phrase they have been asked about most often in the past year, and digital transformation is probably the most common response. Digital transfo...

    • Language: English (United Kingdom)

  • Why Artificial Intelligence Doesn't Work & Other Cybersecurity Failed Technologies

    Wednesday16:00 - 16:2505 Jun 2019
    Strategy Talks

    As the hype and talk of AI increases and with many organisations now claiming to have adopted AI capabilities in-house, Ian Mann discusses why Artificial Intell...

    • Language: English

  • Workshop 2: Stressless ISMS: How Shakespeare Helps When Setting Up an ISMS

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    The session will contain two parts, one in which practical aspects of how to set up and run a certified ISMS are explained and another containing examples of se...

    • Language: English

  • Workshop 3: CISSP Preview: A Risk Based Approach to Security

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Risk and security remain inextricably linked, this workshop examines practical approaches to the effective management of this important relationship, including ...

    • Language: English

  • Workshop 3: Security Maturity: Developing Metrics to Measure & Inform the Security Programme of Organisations

    Thursday10:00 - 11:3006 Jun 2019
    Security Workshop

    Security professionals often come under pressure to assess the success of security initiatives in their organisations, with board members seeking to understand ...

    • Language: English

  • Workshop 4: The Broad Impact of Active Directory Attacks: A Significant Threat to Business Continuity

    Thursday10:00 - 12:0006 Jun 2019
    Security Workshop

    Most enterprises have integrated cyber-resilience in their Business Continuity Plans. Unfortunately, and despite tangible evidence, those plans tend to underest...

    • Language: English

  • Your Organisation & The European Directive on Security of Network & Information Systems (NIS Directive)

    Thursday11:20 - 11:4506 Jun 2019
    Strategy Talks

    While GDPR focused on data protection, the NIS Directive focuses strictly on cybersecurity. It is the first piece of EU-wide legislation on cybersecurity and pr...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.