Your Search

  • Date

    • 5th June 2019 (Wednesday) Remove
  • Company Size

Reset Search
 

Content: Incident Response & Security Operations

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 9 of 9 results

|

Items per page:

Sort By
  • Addressing One of the Largest Risks in Cybersecurity: Humans!

    Wednesday15:05 - 15:2005 Jun 2019
    Cyber Innovation Showcase

    Your employees today struggle to identify real cyber attacks, whilst traditional awareness campaigns has failed to drive cultural and behavioural change. HumanF...

    • Language: English

  • Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

    Wednesday10:40 - 11:0505 Jun 2019
    Technology Showcase

    Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuf...

    • Language: English

  • Cyber Defence 2019: An Overview of HIDS, NIDS & IPS Systems

    Wednesday15:30 - 16:1505 Jun 2019
    Geek Street

    This presentation will introduce you to cyber intrusion tools that help to prevent cyber intrusions threats from entering and harming your network. I will prese...

    • Language: English

  • Demystifying Intelligence-Led Red Teaming: What It Is & How to Automate It

    Wednesday10:00 - 10:2505 Jun 2019
    Strategy Talks

    On May 2018, the European Central Bank published the TIBER-EU, a framework for testing financial sector resilience to cyber attacks. TIBER-EU framework puts an...

    • Language: English

  • From Beyond the Wall to the Seven Kingdoms: Why Email Threat-Sharing Gives Us A Chance

    Wednesday12:10 - 12:2505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation For business leaders and aspiring Iron Throne rulers.  As members of the security community suffering from the constant onslaught of cyb...

    • Language: English

  • Managing the Insider Threat: Why Visibility is Critical

    Wednesday10:30 - 11:0005 Jun 2019
    Talking Tactics

    Ponemon research shows that the average time to spot and contain an insider threat is 72 days - only 16% of incidents are identified and contained within 30 day...

    • Language: English

  • Phishing & OOB Exfiltration Through Purple Tinted Glasses

    Wednesday14:15 - 15:0005 Jun 2019
    Geek Street

    The proliferation of client-side attacks continues to grow, as attackers are increasingly aware their chances of success are increased if they can get the victi...

    • Language: English

  • Strategic Autonomous Response: Learning from Patient Zero to Protect the Network at Large

    Wednesday12:40 - 13:0505 Jun 2019
    Strategy Talks

    With email still the most common vector of attack, it is time for a new approach to defending our digital businesses. AI cyber defences can now be deployed acro...

    • Language: English

  • Why Artificial Intelligence Doesn't Work & Other Cybersecurity Failed Technologies

    Wednesday16:00 - 16:2505 Jun 2019
    Strategy Talks

    As the hype and talk of AI increases and with many organisations now claiming to have adopted AI capabilities in-house, Ian Mann discusses why Artificial Intell...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.