Your Search

  • Date

    • 6th June 2019 (Thursday) Remove
  • Type of Content

Reset Search
 

Content: Incident Response & Security Operations

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 4 of 4 results

|

Items per page:

Sort By
  • Feel the Flow: Where Water & Energy Industries are Most Vulnerable

    Thursday11:45 - 12:3006 Jun 2019
    Geek Street

    There are several sensationalised stories about the vulnerability of internet connected critical infrastructure - especially in the water and energy sectors. He...

    • Language: English

  • How to Identify and Prevent Evasive Threats Using your Organisation’s Data

    Thursday12:40 - 13:0506 Jun 2019
    Tech Talks

    Stealth operations that were once only possible for the most sophisticated state-actors, are now much more common. These new and sophisticated techniques bring ...

    • Language: English

  • Multi-Phased Attacks: The 1-2 Punch That Can Knock Your Business Cold

    Thursday11:45 - 12:1006 Jun 2019
    Cyber Innovation Showcase

    Download Presentation In 2019, the volume—and sophistication—of email threats is growing. Phishing is virtually indistinguishable from legitimate communication...

    • Language: English

  • The Power Hacker: Don’t Let the Lights Go Out: A Look Inside the Mind of a Hacker

    Thursday15:20 - 15:4506 Jun 2019
    Tech Talks

    This session is a real-world hack into a power station that explains the process on planning and preparation, the major challenges of hacking into a power stati...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.