Your Search

  • Date

    • 4th June 2019 (Tuesday) Remove
Reset Search
 

Content: Incident Response & Security Operations

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 21 results

|

Items per page:

Sort By
  • Addressing One of the Largest Risks in Cybersecurity: Humans!

    Tuesday11:20 - 11:3504 Jun 2019
    Cyber Innovation Showcase

    Your employees today struggle to identify real cyber attacks, whilst traditional awareness campaigns has failed to drive cultural and behavioural change. HumanF...

    • Language: English

  • AI: Past Failures, Current Capability & the Future of "Nation State" Defence

    Tuesday10:40 - 11:0504 Jun 2019
    Tech Talks

    With an increasing skills gap and wave of autonomous attacks, military, governments and global enterprises are asking industry to deliver “self-healing, self-de...

    • Language: English

  • Be the Hunter, Not the Hunted: What the Latest Cyber Attacks Mean to the Defenders

    Tuesday13:30 - 14:1504 Jun 2019
    Insight Stage

    Threats & Attacks Throughout the past year we’ve seen quite a lot - from organisations being sprayed with malware by cybercrime groups to nation state backed A...

    • Language: English

  • Building a Secure Architectural Foundation for Next Generation Networks & Digital Transformation

    Tuesday15:20 - 15:4504 Jun 2019
    Technology Showcase

    Organisations have grown their security defences as they have responded to the rapidly evolving threat landscape. This has led to a disjointed, fragile security...

    • Language: English

  • Building or Modernising Own CSIRT/SOC: Practical Tips

    Tuesday13:45 - 14:1504 Jun 2019
    Talking Tactics

    The presentation will centre around cybersecurity capability build-out via the establishment of governmental, sectorial and organisational Computer Security Inc...

    • Language: English

  • Combating Open Source Security Vulnerabilities Without Slowing Down Developers

    Tuesday16:00 - 16:2504 Jun 2019
    Tech Talks

    Development teams are facing nowadays an unprecedented challenge to accommodate requirements of application security while maintaining an agile development proc...

    • Language: English

  • Digitalisation & the Cyber INsecurity Gap

    Tuesday10:40 - 11:0504 Jun 2019
    Technology Showcase

    79% of executives report their organisation is adopting new technologies faster than they can address security issues. As companies rely more on digital IT, clo...

    • Language: English

  • Expense in Depth: Managing Your Total Cost of Controls

    Tuesday14:00 - 14:2504 Jun 2019
    Strategy Talks

    John McClurg, Vice President - Ambassador-At-Large, Cylance will show how current approaches to information security are economically inefficient and why a Tota...

    • Language: English

  • From Beyond the Wall to the Seven Kingdoms: Why Email Threat-Sharing Gives Us A Chance

    Tuesday13:00 - 13:1504 Jun 2019
    Cyber Innovation Showcase

    For business leaders and aspiring Iron Throne rulers.  As members of the security community suffering from the constant onslaught of cyberattacks, it’s time we...

    • Language: English

  • How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks

    Tuesday11:45 - 12:0004 Jun 2019
    Cyber Innovation Showcase

    There are five technical information security controls that if implemented correctly are known to eliminate 95% of cyber attacks. These are well documented as p...

    • Language: English

  • Incident & Breach Management for Privacy & Security Teams

    Tuesday12:45 - 13:1504 Jun 2019
    Talking Tactics

    Privacy and security professionals often approach incident and breach response from two different outlooks. Whereas security teams focus on threat vectors, priv...

    • Language: English

  • Is That Really You? The Importance of Identity in Breach Readiness & Response

    Tuesday11:20 - 11:4504 Jun 2019
    Tech Talks

    Monitoring your users’ access and privileges, and securing them as they interact with the internet is core to a Zero Trust approach to cybersecurity. But what i...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.