Your Search

 

Content: Incident Response & Security Operations

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

25 - 36 of 48 results

|

Items per page:

Sort By
  • Incident & Breach Management for Privacy & Security Teams

    Tuesday12:45 - 13:1504 Jun 2019
    Talking Tactics

    Privacy and security professionals often approach incident and breach response from two different outlooks. Whereas security teams focus on threat vectors, priv...

    • Language: English

  • Is That Really You? The Importance of Identity in Breach Readiness & Response

    Tuesday11:20 - 11:4504 Jun 2019
    Tech Talks

    Monitoring your users’ access and privileges, and securing them as they interact with the internet is core to a Zero Trust approach to cybersecurity. But what i...

    • Language: English

  • It Might Get Loud! Exfiltrating Data Using Audio Interfaces

    Wednesday12:00 - 12:2505 Jun 2019
    Tech Talks

    Turning files into analogue signals is not a novel idea, modems did this many years ago... But how about using a USB soundcard to transfer files from a computer...

    • Language: English

  • Managing the Insider Threat: Why Visibility is Critical

    Wednesday10:30 - 11:0005 Jun 2019
    Talking Tactics

    Ponemon research shows that the average time to spot and contain an insider threat is 72 days - only 16% of incidents are identified and contained within 30 day...

    • Language: English

  • Monitoring Active Directory & Windows: Indications you are Under Attack

    Wednesday13:20 - 13:4505 Jun 2019
    Tech Talks

    Most attackers will take the path of least resistance when trying to breach your environment. It makes sense that monitoring the common attack paths could resul...

    • Language: English

  • Multi-Phased Attacks: The 1-2 Punch That Can Knock Your Business Cold

    Thursday11:45 - 12:1006 Jun 2019
    Cyber Innovation Showcase

    In 2019, the volume—and sophistication—of email threats is growing. Phishing is virtually indistinguishable from legitimate communications, spear phishing is hy...

    • Language: English

  • Neither Phish nor Flash: How Cyber-Criminals Target Business Email Inboxes Without Phishing

    Tuesday12:00 - 12:2504 Jun 2019
    Strategy Talks

    Well-resourced actors typically access business email accounts through targeted phishing campaigns or using information-stealing malware. The barriers to entry,...

    • Language: English

  • Perspectives from the Frontline: Managing Risk & Building Resilience

    Tuesday10:15 - 11:0504 Jun 2019
    Keynote Stage

    Opening Keynote   As one BBC Chief News Reporter Kate Adie reported from most of the world’s hotspots and war zones, broadcasting from the Gulf War and Tiananme...

    • Language: English

  • Phishing & OOB Exfiltration Through Purple Tinted Glasses

    Wednesday14:15 - 15:0005 Jun 2019
    Geek Street

    The proliferation of client-side attacks continues to grow, as attackers are increasingly aware their chances of success are increased if they can get the victi...

    • Language: English

  • Red Team, Blue team: Two Sides of the Same Coin

    Tuesday14:15 - 15:1504 Jun 2019
    Information Security Exchange

    Our industry has adopted myriad attack detection tactics, security frameworks, threat intelligence schemes, and incident response plans over the past few decade...

    • Language: English

  • State of Cybersecurity Report v2: Stats, Views & the Year in Infosec

    Thursday12:00 - 12:3006 Jun 2019
    Talking Tactics

    Last year Infosecurity Magazine conducted industry research to determine the driving trends in cybersecurity. In 2019, we did this again with a larger sample se...

    • Language: English

  • Strategic Autonomous Response: Learning from Patient Zero to Protect the Network at Large

    Wednesday12:40 - 13:0505 Jun 2019
    Strategy Talks

    With email still the most common vector of attack, it is time for a new approach to defending our digital businesses. AI cyber defences can now be deployed acro...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.