Your Search

  • Type of Content

Reset Search
 

Theatre: Cyber Innovation Showcase

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 12 results

|

Items per page:

Sort By
  • The "S" in "IoT" stands for "Security"

    Tuesday10:30 - 10:4504 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Along with the proliferation of IoT devices in our homes and lives has come string of laughable breaches to the extent that IoT has becom...

    • Language: English

  • Human Risk Protection

    Tuesday13:50 - 14:0504 Jun 2019
    Cyber Innovation Showcase

    Academic studies have demonstrated and explained the ineffectiveness of security awareness and education (Bada, Sasse & Nurse, 2016) and CISOs are seeing it eve...

    • Language: English

  • The Future of Authentication

    Tuesday14:40 - 14:5504 Jun 2019
    Cyber Innovation Showcase

    Data leaks and password thefts have proven that password-based authentication approach is inadequate to preserve security and privacy for IT systems. Behavioura...

    • Language: English

  • Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx

    Tuesday15:30 - 15:4504 Jun 2019
    Cyber Innovation Showcase

    Download Presentation As we face an ever-larger number of increasingly more complex cyber threats in networks operating at ever greater speeds, the developers ...

    • Language: English

  • Automate Remote Access Procedures & Configurations

    Tuesday15:55 - 16:2004 Jun 2019
    Cyber Innovation Showcase

    Combis ARA (Automated Remote Access) is a state of the art, unified remote access management solution, that includes: On-line application for remote access re...

    • Language: English

  • The Future of Authentication

    Wednesday10:30 - 10:4505 Jun 2019
    Cyber Innovation Showcase

    Data leaks and password thefts have proven that password-based authentication approach is inadequate to preserve security and privacy for IT systems. Behavioura...

    • Language: English

  • Human Risk Protection

    Wednesday10:55 - 11:1005 Jun 2019
    Cyber Innovation Showcase

    Academic studies have demonstrated and explained the ineffectiveness of security awareness and education (Bada, Sasse & Nurse, 2016) and CISOs are seeing it eve...

    • Language: English

  • Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx

    Wednesday11:20 - 11:3505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation As we face an ever-larger number of increasingly more complex cyber threats in networks operating at ever greater speeds, the developers ...

    • Language: English

  • The "S" in "IoT" stands for "Security"

    Wednesday13:00 - 13:1505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Along with the proliferation of IoT devices in our homes and lives has come string of laughable breaches to the extent that IoT has becom...

    • Language: English

  • Device Authentication with ICMetrics

    Thursday10:00 - 10:2506 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Current secure device authentication and encryption technology has serious limitations in assuring the identity of a given device and its...

    • Language: English

  • Defeat Ransomware: Leveraging ATP & Machine Learning to Orchestrate a Synchronised Cybersecurity Environment Across Endpoint & Email

    Thursday11:10 - 11:3506 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Join us to hear Sam Mayne speak about our advanced threat protection engines. Learn about the current cybersecurity threat landscape and ...

    • Language: English

  • Multi-Phased Attacks: The 1-2 Punch That Can Knock Your Business Cold

    Thursday11:45 - 12:1006 Jun 2019
    Cyber Innovation Showcase

    Download Presentation In 2019, the volume—and sophistication—of email threats is growing. Phishing is virtually indistinguishable from legitimate communication...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.