Your Search

 

Theatre: Cyber Innovation Showcase

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

25 - 36 of 36 results

|

Items per page:

Sort By
  • Cyber Essentials Plus: Driving Adoption & Raising the Bar

    Wednesday13:25 - 13:4005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation The majority of common cyber attacks would be prevented by adherence to the 5 controls of the Cyber Essentials Scheme. And yet, despite t...

    • Language: English

  • How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks

    Wednesday13:50 - 14:0505 Jun 2019
    Cyber Innovation Showcase

    There are five technical information security controls that if implemented correctly are known to eliminate 95% of cyber attacks. These are well documented as p...

    • Language: English

  • A Journey of Self Driven Security Training

    Wednesday14:15 - 14:3005 Jun 2019
    Cyber Innovation Showcase

    This talk details a course of progression from engineer to security advocate, highlighting the importance of self driven teaching methodologies, the increased a...

    • Language: English

  • Bin Alphanumeric Passwords!

    Wednesday14:40 - 14:5505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Tricerion’s mission is to ‘Bin Alphanumeric Passwords’, by replacing them with Picture Passwords. We are seeking to confront the complace...

    • Language: English

  • Addressing One of the Largest Risks in Cybersecurity: Humans!

    Wednesday15:05 - 15:2005 Jun 2019
    Cyber Innovation Showcase

    Your employees today struggle to identify real cyber attacks, whilst traditional awareness campaigns has failed to drive cultural and behavioural change. HumanF...

    • Language: English

  • Automated Cyber Value-at-Risk for Application Security

    Wednesday15:30 - 15:4505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Uleska are leading the way in the automation of cyber value-at-risk determination for application security testing, and this session will...

    • Language: English

  • How to Become APT-Proof in 24 Hours

    Wednesday15:55 - 16:2005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Organisations like yours are investing $15 million annually in information security. They’re doing everything right. From perimeter secur...

    • Language: English

  • Eliminating the WhatsApp & Dropbox Dilemma

    Wednesday16:30 - 16:5505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Consumer solutions such as WhatsApp and Dropbox are increasingly popular and have revolutionised the way of communication. However, when ...

    • Language: English

  • Device Authentication with ICMetrics

    Thursday10:00 - 10:2506 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Current secure device authentication and encryption technology has serious limitations in assuring the identity of a given device and its...

    • Language: English

  • Defeat Ransomware: Leveraging ATP & Machine Learning to Orchestrate a Synchronised Cybersecurity Environment Across Endpoint & Email

    Thursday11:10 - 11:3506 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Join us to hear Sam Mayne speak about our advanced threat protection engines. Learn about the current cybersecurity threat landscape and ...

    • Language: English

  • Multi-Phased Attacks: The 1-2 Punch That Can Knock Your Business Cold

    Thursday11:45 - 12:1006 Jun 2019
    Cyber Innovation Showcase

    Download Presentation In 2019, the volume—and sophistication—of email threats is growing. Phishing is virtually indistinguishable from legitimate communication...

    • Language: English

  • Zero Trusted Networks or: Why Perimeter Security is Dead

    Thursday14:05 - 14:3006 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Traditional IT network security is based on perimeter security. Perimeter security makes it hard to obtain access to the network, but eve...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.