Your Search

 

Content: Threats, Exploits & Vulnerabilities

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 51 results

|

Items per page:

Sort By
  • "Yes We Can Get In. Now What?"

    Tuesday12:00 - 12:2504 Jun 2019
    Tech Talks

    The results of a red-team test (or breach) can be a thunderclap under a clear blue sky. The recommendations might look idealistic and expensive. Management migh...

    • Language: English

  • 10 Ways to Stop Phishing Attacks

    Tuesday14:30 - 15:0004 Jun 2019
    Talking Tactics

    77% of phishing attacks in 2018 targeted financial institutions and phishing sites now use SSL certificates and HTTPS to trick your Internet users. Unsurprising...

    • Language: English

  • Anatomy of a Cyber Attack: DNSpionage

    Wednesday11:20 - 11:4505 Jun 2019
    Tech Talks

    Threat actors continuously search for new techniques to compromise their victims. Recently, Cisco Talos identified a new malicious campaign named “DNSpionage”. ...

    • Language: English

  • Automating Business Security is Possible: Why do so Many Enterprises Not Know & Are They Missing Out?

    Thursday10:40 - 11:0506 Jun 2019
    Tech Talks

    Business certificate management is an often-overlooked but vital issue in the enterprise. Manual management can result in outages and time wastage; this talk ex...

    • Language: English

  • Automating Cryptographic Vulnerability Analysis in the CI Toolchain

    Thursday12:45 - 13:1506 Jun 2019
    Talking Tactics

    Accidental deployment of vulnerable cryptography can lead to significant data breaches - like the one that led to Uber paying a $200M fine in 2018. So companies...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Wednesday14:40 - 15:0505 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • Case Study: Lessons Learned from the NotPetya Cyber-Attack

    Thursday12:25 - 13:1506 Jun 2019
    Keynote Stage

    In 2017 to NotPetya ransomware attack wreaked havoc on a range of global businesses including law firms, supermarkets and pharmaceuticals. The attack had a huge...

    • Language: English

  • Cracking the Complexity Conundrum: How to Secure, Patch & Protect Complex, Dynamic Organisations

    Wednesday12:25 - 13:2505 Jun 2019
    Keynote Stage

    Panel Discussion Enterprises are more dynamic and complex than ever before.  From working practices, agile development and the latest technologies, to multiple...

    • Language: English

  • Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

    Wednesday10:40 - 11:0505 Jun 2019
    Technology Showcase

    Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuf...

    • Language: English

  • Cryptojacking: The Ghost of Cloud Security

    Wednesday15:20 - 15:4505 Jun 2019
    Tech Talks

    A new threat called cryptojacking that illicitly mines cryptocurrency was first documented on CBS’s showtime networks in late 2017. By mid-2018, cryptojacking h...

    • Language: English

  • Cyber-Physical Security: Cyber Risk Management Strategies for Connected OT & IT Networks

    Tuesday16:30 - 17:2504 Jun 2019
    Keynote Stage

    In Conversation Traditionally, IT and OT are separate functions with different priorities – confidentiality and privacy versus safety and availability. Most op...

    • Language: English

  • Cybercriminal Abuse in European IP Space

    Tuesday14:15 - 15:0004 Jun 2019
    Geek Street

    Through concrete use cases and practical examples we will learn how to track criminal hosting infrastructures and we will understand the taxonomy and business m...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.