Your Search

  • Topic Area

    • Threats, exploits and vulnerabilities Remove
Reset Search
 

2020 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 33 results

|

Items per page:

Sort By
  • Insider Threats: Unmasking the Threats and Saving the Day!

    Tuesday10:00 - 10:2502 Jun 2020
    Strategy Talks

    A discussion about what is classified as an insider threat, how to detect them and how with a few simple measures companies can prevent a situation from escalat...

    • Language: English

  • Only After Disaster can we be Resurrected: Field Lessons in Cyber Incidents

    Tuesday10:15 - 11:4502 Jun 2020
    Security Workshop

    This workshop uses air crash investigation results and the detailed examination of nuclear accidents at Three Mile Island and Chernobyl to demonstrate how we br...

    • Language: English

  • Battling Supermutants in the Phishing Wasteland

    Tuesday10:40 - 11:0502 Jun 2020
    Tech Talks

    Phishing attacks are nothing new or unusual, and yet, the menace they pose is often overlooked in lieu of flashier malware, APTs, and 0-day exploits. This talk ...

    • Language: English

  • Deep Learning for Red Teaming

    Tuesday12:40 - 13:0502 Jun 2020
    Tech Talks

    Attackers spend considerable time performing victim reconnaissance and, although using Deep Learning (DL) models isn't documented, it’s not impossible. The avai...

    • Language: English

  • Hands-on Java Security Workshop: How Safe is Your Application?

    Tuesday12:45 - 14:1502 Jun 2020
    Security Workshop

    Security issues and cybercrime are increasing at an alarming rate. As a Java web developer, you should be aware of how important security and securing your clie...

    • Language: English

  • Building an Effective CSIRT or SOC

    Tuesday13:15 - 14:0002 Jun 2020
    Information Security Exchange

    Dr. Vilius Benetis will share practical and actionable tips and advice on building effective sectorial or organisational Computer Security Incident Response Tea...

    • Language: English

  • Machine Learning is Blind, but You Can’t See it

    Tuesday13:20 - 13:4502 Jun 2020
    Tech Talks

    Machine Learning seems to be an all-powerful technique. However, while it can appear effective, if not used correctly, Machine Learning can become blind to cert...

    • Language: English

  • Destructive Tendencies and Data Vulnerabilities: When Shredding, Degaussing, and Grinding Miss the Mark

    Tuesday14:00 - 14:2502 Jun 2020
    Tech Talks

    Near-daily breach notifications and ever-more data regulations have corporations and government agencies feeling at-risk and overwhelmed. No wonder. Accelerated...

    • Language: English

  • Overlooking Native Connectivity is Human, Automated Cyber Hygiene is Divine

    Tuesday14:40 - 15:0502 Jun 2020
    Tech Talks

    Attackers are increasingly automating techniques that leverage native connectivity and credentials, rather than exploits, to move through networks undetected. A...

    • Language: English

  • Re-purposing Technologies - A Counteroffensive Tutorial

    Tuesday15:20 - 15:4502 Jun 2020
    Tech Talks

    In 2019, a botnet consisting of self propagating cryptocurrency mining malware was discovered. These attacks being captured by deception platforms were able to ...

    • Language: English

  • Inside the Weakest Link: The Dark Side of Your Endpoint Strategy

    Tuesday15:50 - 16:1502 Jun 2020
    Cyber Innovation Showcase

    If endpoint security seems like an oxymoron, it’s because we’re not assessing it through the right lenses. To truly safeguard corporate data and pick the best a...

    • Language: English

  • Recoding Wetware: The Art of Manipulation, Nudges, and the Real Threat From Within

    Tuesday16:00 - 16:3002 Jun 2020
    Talking Tactics

    It has been often touted that humans are the weakest link in security. But what if security professionals are simply weak at interacting with humans? In this se...

    • Language: English