Your Search

Reset Search

2020 Programme


  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all


1 - 12 of 25 results


Items per page:

Sort By
  • How to Avoid a Data Breach - Solutions to Problems You Never Want to Have

    Tuesday10:00 - 10:2502 Jun 2020
    Tech Talks

    Cyberattacks are on the rise and show a 20% YOY increase. Getting a cyberthreat is no longer a matter of if, but a matter of when and most SMEs around the world...

    • Language: English

  • Battling Supermutants in the Phishing Wasteland

    Tuesday10:40 - 11:0502 Jun 2020
    Tech Talks

    Phishing attacks are nothing new or unusual, and yet, the menace they pose is often overlooked in lieu of flashier malware, APTs, and 0-day exploits. This talk ...

    • Language: English

  • Detection ex Machina: Leveraging AI, ML, and Data Gravity to Build the SOC of Tomorrow

    Tuesday12:00 - 12:2502 Jun 2020
    Tech Talks

    The vast amounts of data we must monitor increases every day and there's no end in sight. At the same time machine learning, automation and orchestration are cr...

    • Language: English

  • Deep Learning for Red Teaming

    Tuesday12:40 - 13:0502 Jun 2020
    Tech Talks

    Attackers spend considerable time performing victim reconnaissance and, although using Deep Learning (DL) models isn't documented, it’s not impossible. The avai...

    • Language: English

  • Machine Learning is Blind, but You Can’t See it

    Tuesday13:20 - 13:4502 Jun 2020
    Tech Talks

    Machine Learning seems to be an all-powerful technique. However, while it can appear effective, if not used correctly, Machine Learning can become blind to cert...

    • Language: English

  • Destructive Tendencies and Data Vulnerabilities: When Shredding, Degaussing, and Grinding Miss the Mark

    Tuesday14:00 - 14:2502 Jun 2020
    Tech Talks

    Near-daily breach notifications and ever-more data regulations have corporations and government agencies feeling at-risk and overwhelmed. No wonder. Accelerated...

    • Language: English

  • Overlooking Native Connectivity is Human, Automated Cyber Hygiene is Divine

    Tuesday14:40 - 15:0502 Jun 2020
    Tech Talks

    Attackers are increasingly automating techniques that leverage native connectivity and credentials, rather than exploits, to move through networks undetected. A...

    • Language: English

  • Re-purposing Technologies - A Counteroffensive Tutorial

    Tuesday15:20 - 15:4502 Jun 2020
    Tech Talks

    In 2019, a botnet consisting of self propagating cryptocurrency mining malware was discovered. These attacks being captured by deception platforms were able to ...

    • Language: English

  • FIDO for Electronic Payments

    Tuesday16:00 - 16:2502 Jun 2020
    Tech Talks

    Compliance requirements, reputation protection, UX-based differentiation, and cost reduction are top priorities for the vast majority of financial institutions ...

    • Language: English

  • CTO Talks: Why the Revolution in Privileged Access Management is Le-JIT

    Wednesday10:00 - 10:2503 Jun 2020
    Tech Talks

    A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access, for no longer than required, t...

    • Language: English

  • Is Your Business Ready for 5G Security Threats?

    Wednesday10:40 - 11:0503 Jun 2020
    Tech Talks

    The fifth generation of cellular network technology brings opportunities for businesses and security challenges – for those not prepared. New methods of cyber-a...

    • Language: English

  • Detecting Attackers Without Breaking the Bank

    Wednesday12:00 - 12:2503 Jun 2020
    Tech Talks

    Dwell time; the amount of time an attacker remains undetected on a network. This seems a ridiculous problem, but even organizations with massive budgets and sec...

    • Language: English