Your Search

 

2020 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 7 of 7 results

|

Items per page:

Sort By
  • A (Bad) Day in the Life of a CISO

    Tuesday14:00 - 14:2502 Jun 2020
    Technology Showcase

    Your organisation was breached. It’s all over the headlines. The Board is asking tough questions, and you have just 20 minutes to respond. What you do next may ...

    • Language: English

  • Allocating The Security Budget: How to Do More with Less?

    Tuesday15:10 - 16:0002 Jun 2020
    Keynote Stage

    In light of the ever growing cybersecurity skills gap, and an exploding attack surface, infosecurity leaders are shifting their focus from increasing headcount ...

    • Language: English

  • Adapt to the exponential growth of industrial IoT with cybersecurity!

    Tuesday15:20 - 15:4502 Jun 2020
    Strategy Talks

    Industrial IoT enables the connectivity of industrial machines to legacy industrial applications. It faces many security challenges and the consequences of an I...

    • Language: English

  • A (Bad) Day in the Life of a CISO

    Wednesday12:00 - 12:2503 Jun 2020
    Technology Showcase

    Your organisation was breached. It’s all over the headlines. The Board is asking tough questions, and you have just 20 minutes to respond. What you do next may ...

    • Language: English

  • Analysing Recent API Breaches: The Top 10 Recurring Issues and How to Address Them

    Wednesday12:15 - 13:0003 Jun 2020
    Geek Street

    The publication of the OWASP Top 10 for API security marks a cornerstone in the API Security history. Finally, there is a global recognition that applications b...

    • Language: English

  • An Experimental Security Analysis of a Smart Manufacturing System

    Thursday12:15 - 13:0004 Jun 2020
    Geek Street

    This session demonstrates the feasibility of attacking a smart manufacturing system through a variety of attack vectors. Through concrete attack demonstrations,...

    • Language: English

  • Abusing Legitimate Cloud Services to Launch Evasive Attacks

    Thursday14:15 - 15:0004 Jun 2020
    Geek Street

    Exploiting cloud services to launch evasive attacks is now a consolidated modus operandi by malicious actors. Cloud services solve implicitly some of the challe...

    • Language: English