Your Search


2020 Programme


  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all


37 - 48 of 121 results


Items per page:

Sort By
  • Allocating The Security Budget: How to Do More with Less?

    Tuesday15:10 - 16:0002 Jun 2020
    Keynote Stage

    In light of the ever growing cybersecurity skills gap, and an exploding attack surface, infosecurity leaders are shifting their focus from increasing headcount ...

    • Language: English

  • No Alerts, No SOCs, No Problem! Towards a New Threat Detection Paradigm

    Tuesday15:15 - 15:4502 Jun 2020
    Talking Tactics

    The probabilistic Security Operations Center model for threat detection and response, founded on alert-based risk thresholds and investigations, is obsolete. On...

    • Language: English

  • Breaking Through Yesterday's Security Barriers Today

    Tuesday15:15 - 16:0002 Jun 2020
    Information Security Exchange

    Traditional datacenter security solutions have reached a limit. The rapid growth in data and speed in the underlying network have forced organizations to make a...

    • Language: English

  • Adapt to the exponential growth of industrial IoT with cybersecurity!

    Tuesday15:20 - 15:4502 Jun 2020
    Strategy Talks

    Industrial IoT enables the connectivity of industrial machines to legacy industrial applications. It faces many security challenges and the consequences of an I...

    • Language: English

  • Re-purposing Technologies - A Counteroffensive Tutorial

    Tuesday15:20 - 15:4502 Jun 2020
    Tech Talks

    In 2019, a botnet consisting of self propagating cryptocurrency mining malware was discovered. These attacks being captured by deception platforms were able to ...

    • Language: English

  • Inside the Weakest Link: The Dark Side of Your Endpoint Strategy

    Tuesday15:50 - 16:1502 Jun 2020
    Cyber Innovation Showcase

    If endpoint security seems like an oxymoron, it’s because we’re not assessing it through the right lenses. To truly safeguard corporate data and pick the best a...

    • Language: English

  • Recoding Wetware: The Art of Manipulation, Nudges, and the Real Threat From Within

    Tuesday16:00 - 16:3002 Jun 2020
    Talking Tactics

    It has been often touted that humans are the weakest link in security. But what if security professionals are simply weak at interacting with humans? In this se...

    • Language: English

  • Developers are Taking Over AppSec

    Tuesday16:00 - 16:2502 Jun 2020
    Strategy Talks

    Application security is becoming more challenging as software release frequency continues to rise and the requirements for data security grow. While security te...

    • Language: English

  • FIDO for Electronic Payments

    Tuesday16:00 - 16:2502 Jun 2020
    Tech Talks

    Compliance requirements, reputation protection, UX-based differentiation, and cost reduction are top priorities for the vast majority of financial institutions ...

    • Language: English

  • Why Should You Move Out of Legacy GRC Solutions?

    Tuesday16:15 - 17:0002 Jun 2020
    Geek Street

    Most companies that have implemented first generation GRC solutions stay frustrated with the complexity of their solution, its difficulty to upgrade to last rel...

    • Language: English

  • Building a Strong Security Team: How to Achieve Value Creation & Long-Term Growth

    Tuesday16:15 - 17:2502 Jun 2020
    Keynote Stage

    Finding good security talent continues to be one of security’s top challenges. In order to build cohesive and successful teams, security leaders must adopt agil...

    • Language: English

  • Two Sides of the Same Coin: Purple Teaming Fundamentals

    Tuesday16:30 - 16:5502 Jun 2020
    Cyber Innovation Showcase

    With new concepts evolving in the cybersecurity industry, come new buzzwords. This session will demonstrate a hands-on approach to Purple Teaming and show how A...

    • Language: English