Your Search

 

2020 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 48 of 121 results

|

Items per page:

Sort By
  • Insider Threats: Unmasking the Threats and Saving the Day!

    Tuesday10:00 - 10:2502 Jun 2020
    Strategy Talks

    A discussion about what is classified as an insider threat, how to detect them and how with a few simple measures companies can prevent a situation from escalat...

    • Language: English

  • How to Avoid a Data Breach - Solutions to Problems You Never Want to Have

    Tuesday10:00 - 10:2502 Jun 2020
    Tech Talks

    Cyberattacks are on the rise and show a 20% YOY increase. Getting a cyberthreat is no longer a matter of if, but a matter of when and most SMEs around the world...

    • Language: English

  • Welcome from the Chair

    Tuesday10:15 - 10:2502 Jun 2020
    CNI & II Symposium

    Welcome address from the Chair.

    • Language: English

  • Only After Disaster can we be Resurrected: Field Lessons in Cyber Incidents

    Tuesday10:15 - 11:4502 Jun 2020
    Security Workshop

    This workshop uses air crash investigation results and the detailed examination of nuclear accidents at Three Mile Island and Chernobyl to demonstrate how we br...

    • Language: English

  • Opening remarks from the Chair

    Tuesday10:15 - 10:2002 Jun 2020
    Keynote Stage

    Opening remarks from the Chair

    • Language: English

  • The Use of Mathematical Models to Better Predict Human Behaviour

    Tuesday10:20 - 11:0502 Jun 2020
    Keynote Stage

    Dr. Hannah Fry works with physicists, mathematicians, and computer scientists to study the patterns in human behaviour - answering questions from shopping habit...

    • Language: English

  • Ensuring the Cyber Resilience of the UK's Most Critical Systems

    Tuesday10:25 - 10:5502 Jun 2020
    CNI & II Symposium

    Analysing the scope of the threat to CNI to drive effective risk mitigation Reviewing securities’ most pressing issues: The rising cyber threats, nation-stat...

    • Language: English

  • From Shop Floor to Boardroom: OT Security Best Practices for the C-Suite

    Tuesday10:40 - 11:0502 Jun 2020
    Strategy Talks

    As more organisations integrate OT environments into their core platforms, security leaders must prepare to navigate an ecosystem with vastly different networks...

    • Language: English

  • Battling Supermutants in the Phishing Wasteland

    Tuesday10:40 - 11:0502 Jun 2020
    Tech Talks

    Phishing attacks are nothing new or unusual, and yet, the menace they pose is often overlooked in lieu of flashier malware, APTs, and 0-day exploits. This talk ...

    • Language: English

  • Enhancing Operators, Regulators and Government Collaboration & Information-Sharing

    Tuesday10:55 - 11:3002 Jun 2020
    CNI & II Symposium

    During this presentation the panel of speakers will discuss potential solutions to enhance public-private partnerships in managing cyber risk. They will provide...

    • Language: English

  • GDPR 2 Years On: What's Changed and What You Need to Know

    Tuesday11:15 - 11:4502 Jun 2020
    Talking Tactics

    The two years following the GDPR’s enforcement have been wrought with action, confusion, and a heightened sense of privacy awareness among the general public. N...

    • Language: English

  • Cyber-Defenders - The Strongest Link in an Organisation’s Cybersecurity Strategy

    Tuesday11:25 - 12:3502 Jun 2020
    Keynote Stage

    Human error remains a weak link in any security strategy, and it’s a challenge that still affects most organisations. However, users are also your first line of...

    • Language: English

  • Creating More Resilient Supply Chains for CNI & II

    Tuesday11:35 - 12:1502 Jun 2020
    CNI & II Symposium

    In today's uncertain times, supply chain vulnerability has become an issue of significance for many companies. As supply chains become more global and complex, ...

    • Language: English

  • Global Research Shares Cyber Security Team Insights on How CISOs Set Key Metrics, Manage Business Alignment and Improve Leadership Skills

    Tuesday12:00 - 12:2502 Jun 2020
    Strategy Talks

    CISOs have one of the most difficult and challenging jobs in any business today. They are constantly on duty, ensuring systems are updated and patches applied, ...

    • Language: English

  • Detection ex Machina: Leveraging AI, ML, and Data Gravity to Build the SOC of Tomorrow

    Tuesday12:00 - 12:2502 Jun 2020
    Tech Talks

    The vast amounts of data we must monitor increases every day and there's no end in sight. At the same time machine learning, automation and orchestration are cr...

    • Language: English

  • Protecting DATA, From Espionage, Spy Activity & Social Engineering

    Tuesday12:15 - 13:0002 Jun 2020
    Geek Street

    In today’s world of cyber risk and cyber security, we sometimes forget about the individuals or dare I say suspects behind the breach, attack, or theft. We negl...

    • Language: English

  • Bridging the IT & OT Gap - Holistic Approaches to Enhance Safety, Traceability, & Confidentiality

    Tuesday12:15 - 12:4502 Jun 2020
    CNI & II Symposium

    The harmonisation of IT and OT is not an easy task due to cultural and supply chain diversity. During this presentation the panel of speakers will discuss poten...

    • Language: English

  • Will 5G Become the Achilles Heel of Smart Cities?

    Tuesday12:40 - 13:0502 Jun 2020
    Strategy Talks

    5G will be a game-changing technology for Smart Cities, but its complexity will impact information security and Industrial Control System (ICS) security.  This ...

    • Language: English

  • Deep Learning for Red Teaming

    Tuesday12:40 - 13:0502 Jun 2020
    Tech Talks

    Attackers spend considerable time performing victim reconnaissance and, although using Deep Learning (DL) models isn't documented, it’s not impossible. The avai...

    • Language: English

  • Closing remarks from the Chair

    Tuesday12:45 - 12:5002 Jun 2020
    CNI & II Symposium

    Closing remarks from the Chair.

    • Language: English

  • The Data Map Gap: Auto Discovery & Classification For “Live” Data Maps & Privacy Rights

    Tuesday12:45 - 13:1502 Jun 2020
    Talking Tactics

    Data is the critical piece to privacy and security programs. The challenge is discovering where data resides and then organizing that information into a useable...

    • Language: English

  • CISSP Preview: A Risk Based Approach to Security

    Tuesday12:45 - 14:1502 Jun 2020
    Security Workshop

    Risk and security remain inextricably linked, this workshop examines practical approaches to the effective management of this important relationship, including ...

    • Language: English

  • The Stressless ISMS - How Shakespeare Helps to set up an ISMS - Volume 2

    Tuesday12:45 - 14:1502 Jun 2020
    Security Workshop

    ISMSes are potentially toxic projects for an organisation, even more so for the CISO or CIO planning them. This talk explores all critical areas of setting up a...

    • Language: English

  • Hands-on Java Security Workshop: How Safe is Your Application?

    Tuesday12:45 - 14:1502 Jun 2020
    Security Workshop

    Security issues and cybercrime are increasing at an alarming rate. As a Java web developer, you should be aware of how important security and securing your clie...

    • Language: English

  • Navigating the New Threat Landscape: How to Keep up with Change

    Tuesday12:55 - 13:3502 Jun 2020
    Keynote Stage

    The security threat landscape never stands still. We see new kinds of threats from new kinds of attackers all the time. That’s why security must be a part of yo...

    • Language: English

  • Building an Effective CSIRT or SOC

    Tuesday13:15 - 14:0002 Jun 2020
    Information Security Exchange

    Dr. Vilius Benetis will share practical and actionable tips and advice on building effective sectorial or organisational Computer Security Incident Response Tea...

    • Language: English

  • Is AI Working? How AI is Disrupting Security Operations

    Tuesday13:20 - 13:4502 Jun 2020
    Strategy Talks

    Organizations across a wide range of industries are talking about increased AI adoption this year. In the world of cyber security, AI has enormous potential: It...

    • Language: English

  • Machine Learning is Blind, but You Can’t See it

    Tuesday13:20 - 13:4502 Jun 2020
    Tech Talks

    Machine Learning seems to be an all-powerful technique. However, while it can appear effective, if not used correctly, Machine Learning can become blind to cert...

    • Language: English

  • New Tech, New Threats, New Opportunities

    Tuesday13:55 - 14:5502 Jun 2020
    Keynote Stage

    Organisations are under constant pressure to accelerate the pace of change to meet commercial business demands. Technology investments such as firewalls, anti-v...

    • Language: English

  • A (Bad) Day in the Life of a CISO

    Tuesday14:00 - 14:2502 Jun 2020
    Technology Showcase

    Your organisation was breached. It’s all over the headlines. The Board is asking tough questions, and you have just 20 minutes to respond. What you do next may ...

    • Language: English

  • Cultivating Meaningful Security Culture

    Tuesday14:00 - 14:2502 Jun 2020
    Strategy Talks

    In this talk, Javvad Malik and Kai Roer, security advocates for KnowBe4, will share hitherto unrevealed insights and unexpected findings from the forthcoming 20...

    • Language: English

  • Destructive Tendencies and Data Vulnerabilities: When Shredding, Degaussing, and Grinding Miss the Mark

    Tuesday14:00 - 14:2502 Jun 2020
    Tech Talks

    Near-daily breach notifications and ever-more data regulations have corporations and government agencies feeling at-risk and overwhelmed. No wonder. Accelerated...

    • Language: English

  • Hey Google, Activate Spyware!

    Tuesday14:15 - 15:0002 Jun 2020
    Geek Street

    This talk is based upon research that was conducted by the Checkmarx Security Research team, resulting in serious security vulnerability findings in Android sma...

    • Language: English

  • Once More Into a Breach: A Live Cyber Crisis Simulation

    Tuesday14:40 - 15:0502 Jun 2020
    Strategy Talks

    The best breach response plans can never really factor in the human element when the worst happens. How do time and pressure impact on decision-making? How can ...

    • Language: English

  • Overlooking Native Connectivity is Human, Automated Cyber Hygiene is Divine

    Tuesday14:40 - 15:0502 Jun 2020
    Tech Talks

    Attackers are increasingly automating techniques that leverage native connectivity and credentials, rather than exploits, to move through networks undetected. A...

    • Language: English

  • CISSP Preview: An Introduction to Encryption

    Tuesday15:00 - 16:3002 Jun 2020
    Security Workshop

    Encryption is critical to the protection of information assets at rest and in transit, this accessible introduction to encryption reviews key concepts, technolo...

    • Language: English

  • Allocating The Security Budget: How to Do More with Less?

    Tuesday15:10 - 16:0002 Jun 2020
    Keynote Stage

    In light of the ever growing cybersecurity skills gap, and an exploding attack surface, infosecurity leaders are shifting their focus from increasing headcount ...

    • Language: English

  • No Alerts, No SOCs, No Problem! Towards a New Threat Detection Paradigm

    Tuesday15:15 - 15:4502 Jun 2020
    Talking Tactics

    The probabilistic Security Operations Center model for threat detection and response, founded on alert-based risk thresholds and investigations, is obsolete. On...

    • Language: English

  • Breaking Through Yesterday's Security Barriers Today

    Tuesday15:15 - 16:0002 Jun 2020
    Information Security Exchange

    Traditional datacenter security solutions have reached a limit. The rapid growth in data and speed in the underlying network have forced organizations to make a...

    • Language: English

  • Adapt to the exponential growth of industrial IoT with cybersecurity!

    Tuesday15:20 - 15:4502 Jun 2020
    Strategy Talks

    Industrial IoT enables the connectivity of industrial machines to legacy industrial applications. It faces many security challenges and the consequences of an I...

    • Language: English

  • Re-purposing Technologies - A Counteroffensive Tutorial

    Tuesday15:20 - 15:4502 Jun 2020
    Tech Talks

    In 2019, a botnet consisting of self propagating cryptocurrency mining malware was discovered. These attacks being captured by deception platforms were able to ...

    • Language: English

  • Inside the Weakest Link: The Dark Side of Your Endpoint Strategy

    Tuesday15:50 - 16:1502 Jun 2020
    Cyber Innovation Showcase

    If endpoint security seems like an oxymoron, it’s because we’re not assessing it through the right lenses. To truly safeguard corporate data and pick the best a...

    • Language: English

  • Recoding Wetware: The Art of Manipulation, Nudges, and the Real Threat From Within

    Tuesday16:00 - 16:3002 Jun 2020
    Talking Tactics

    It has been often touted that humans are the weakest link in security. But what if security professionals are simply weak at interacting with humans? In this se...

    • Language: English

  • Developers are Taking Over AppSec

    Tuesday16:00 - 16:2502 Jun 2020
    Strategy Talks

    Application security is becoming more challenging as software release frequency continues to rise and the requirements for data security grow. While security te...

    • Language: English

  • FIDO for Electronic Payments

    Tuesday16:00 - 16:2502 Jun 2020
    Tech Talks

    Compliance requirements, reputation protection, UX-based differentiation, and cost reduction are top priorities for the vast majority of financial institutions ...

    • Language: English

  • Why Should You Move Out of Legacy GRC Solutions?

    Tuesday16:15 - 17:0002 Jun 2020
    Geek Street

    Most companies that have implemented first generation GRC solutions stay frustrated with the complexity of their solution, its difficulty to upgrade to last rel...

    • Language: English

  • Building a Strong Security Team: How to Achieve Value Creation & Long-Term Growth

    Tuesday16:15 - 17:2502 Jun 2020
    Keynote Stage

    Finding good security talent continues to be one of security’s top challenges. In order to build cohesive and successful teams, security leaders must adopt agil...

    • Language: English

  • Two Sides of the Same Coin: Purple Teaming Fundamentals

    Tuesday16:30 - 16:5502 Jun 2020
    Cyber Innovation Showcase

    With new concepts evolving in the cybersecurity industry, come new buzzwords. This session will demonstrate a hands-on approach to Purple Teaming and show how A...

    • Language: English