Your Search

  • Topic Area

    • Threats, exploits and vulnerabilities Remove
Reset Search
 

Gain practical insight and expert advice from Infosec leaders, influencers, and senior decision-makers to protect critical information assets.

Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 17 results

|

Items per page:

Sort By
  • Transform your Security Strategy with Data Driven Detection

    Tuesday11:00 - 11:4520 Oct 2020
    Information Security Exchange

    Ever feel like your security team is overly reliant on vendor-created threat detection? There are nuances to your environment that often require a more customiz...

    • Language: English

  • CISOs, you can Finally Win the Impersonation and Phishing War

    Tuesday11:00 - 11:2520 Oct 2020
    Technology Showcase

    Bad actors utilize new technologies to come up with stronger phishing attacks and harder-to-detect impersonations. Social media phishing attacks, attacks on clo...

    • Language: English

  • Ransomware Case Study: Discovering CovidLock

    Tuesday12:00 - 12:2520 Oct 2020
    Technology Showcase

    Since the initial outbreak of COVID-19, cybercriminals have since found many ways to take advantage of anxious and fearful users. There have been reports of Tri...

    • Language: English

  • How DAST Solutions can be Maximized by IAST

    Tuesday13:00 - 13:2520 Oct 2020
    Technology Showcase

    This session will go through the definition of a DAST solution including its strengths and limitations, and how IAST can enhance the functionality of a DAST sol...

    • Language: English

  • AI and Cyber Forward Defence

    Tuesday14:00 - 14:2520 Oct 2020
    Technology Showcase

    This session will describe and demonstrate the role of AI and Machine Learning in detecting and disrupting would-be advanced malware threats in the age of perva...

    • Language: English

  • End to End IT Security Anywhere at the Endpoint?

    Tuesday15:00 - 15:4520 Oct 2020
    Information Security Exchange

    In this session, we’ll discuss how as your evolving IT organisation grows so does the number of devices you need to manage and secure. With the risks of Ransomw...

    • Language: English

  • Combatting Rogue URL Tricks: How you can Quickly Identify and Investigate the Latest Phishing Attacks

    Tuesday16:00 - 16:4520 Oct 2020
    Information Security Exchange

    Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by the bad guys? Probably n...

    • Language: English

  • Cynalytica Securely Enabling Industrial Control Systems (ICS) and Industry 4.0

    Tuesday16:00 - 16:2520 Oct 2020
    Technology Showcase

    Cynalytica delivers mature intrusion detection and behavioral monitoring tools for Industrial Control Systems and Industry 4.0. SerialGuard is a fail-safe senso...

    • Language: English

  • The Future of Cyber Security Training: Certs or Skills? Both!

    Wednesday11:00 - 11:2521 Oct 2020
    Technology Showcase

    What makes an attack-ready infosec practitioner? Is it certifications or practice? Intensive courses or progressive, continuous training? How is a CISO or secur...

    • Language: English

  • The Security Tool Tipping Point: How the Rapid Growth of Security Tools is Increasing Overall Risk

    Wednesday12:00 - 12:4521 Oct 2020
    Information Security Exchange

    A rapidly growing number of security tools have arisen to help organisations better secure their environments and actively protect important data, from SIEM to ...

    • Language: English

  • How to Build a Web Security Program to Secure Thousands of Applications

    Wednesday13:00 - 13:2521 Oct 2020
    Technology Showcase

    Many organizations have thousands of web applications and almost none of them has a scalable program to be in control of their web security posture. This presen...

    • Language: English

  • Why Bother With 3rd Party Cyber Risk Management?

    Wednesday14:00 - 14:2521 Oct 2020
    Technology Showcase

    Supply chain risks multiply with every new third party. Does adding processes and control actually help? Here, Bob Maley explores cardinal methodology to help y...

    • Language: English