Your Search

  • Topic Area

Reset Search
 

Gain practical insight and expert advice from Infosec leaders, influencers, and senior decision-makers to protect critical information assets.

Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 3 of 3 results

|

Items per page:

Sort By
  • IGA: Trends, Discontinuities and Strategies

    Tuesday12:00 - 12:4520 Oct 2020
    Information Security Exchange

    Core business drivers for IGA projects are fairly constant but we must constantly adapt our strategies to take account of change in the business, technology and...

    • Language: English

  • The Anatomy of a Credential Stuffing Attack

    Thursday10:00 - 10:4522 Oct 2020
    CISO Insight

    As a central authentication service that processes billions of logins a month, credential stuffing attacks are the most common threats we observe. These attacks...

    • Language: English

  • Laying the Foundation for Zero Trust

    Thursday10:00 - 10:2522 Oct 2020
    Technology Showcase

    While the concept of zero-trust security has many IT organisations thinking in terms of identity and cloud services, zero trust must run on a solid foundation. ...

    • Language: English