Your Search

  • Date

    • 20th October 2020 (Tuesday) Remove
Reset Search
 

Gain practical insight and expert advice from Infosec leaders, influencers, and senior decision-makers to protect critical information assets.

Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 18 results

|

Items per page:

Sort By
  • The Use of Mathematical Models to Better Predict Human Behaviour

    Tuesday09:00 - 10:0020 Oct 2020
    Keynote Stream

    During this presentation, Dr. Hannah Fry will share her perspective on how data created in a digital world can be comprehended through algorithms and models to ...

    • Language: English

  • Rise of the Machines – The Importance of Security Automation

    Tuesday10:00 - 10:4520 Oct 2020
    Information Security Exchange

    Every day we are woken up by a connected alarm, perked up by the automated coffeemaker and perhaps even taken to work in a self-driving car… We live in a world ...

    • Language: English

  • What’s in your Software?

    Tuesday10:00 - 10:2520 Oct 2020
    Technology Showcase

    Tracking the software and software components an organisation uses in its products and its operations is crucial for responding to emergency threats. However, b...

    • Language: English

  • Transform your Security Strategy with Data Driven Detection

    Tuesday11:00 - 11:4520 Oct 2020
    Information Security Exchange

    Ever feel like your security team is overly reliant on vendor-created threat detection? There are nuances to your environment that often require a more customiz...

    • Language: English

  • CISOs, you can Finally Win the Impersonation and Phishing War

    Tuesday11:00 - 11:2520 Oct 2020
    Technology Showcase

    Bad actors utilize new technologies to come up with stronger phishing attacks and harder-to-detect impersonations. Social media phishing attacks, attacks on clo...

    • Language: English

  • Eliminating the Blind Spots to get Better Visibility and Control Over your Data

    Tuesday11:00 - 12:0020 Oct 2020
    CISO Insight

    Data privacy continues to be a hot topic for infosecurity professionals and lawmakers. Following GDPR’s activation in May 2018, the California Consumer Privacy ...

    • Language: English

  • Ransomware Case Study: Discovering CovidLock

    Tuesday12:00 - 12:2520 Oct 2020
    Technology Showcase

    Since the initial outbreak of COVID-19, cybercriminals have since found many ways to take advantage of anxious and fearful users. There have been reports of Tri...

    • Language: English

  • IGA: Trends, Discontinuities and Strategies

    Tuesday12:00 - 12:4520 Oct 2020
    Information Security Exchange

    Core business drivers for IGA projects are fairly constant but we must constantly adapt our strategies to take account of change in the business, technology and...

    • Language: English

  • Achieving Security Visibility in the Era of Cloud Shift

    Tuesday13:00 - 13:4520 Oct 2020
    Information Security Exchange

    While organizations undertake the mounting pressure of digital transformation, their security teams are handcuffed by limited visibility into the attack surface...

    • Language: English

  • How DAST Solutions can be Maximized by IAST

    Tuesday13:00 - 13:2520 Oct 2020
    Technology Showcase

    This session will go through the definition of a DAST solution including its strengths and limitations, and how IAST can enhance the functionality of a DAST sol...

    • Language: English

  • Thinking Out cLoud - Lessons & Failures in Cloud Security

    Tuesday13:00 - 14:0020 Oct 2020
    CISO Insight

    Despite growing cloud adoption, many security professionals still highlight the cloud as the primary area of vulnerability within their business. In this talk, ...

    • Language: English

  • Security Secrets: The Art Of Agile Detection Engineering Presentation

    Tuesday14:00 - 14:4520 Oct 2020
    Information Security Exchange

    One of the biggest challenges for security teams today is to keep up with modern adversaries. A SOC needs to continuously improve detection capabilities based o...

    • Language: English