Your Search

Reset Search
 

Gain practical insight and expert advice from Infosec leaders, influencers, and senior decision-makers to protect critical information assets.

Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 21 results

|

Items per page:

Sort By
  • What’s in your Software?

    Tuesday10:00 - 10:2520 Oct 2020
    Technology Showcase

    Tracking the software and software components an organisation uses in its products and its operations is crucial for responding to emergency threats. However, b...

    • Language: English

  • CISOs, you can Finally Win the Impersonation and Phishing War

    Tuesday11:00 - 11:2520 Oct 2020
    Technology Showcase

    Bad actors utilize new technologies to come up with stronger phishing attacks and harder-to-detect impersonations. Social media phishing attacks, attacks on clo...

    • Language: English

  • IGA: Trends, Discontinuities and Strategies

    Tuesday12:00 - 12:4520 Oct 2020
    Information Security Exchange

    Core business drivers for IGA projects are fairly constant but we must constantly adapt our strategies to take account of change in the business, technology and...

    • Language: English

  • How DAST Solutions can be Maximized by IAST

    Tuesday13:00 - 13:2520 Oct 2020
    Technology Showcase

    This session will go through the definition of a DAST solution including its strengths and limitations, and how IAST can enhance the functionality of a DAST sol...

    • Language: English

  • Security Secrets: The Art Of Agile Detection Engineering Presentation

    Tuesday14:00 - 14:4520 Oct 2020
    Information Security Exchange

    One of the biggest challenges for security teams today is to keep up with modern adversaries. A SOC needs to continuously improve detection capabilities based o...

    • Language: English

  • AI and Cyber Forward Defence

    Tuesday14:00 - 14:2520 Oct 2020
    Technology Showcase

    This session will describe and demonstrate the role of AI and Machine Learning in detecting and disrupting would-be advanced malware threats in the age of perva...

    • Language: English

  • End to End IT Security Anywhere at the Endpoint?

    Tuesday15:00 - 15:4520 Oct 2020
    Information Security Exchange

    In this session, we’ll discuss how as your evolving IT organisation grows so does the number of devices you need to manage and secure. With the risks of Ransomw...

    • Language: English

  • Combatting Rogue URL Tricks: How you can Quickly Identify and Investigate the Latest Phishing Attacks

    Tuesday16:00 - 16:4520 Oct 2020
    Information Security Exchange

    Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by the bad guys? Probably n...

    • Language: English

  • Cynalytica Securely Enabling Industrial Control Systems (ICS) and Industry 4.0

    Tuesday16:00 - 16:2520 Oct 2020
    Technology Showcase

    Cynalytica delivers mature intrusion detection and behavioral monitoring tools for Industrial Control Systems and Industry 4.0. SerialGuard is a fail-safe senso...

    • Language: English

  • How 2 Simple Phrases Should Drive your Security Strategy

    Tuesday17:00 - 17:2520 Oct 2020
    Technology Showcase

    In this session we'll explore why the two most important, and simple, phrases in security should be the principles that drive an organisation's security strateg...

    • Language: English

  • Threat Intelligence, Real-life Phishing Attacks, and Open APIs: How to Determine Organisational Risk Score

    Wednesday10:00 - 10:4521 Oct 2020
    Information Security Exchange

    In this session, Thom Bailey, senior director of product strategy at Mimecast, will explore the benefits of a consolidated cyber resilience platform to layer se...

    • Language: English

  • Zero Trust Execution for Your Cloud Workloads

    Wednesday10:00 - 10:2521 Oct 2020
    Technology Showcase

    The use of Application Control—also known as Allow Listing or Zero Trust Execution—is considered to be an essential Cloud Workload Protection strategy, due to i...

    • Language: English