Your Search

  • Topic Area

    • Governance, risk and compliance Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 24 of 58 results

|

Items per page:

Sort By
  • Workshop 3: CISSP Preview: A Risk Based Approach to Security

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Risk and security remain inextricably linked, this workshop examines practical approaches to the effective management of this important relationship, including ...

    • Language: English

  • Workshop 2: Stressless ISMS: How Shakespeare Helps When Setting Up an ISMS

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    The session will contain two parts, one in which practical aspects of how to set up and run a certified ISMS are explained and another containing examples of se...

    • Language: English

  • Cryptojacking: What You Need to Know

    Tuesday10:00 - 10:2504 Jun 2019
    Tech Talks

    In his talk, Chris Marrison, Consulting Solutions Architect at Infoblox, will provide a brief yet informative history on everything ‘crypto’, including crypto c...

    • Language: English

  • What’s New with the ePrivacy Regulation? Key Considerations for Tomorrow’s Electronic Communications

    Tuesday11:15 - 11:4504 Jun 2019
    Talking Tactics

    The ePrivacy Regulation will have a profound effect on marketing activities moving forward. Faced with the legal and financial ramifications of ignoring a consu...

    • Language: English

  • The Key to Securing Your Hybrid Cloud Starts with "ABC"

    Tuesday11:20 - 11:4504 Jun 2019
    Technology Showcase

    Many enterprises are adopting a cloud-first strategy to drive their business. As cloud deployments increase, security requirements increase with them, leading t...

    • Language: English

  • Building Brand Infosec: Engaging Employees to Drive Secure Behaviour

    Tuesday11:25 - 12:3504 Jun 2019
    Keynote Stage

    Panel Discussion High profile breaches over the last 12 months have demonstrated that no matter how much sophisticated security technology is in place, it cann...

    • Language: English

  • How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks

    Tuesday11:45 - 12:0004 Jun 2019
    Cyber Innovation Showcase

    There are five technical information security controls that if implemented correctly are known to eliminate 95% of cyber attacks. These are well documented as p...

    • Language: English

  • The Digital Risk Dilemma: How to Protect What You Don’t Control

    Tuesday12:40 - 13:0504 Jun 2019
    Strategy Talks

    Everyday more of your attack surface moves to web infrastructure that you neither own nor directly control. To protect your digital assets and thwart malicious ...

    • Language: English

  • It’s all About Peanut Butter: Building a Multi-Disciplinary Infosec Team to Manage Cyber Risk

    Tuesday12:55 - 13:3504 Jun 2019
    Keynote Stage

    Keynote Presentation Ever been told that security always says NO? Or asked why we need information security when we’re merely in the business of selling peanut...

    • Language: English

  • Using Shipbuilders Wisdom to Protect Data Centres & Clouds

    Tuesday13:20 - 13:4504 Jun 2019
    Technology Showcase

    In today’s modern, hyper-connected and threat-laden enterprise landscape, the time has come to shift from traditional walls-based protection into a flexible sec...

    • Language: English

  • SSH Keys: Security Asset or Liability?

    Tuesday13:20 - 13:4504 Jun 2019
    Strategy Talks

    All enterprises rely on SSH for routine administrative tasks by systems administrators, as well as for secure machine-to-machine automation of critical business...

    • Language: English

  • Taming the Storm Clouds: Managing Network Security Across the Hybrid & Multi-Cloud Estate

    Tuesday14:00 - 14:2504 Jun 2019
    Technology Showcase

    Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visib...

    • Language: English

  • Securing SMEs Symposium

    Tuesday14:00 - 16:3004 Jun 2019
    Securing SMEs Symposium

    Implementing Information Security Controls to Manage Risk in the SME When: Tuesday 4th June, 14.00-16.30 Where: Pillar Hall, Olympia The 2018 Verizon Data Br...

    • Language: English

  • Troll Hunting Using Behavioural Analytics

    Tuesday14:00 - 14:2504 Jun 2019
    Tech Talks

    Influence operation on the web and in social media today target everything from elections to corporate interests and high profile individuals. In this talk we p...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Tuesday15:05 - 15:2004 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding rout...

    • Language: English

  • How to Find Infrastructure Shadow IT in the Cloud

    Tuesday15:15 - 15:4504 Jun 2019
    Talking Tactics

    The cloud has enabled increases in agility and cost savings in IT, but has allowed employees to buy and provision out-of-policy cloud infrastructure without app...

    • Language: English

  • Security at the Speed of DevOps: Building In, Not Bolting On

    Tuesday15:20 - 15:4504 Jun 2019
    Strategy Talks

    Security embedded within DevOps reduces risk exposure up to 80%. Adopt security automation in the DevOps process, providing automation and actionable data to de...

    • Language: English

  • Two Attacks for the Price of One? Defending Against Multi-Intent Malware

    Tuesday15:20 - 15:4504 Jun 2019
    Tech Talks

    Malware engineers are diversifying their businesses with multi-intent malware, where a single successful compromise can open up multiple streams of revenue. In ...

    • Language: English

  • Bringing Rapid Prototyping to the Threat Model Process

    Tuesday15:30 - 16:1504 Jun 2019
    Geek Street

    Introduction to the Rapid Threat Model Prototyping methodology, a radical departure from standard architectural threat modeling. This new methodology allows sof...

    • Language: English

  • Privileged Access Management Made Easy

    Tuesday16:00 - 16:3004 Jun 2019
    Talking Tactics

    Keeping sensitive information secure, maintaining data regulation compliance, and enabling privileged users to work efficiently, at the right levels of access, ...

    • Language: English

  • The Song Remains the Same: Moving the Cybersecurity Dial…

    Tuesday16:00 - 16:2504 Jun 2019
    Strategy Talks

    We're still victim of vulnerabilities which are more than 20 years old despite the evolution of cyber security solutions in the same period.  How can we truly ...

    • Language: English

  • Personality Traits Meet Cybersecurity

    Tuesday16:40 - 17:0504 Jun 2019
    Strategy Talks

    The art of “people hacking” tricks people into unwillingly participate in scams. Certain personality traits make people more (and less) likely to fall prey to s...

    • Language: English

  • View from the Board: Managing Organisational Complexity & Risk

    Wednesday11:25 - 12:0505 Jun 2019
    Keynote Stage

    Keynote Presentation During this presentation Dame Inga Beale, former CEO of Lloyds of London will share her perspective on how to change business and culture a...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Wednesday11:45 - 12:0005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding rout...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.