Your Search

  • Topic Area

    • Incident response & security operations Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 3 of 3 results

|

Items per page:

Sort By
  • Managing the Insider Threat: Why Visibility is Critical

    Wednesday10:30 - 11:0005 Jun 2019
    Talking Tactics

    Ponemon research shows that the average time to spot and contain an insider threat is 72 days - only 16% of incidents are identified and contained within 30 day...

    • Language: English

  • Monitoring Active Directory & Windows: Indications you are Under Attack

    Wednesday13:20 - 13:4505 Jun 2019
    Tech Talks

    Most attackers will take the path of least resistance when trying to breach your environment. It makes sense that monitoring the common attack paths could resul...

    • Language: English

  • Multi-Phased Attacks: The 1-2 Punch That Can Knock Your Business Cold

    Thursday11:45 - 12:1006 Jun 2019
    Cyber Innovation Showcase

    Download Presentation In 2019, the volume—and sophistication—of email threats is growing. Phishing is virtually indistinguishable from legitimate communication...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.