Your Search

  • Topic Area

    • Incident response & security operations Remove
  • Type of Content

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 23 results

|

Items per page:

Sort By
  • Workshop 2: Stressless ISMS: How Shakespeare Helps When Setting Up an ISMS

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    The session will contain two parts, one in which practical aspects of how to set up and run a certified ISMS are explained and another containing examples of se...

    • Language: English

  • Workshop 1: The 3Ps of Third Party Risk: Prevention, Policies, Promises

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Independent research revealed that while 60% of firms have formal third party risk policies, nearly half have experienced a significant breach caused by a vendo...

    • Language: English

  • Perspectives from the Frontline: Managing Risk & Building Resilience

    Tuesday10:15 - 11:0504 Jun 2019
    Keynote Stage

    Opening Keynote   As one BBC Chief News Reporter Kate Adie reported from most of the world’s hotspots and war zones, broadcasting from the Gulf War and Tiananme...

    • Language: English

  • Digitalisation & the Cyber INsecurity Gap

    Tuesday10:40 - 11:0504 Jun 2019
    Technology Showcase

    79% of executives report their organisation is adopting new technologies faster than they can address security issues. As companies rely more on digital IT, clo...

    • Language: English

  • Addressing One of the Largest Risks in Cybersecurity: Humans!

    Tuesday11:20 - 11:3504 Jun 2019
    Cyber Innovation Showcase

    Your employees today struggle to identify real cyber attacks, whilst traditional awareness campaigns has failed to drive cultural and behavioural change. HumanF...

    • Language: English

  • How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks

    Tuesday11:45 - 12:0004 Jun 2019
    Cyber Innovation Showcase

    There are five technical information security controls that if implemented correctly are known to eliminate 95% of cyber attacks. These are well documented as p...

    • Language: English

  • Neither Phish nor Flash: How Cyber-Criminals Target Business Email Inboxes Without Phishing

    Tuesday12:00 - 12:2504 Jun 2019
    Strategy Talks

    Well-resourced actors typically access business email accounts through targeted phishing campaigns or using information-stealing malware. The barriers to entry,...

    • Language: English

  • Incident & Breach Management for Privacy & Security Teams

    Tuesday12:45 - 13:1504 Jun 2019
    Talking Tactics

    Privacy and security professionals often approach incident and breach response from two different outlooks. Whereas security teams focus on threat vectors, priv...

    • Language: English

  • From Beyond the Wall to the Seven Kingdoms: Why Email Threat-Sharing Gives Us A Chance

    Tuesday13:00 - 13:1504 Jun 2019
    Cyber Innovation Showcase

    Download Presentation For business leaders and aspiring Iron Throne rulers.  As members of the security community suffering from the constant onslaught of cyb...

    • Language: English

  • Building or Modernising Own CSIRT/SOC: Practical Tips

    Tuesday13:45 - 14:1504 Jun 2019
    Talking Tactics

    The presentation will centre around cybersecurity capability build-out via the establishment of governmental, sectorial and organisational Computer Security Inc...

    • Language: English

  • Expense in Depth: Managing Your Total Cost of Controls

    Tuesday14:00 - 14:2504 Jun 2019
    Strategy Talks

    John McClurg, Vice President - Ambassador-At-Large, Cylance will show how current approaches to information security are economically inefficient and why a Tota...

    • Language: English

  • Building a Secure Architectural Foundation for Next Generation Networks & Digital Transformation

    Tuesday15:20 - 15:4504 Jun 2019
    Technology Showcase

    Organisations have grown their security defences as they have responded to the rapidly evolving threat landscape. This has led to a disjointed, fragile security...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.