Your Search

  • Topic Area

  • Company Size

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 18 of 18 results

|

Items per page:

Sort By
  • State of Security

    Tuesday10:30 - 11:1504 Jun 2019
    Insight Stage

    During this session we will focus on topics that will help you define & lead your organisations and personal Security Strategy to relieve employees from pressur...

    • Language: English

  • Is That Really You? The Importance of Identity in Breach Readiness & Response

    Tuesday11:20 - 11:4504 Jun 2019
    Tech Talks

    Monitoring your users’ access and privileges, and securing them as they interact with the internet is core to a Zero Trust approach to cybersecurity. But what i...

    • Language: English

  • Bin Alphanumeric Passwords!

    Tuesday12:10 - 12:2504 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Tricerion’s mission is to ‘Bin Alphanumeric Passwords’, by replacing them with Picture Passwords. We are seeking to confront the complace...

    • Language: English

  • Zero Trust Privilege for DevOps & App Developers

    Tuesday12:30 - 13:1504 Jun 2019
    Insight Stage

    DevOps has emerged as a new attack surface being targeted by threat actors. In this presentation, we will highlight how Zero Trust Privilege is being used to pr...

    • Language: English

  • Workshop 3: CISSP Preview: An Introduction to Encryption

    Tuesday14:00 - 16:0004 Jun 2019
    Security Workshop

    Encryption is critical to protection of information assets at rest and in transit, this accessible introduction to encryption reviews key concepts, technologies...

    • Language: English

  • The Future of Authentication

    Tuesday14:40 - 14:5504 Jun 2019
    Cyber Innovation Showcase

    Data leaks and password thefts have proven that password-based authentication approach is inadequate to preserve security and privacy for IT systems. Behavioura...

    • Language: English

  • The More We Share, the More Resilient We Are: Why Threat Intelligence is the Future of Cybersecurity

    Tuesday14:40 - 15:0504 Jun 2019
    Tech Talks

    Sharing threat intelligence can be the difference in a company bouncing back from or suffering through a cyberattack, perhaps never recovering. The future of en...

    • Language: English

  • Trusted Access: Excuse Me Do I Know You?

    Tuesday15:30 - 16:3004 Jun 2019
    Information Security Exchange

    Trusted Access provides a zero-trust approach to securing all access across your applications and environment, from any user, device and location. It protects y...

    • Language: English

  • Automate Remote Access Procedures & Configurations

    Tuesday15:55 - 16:2004 Jun 2019
    Cyber Innovation Showcase

    Combis ARA (Automated Remote Access) is a state of the art, unified remote access management solution, that includes: On-line application for remote access re...

    • Language: English

  • Privileged Access Management Made Easy

    Tuesday16:00 - 16:3004 Jun 2019
    Talking Tactics

    Keeping sensitive information secure, maintaining data regulation compliance, and enabling privileged users to work efficiently, at the right levels of access, ...

    • Language: English

  • Death of the Password: Picture Authentication

    Tuesday16:40 - 17:0504 Jun 2019
    Technology Showcase

    Say goodbye to passwords! PixelPin offers an alternative authentication method to traditional passwords and biometrics, by utilising pictures to create a deligh...

    • Language: English

  • Zero Trust: What Does it Mean for the CISO?

    Wednesday10:30 - 11:3005 Jun 2019
    Information Security Exchange

    Adopting Zero Trust is an often-repeated phrase in the security industry, and it is growing in popularity.  Set against this is the increasing pressure on the C...

    • Language: English

  • The Future of Authentication

    Wednesday10:30 - 10:4505 Jun 2019
    Cyber Innovation Showcase

    Data leaks and password thefts have proven that password-based authentication approach is inadequate to preserve security and privacy for IT systems. Behavioura...

    • Language: English

  • Managing the Insider Threat: Why Visibility is Critical

    Wednesday10:30 - 11:0005 Jun 2019
    Talking Tactics

    Ponemon research shows that the average time to spot and contain an insider threat is 72 days - only 16% of incidents are identified and contained within 30 day...

    • Language: English

  • How Modern Access Management Can Accelerate Digital Transformation

    Wednesday14:30 - 15:0005 Jun 2019
    Talking Tactics

    Learn how modern access management can accelerate digital transformation by making it simpler, safer and more cost-effective for your users to access the apps a...

    • Language: English

  • Bin Alphanumeric Passwords!

    Wednesday14:40 - 14:5505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Tricerion’s mission is to ‘Bin Alphanumeric Passwords’, by replacing them with Picture Passwords. We are seeking to confront the complace...

    • Language: English

  • Is it Really You? Protect Your Digital Self

    Thursday10:00 - 10:2506 Jun 2019
    Technology Showcase

    In this session we will cover how the new technologies and cyber attack tactics evolved to target individual identities with malicious purpose to businesses and...

    • Language: English

  • Workshop 4: The Broad Impact of Active Directory Attacks: A Significant Threat to Business Continuity & How Sanofi Dealt With It

    Thursday10:00 - 12:0006 Jun 2019
    Security Workshop

    Most enterprises have integrated cyber-resilience in their Business Continuity Plans. Unfortunately, and despite tangible evidence, those plans tend to underest...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.