Your Search

  • Topic Area

    • Security architecture & engineering Remove
    • Threats, exploits and vulnerabilities Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 8 of 8 results

|

Items per page:

Sort By
  • Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx

    Tuesday15:30 - 15:4504 Jun 2019
    Cyber Innovation Showcase

    Download Presentation As we face an ever-larger number of increasingly more complex cyber threats in networks operating at ever greater speeds, the developers ...

    • Language: English

  • Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx

    Wednesday11:20 - 11:3505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation As we face an ever-larger number of increasingly more complex cyber threats in networks operating at ever greater speeds, the developers ...

    • Language: English

  • Cracking the Complexity Conundrum: How to Secure, Patch & Protect Complex, Dynamic Organisations

    Wednesday12:25 - 13:2505 Jun 2019
    Keynote Stage

    Panel Discussion Enterprises are more dynamic and complex than ever before.  From working practices, agile development and the latest technologies, to multiple...

    • Language: English

  • How to Optimise Investment in Cybersecurity Tools, Technologies & Products

    Wednesday14:40 - 15:3005 Jun 2019
    Keynote Stage

    Panel Discussion - CISOs in Conversation Peddling fear, uncertainty and doubt is a criticism that is frequently levelled at information security vendors with a...

    • Language: English

  • From Liability to Asset: The Role DNS Should Be Playing in Your Security Architecture & Operations

    Wednesday15:20 - 15:4505 Jun 2019
    Technology Showcase

    DNS is a ubiquitous network service which has a front row seat when it comes to malware activities. Most organisations neglect to consider the scale and simplic...

    • Language: English

  • Effective Steps to Reduce Third-Party Risk

    Thursday11:15 - 11:4506 Jun 2019
    Talking Tactics

    As organisations struggle to protect themselves from the seemingly ubiquitous threat of cyberattack, the concept of risk management becomes all the more importa...

    • Language: English

  • Prevention: The Strategic Element in Your Security Stack

    Thursday12:40 - 13:0506 Jun 2019
    Technology Showcase

    Security architecture can be broken down into three main elements: Prevention, detection and remediation. Prevention can be considered the most strategically im...

    • Language: English

  • Zero Trusted Networks or: Why Perimeter Security is Dead

    Thursday14:05 - 14:3006 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Traditional IT network security is based on perimeter security. Perimeter security makes it hard to obtain access to the network, but eve...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.