Your Search

  • Topic Area

    • Automation, Machine Learning & AI Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 30 of 30 results

|

Items per page:

Sort By
  • The “Industrial Revolution” of Penetration Testing

    Tuesday10:00 - 10:2504 Jun 2019
    Technology Showcase

    With the increasing exploits and tools hackers use to gain access to a company's IT infrastructure, the need to combat them grows more and more. Automated Penet...

    • Language: English

  • Cyber Essentials Plus: Driving Adoption & Raising the Bar

    Tuesday10:05 - 10:2004 Jun 2019
    Cyber Innovation Showcase

    Download Presentation The majority of common cyber attacks would be prevented by adherence to the 5 controls of the Cyber Essentials Scheme. And yet, despite t...

    • Language: English

  • API Security: What you Absolutely Need to Know Now, with Real World Examples of API Attacks

    Tuesday11:45 - 12:4504 Jun 2019
    Information Security Exchange

    In 2018, at least 85% of organisations consider web APIs and API-based integration fundamental to their business strategy and continued success. However, the ex...

    • Language: English

  • "Yes We Can Get In. Now What?"

    Tuesday12:00 - 12:2504 Jun 2019
    Tech Talks

    The results of a red-team test (or breach) can be a thunderclap under a clear blue sky. The recommendations might look idealistic and expensive. Management migh...

    • Language: English

  • Get the Benefit You Deserve from Threat Intel

    Tuesday12:35 - 12:5004 Jun 2019
    Cyber Innovation Showcase

    As Cyber Threat Intelligence moves from the sharing of indicators to the sharing of TTPs (tactics, techniques and procedures) and beyond, there are significant ...

    • Language: English

  • From Beyond the Wall to the Seven Kingdoms: Why Email Threat-Sharing Gives Us A Chance

    Tuesday13:00 - 13:1504 Jun 2019
    Cyber Innovation Showcase

    Download Presentation For business leaders and aspiring Iron Throne rulers.  As members of the security community suffering from the constant onslaught of cyb...

    • Language: English

  • DNS: Cybersecurity’s Best Kept Secret for Eliminating Network Threats

    Tuesday13:00 - 14:0004 Jun 2019
    Information Security Exchange

    Growing numbers of cyber threats and volumes of data are creating significant problems. Stretched security teams need to keep networks secure, yet still cope wi...

    • Language: English

  • Application Security Automation & Orchestration

    Tuesday13:25 - 13:4004 Jun 2019
    Cyber Innovation Showcase

    Uleska are leading the way in the automation and orchestration of application security testing, and this session will discuss the challenges and solutions to ef...

    • Language: English

  • Turning a Ship Takes Planning & Effort from Every Angle

    Tuesday14:40 - 15:0504 Jun 2019
    Strategy Talks

    Changing the attitudes and behaviours of employees within an organisation can be a gargantuan task. From appropriately managing incidents to creating efficient ...

    • Language: English

  • FutureTech: Future Proofing Cybersecurity for the Next Tech Frontier: Quantum, AI, Blockchain

    Tuesday15:15 - 16:1504 Jun 2019
    Keynote Stage

    Panel Discussion Technology is advancing at breakneck speed generating a lot of media and marketing hype – but what do these developments really mean for infor...

    • Language: English

  • How to Monitor & Protect Your Network Using NetFlow/IPFIX Data

    Wednesday10:00 - 10:2505 Jun 2019
    Technology Showcase

    A fast, reliable and well secured network is of crucial importance to any organisation. Flowmon is the answer to this challenge using leading edge IP flow monit...

    • Language: English

  • Workshop 3: Is AI the Answer to Reducing Cyber-Attack Risks?

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    The media makes sensationalistic claims about AI. Is it a rising trend or just a buzzword? Trendy or not, Cisco has been using AI for years to help businesses ...

    • Language: English

  • Get the Benefit You Deserve from Threat Intel

    Wednesday10:05 - 10:2005 Jun 2019
    Cyber Innovation Showcase

    As Cyber Threat Intelligence moves from the sharing of indicators to the sharing of TTPs (tactics, techniques and procedures) and beyond, there are significant ...

    • Language: English

  • Deep Dive: Using Artificial Intelligence to Impersonate a Human & Undertake Vishing Attacks

    Wednesday10:30 - 11:1505 Jun 2019
    Geek Street

    Hear no Evil see no Evil; How an AI system was developed that could disguise itself as a human and deceive people. How did this work, what could it achieve? In ...

    • Language: English

  • Short, Brutal & Nasty: New Domains & Their Life & Times

    Wednesday10:40 - 11:0505 Jun 2019
    Tech Talks

    Domain names are cheap, easy-to-get assets – the perfect tool for the perfect crime. In this presentation, internet pioneer and Farsight Security CEO Dr. Paul V...

    • Language: English

  • The Office 365 Dilemma: How Secure is Secure?

    Wednesday11:20 - 11:4505 Jun 2019
    Strategy Talks

    Office 365 has captured the imagination of many organisations, offering a wide range of productivity applications in a single platform. However, as organisation...

    • Language: English

  • Why do Software Flaws Persist so Long After Being Discovered?

    Wednesday12:00 - 12:2505 Jun 2019
    Strategy Talks

    It takes time to fix security flaws. But developers simply can’t wave a magic wand over the portfolio to fix the majority of flaws in an instant, or even a week...

    • Language: English

  • From Beyond the Wall to the Seven Kingdoms: Why Email Threat-Sharing Gives Us A Chance

    Wednesday12:10 - 12:2505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation For business leaders and aspiring Iron Throne rulers.  As members of the security community suffering from the constant onslaught of cyb...

    • Language: English

  • Cracking the Complexity Conundrum: How to Secure, Patch & Protect Complex, Dynamic Organisations

    Wednesday12:25 - 13:2505 Jun 2019
    Keynote Stage

    Panel Discussion Enterprises are more dynamic and complex than ever before.  From working practices, agile development and the latest technologies, to multiple...

    • Language: English

  • AI in Security Operations Centres: What We’ve Learnt so Far

    Wednesday12:30 - 13:1505 Jun 2019
    Insight Stage

    Is it time for the traditional multi-tiered SOC to end? Get beyond the InfoSec buzzwords in this practitioner-lead session in which we'll we share our insights ...

    • Language: English

  • Strategic Autonomous Response: Learning from Patient Zero to Protect the Network at Large

    Wednesday12:40 - 13:0505 Jun 2019
    Strategy Talks

    With email still the most common vector of attack, it is time for a new approach to defending our digital businesses. AI cyber defences can now be deployed acro...

    • Language: English

  • App-abet Soup: Should You DAST, SAST, IAST or RASP?

    Wednesday13:20 - 13:4505 Jun 2019
    Strategy Talks

    While web applications offer convenience to businesses and customers alike, their ubiquity makes them a popular attack target for cybercriminals. As a result, w...

    • Language: English

  • Cyber Essentials Plus: Driving Adoption & Raising the Bar

    Wednesday13:25 - 13:4005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation The majority of common cyber attacks would be prevented by adherence to the 5 controls of the Cyber Essentials Scheme. And yet, despite t...

    • Language: English

  • Why Vulnerability Management Fails

    Wednesday14:00 - 14:2505 Jun 2019
    Technology Showcase

    Every wonder why so many companies struggle to manage vulnerabilities? Do you bang your head against your desk every time the security team hands you a new list...

    • Language: English

  • Three CISOs Walk Into a Bar

    Wednesday14:00 - 14:2505 Jun 2019
    Strategy Talks

    Panel Discussion Featuring security leaders from three different industries as well as research from ESG (Enterprise Strategy Group), this panel discussion wil...

    • Language: English

  • Defeat Ransomware: Leveraging ATP & Machine Learning to Orchestrate a Synchronised Cybersecurity Environment Across Endpoint & Email

    Thursday11:10 - 11:3506 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Join us to hear Sam Mayne speak about our advanced threat protection engines. Learn about the current cybersecurity threat landscape and ...

    • Language: English

  • How to Detect Malware in Encrypted Traffic, Without Decrypting it, Using Artificial Intelligence

    Thursday11:20 - 11:4506 Jun 2019
    Tech Talks

    The rapid rise of encrypted traffic is changing the threat landscape. It’s reported that as of 2018, nearly half of all Internet traffic is protected by HTTPS a...

    • Language: English

  • Hunting for Zero-Days

    Thursday12:00 - 12:2506 Jun 2019
    Tech Talks

    New vulnerabilities are being found in code daily. Infact, 18,000+ new vulnerabilities are estimated to be disclosed in 2018, with a current growth rate of 27 p...

    • Language: English

  • How Machine Learning Empowers Threat Intelligence to Easily Solve Your Vulnerability Challenge, One Hundred Times Faster

    Thursday12:00 - 12:2506 Jun 2019
    Technology Showcase

    Organisations have too much information in their hands, and not enough contextual intelligence to act upon. One of the complex tasks CISOs and their departments...

    • Language: English

  • The Rise of Automated Hacking & the Effect on Your Organisation's Security

    Thursday13:45 - 14:1506 Jun 2019
    Talking Tactics

    The presentation outlines the rise of automated hacking and the consequences for both the attackers and the cyberresilience of an organisation. The landscape of...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.