Your Search

  • Theatre

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 24 of 31 results

|

Items per page:

Sort By
  • Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions

    Tuesday10:00 - 10:2504 Jun 2019
    Strategy Talks

    Wishful thinking won’t protect your data and systems. Without understanding two key psychological constructs, motivated reasoning and decision fatigue, people w...

    • Language: English

  • Cyber Threat Intelligence & Criminal Innovation

    Tuesday10:40 - 11:0504 Jun 2019
    Strategy Talks

    In this talk Max Vetter will explore the innovative nature of cyber criminals and demonstrate why they are consistently ahead of the game. He will also introduc...

    • Language: English

  • Radical Innovation in Security: A Game-Changing Review of Security Techniques & Outcomes

    Tuesday11:20 - 11:4504 Jun 2019
    Strategy Talks

    Self driving cars, artificial intelligence, smart speakers, Internet of Things, the “race to digitise” and the rapid move toward hyper-connectivity is introduci...

    • Language: English

  • Neither Phish nor Flash: How Cyber-Criminals Target Business Email Inboxes Without Phishing

    Tuesday12:00 - 12:2504 Jun 2019
    Strategy Talks

    Well-resourced actors typically access business email accounts through targeted phishing campaigns or using information-stealing malware. The barriers to entry,...

    • Language: English

  • The Digital Risk Dilemma: How to Protect What You Don’t Control

    Tuesday12:40 - 13:0504 Jun 2019
    Strategy Talks

    Everyday more of your attack surface moves to web infrastructure that you neither own nor directly control. To protect your digital assets and thwart malicious ...

    • Language: English

  • SSH Keys: Security Asset or Liability?

    Tuesday13:20 - 13:4504 Jun 2019
    Strategy Talks

    All enterprises rely on SSH for routine administrative tasks by systems administrators, as well as for secure machine-to-machine automation of critical business...

    • Language: English

  • Expense in Depth: Managing Your Total Cost of Controls

    Tuesday14:00 - 14:2504 Jun 2019
    Strategy Talks

    John McClurg, Vice President - Ambassador-At-Large, Cylance will show how current approaches to information security are economically inefficient and why a Tota...

    • Language: English

  • Turning a Ship Takes Planning & Effort from Every Angle

    Tuesday14:40 - 15:0504 Jun 2019
    Strategy Talks

    Changing the attitudes and behaviours of employees within an organisation can be a gargantuan task. From appropriately managing incidents to creating efficient ...

    • Language: English

  • Security at the Speed of DevOps: Building In, Not Bolting On

    Tuesday15:20 - 15:4504 Jun 2019
    Strategy Talks

    Security embedded within DevOps reduces risk exposure up to 80%. Adopt security automation in the DevOps process, providing automation and actionable data to de...

    • Language: English

  • The Song Remains the Same: Moving the Cybersecurity Dial…

    Tuesday16:00 - 16:2504 Jun 2019
    Strategy Talks

    We're still victim of vulnerabilities which are more than 20 years old despite the evolution of cyber security solutions in the same period.  How can we truly ...

    • Language: English

  • Personality Traits Meet Cybersecurity

    Tuesday16:40 - 17:0504 Jun 2019
    Strategy Talks

    The art of “people hacking” tricks people into unwillingly participate in scams. Certain personality traits make people more (and less) likely to fall prey to s...

    • Language: English

  • Demystifying Intelligence-Led Red Teaming: What It Is & How to Automate It

    Wednesday10:00 - 10:2505 Jun 2019
    Strategy Talks

    On May 2018, the European Central Bank published the TIBER-EU, a framework for testing financial sector resilience to cyber attacks. TIBER-EU framework puts an...

    • Language: English

  • Modern Cyber Threats & Prioritising Security Controls to Combat Them

    Wednesday10:40 - 11:0505 Jun 2019
    Strategy Talks

    Another year, another security show, what silver bullets are you hunting for this go round? In reality the threats we face today may be more sophisticated than ...

    • Language: English

  • The Office 365 Dilemma: How Secure is Secure?

    Wednesday11:20 - 11:4505 Jun 2019
    Strategy Talks

    Office 365 has captured the imagination of many organisations, offering a wide range of productivity applications in a single platform. However, as organisation...

    • Language: English

  • Why do Software Flaws Persist so Long After Being Discovered?

    Wednesday12:00 - 12:2505 Jun 2019
    Strategy Talks

    It takes time to fix security flaws. But developers simply can’t wave a magic wand over the portfolio to fix the majority of flaws in an instant, or even a week...

    • Language: English

  • Strategic Autonomous Response: Learning from Patient Zero to Protect the Network at Large

    Wednesday12:40 - 13:0505 Jun 2019
    Strategy Talks

    With email still the most common vector of attack, it is time for a new approach to defending our digital businesses. AI cyber defences can now be deployed acro...

    • Language: English

  • App-abet Soup: Should You DAST, SAST, IAST or RASP?

    Wednesday13:20 - 13:4505 Jun 2019
    Strategy Talks

    While web applications offer convenience to businesses and customers alike, their ubiquity makes them a popular attack target for cybercriminals. As a result, w...

    • Language: English

  • Three CISOs Walk Into a Bar

    Wednesday14:00 - 14:2505 Jun 2019
    Strategy Talks

    Panel Discussion Featuring security leaders from three different industries as well as research from ESG (Enterprise Strategy Group), this panel discussion wil...

    • Language: English

  • Dissecting Today’s Attacks to See the Future of Cybersecurity

    Wednesday14:40 - 15:0505 Jun 2019
    Strategy Talks

    Dissecting the current threat landscape and analysing major data breaches from the last decade, this session explores how these insights can help us predict the...

    • Language: English

  • Understanding & Leveraging GDPR Regulations to Justify IT Security Spend

    Wednesday15:20 - 15:4505 Jun 2019
    Strategy Talks

    This session draws upon Apricorn’s survey of over 100 IT security professionals which emphasises the security challenges IT executives face when balancing data ...

    • Language: English

  • Why Artificial Intelligence Doesn't Work & Other Cybersecurity Failed Technologies

    Wednesday16:00 - 16:2505 Jun 2019
    Strategy Talks

    As the hype and talk of AI increases and with many organisations now claiming to have adopted AI capabilities in-house, Ian Mann discusses why Artificial Intell...

    • Language: English

  • Modelling a Data Breach: The Financial Implications

    Wednesday16:40 - 17:0505 Jun 2019
    Strategy Talks

    With large scale data breaches continually attracting large headlines, businesses are ever increasingly assessing their internal preparedness. Crucial to this p...

    • Language: English

  • The Tortoise & the Hare: IoT Security & The Cyber Physical World

    Thursday10:00 - 10:2506 Jun 2019
    Strategy Talks

    As an industry, we are not doing enough with our expertise to support vulnerable, yet converging, networks across the region, to catch up with advancing IoT tec...

    • Language: English (United Kingdom)

  • Tales from the Trenches: Reinvent Application Security Testing for DevOps & SecOps

    Thursday10:40 - 11:0506 Jun 2019
    Strategy Talks

    DevOps is a revolution starting to deliver. The “shift left” security approach is trying to catch up, but challenges remain. We will go over concrete security a...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.