Your Search

  • Date

    • 5th June 2019 (Wednesday) Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 24 of 89 results

|

Items per page:

Sort By
  • Keynote Briefing: The Power of People: Amplifying our Human Capacity Through Technology & Community

    Wednesday08:15 - 09:3005 Jun 2019
    Keynote Stage

    IMPORTANT: This session is only open to people who have pre-registered and confirmed their participation as numbers are limited.   People are being empowered th...

    • Language: English

  • Women in Cybersecurity

    Wednesday08:30 - 11:0005 Jun 2019
    Women in Cybersecurity

    Infosecurity Magazine’s Women in Cybersecurity Networking Event Infosecurity Magazine’s third annual Women in Cybersecurity networking event at Infosecurity Eu...

    • Language: English

  • Workshop 2: Speed & Precision: The Keys to Stopping Modern Adversarie

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight an...

    • Language: English

  • How to Monitor & Protect Your Network Using NetFlow/IPFIX Data

    Wednesday10:00 - 10:2505 Jun 2019
    Technology Showcase

    A fast, reliable and well secured network is of crucial importance to any organisation. Flowmon is the answer to this challenge using leading edge IP flow monit...

    • Language: English

  • Workshop 1: From White House Email Prankster to White Hat Researcher: How Cyber Gangs Operate & How Businesses Can Protect Against Email Threats

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    SINON_REBORN was once an email prankster that fooled the White House, but now he hunts criminal email gangs. Learn his techniques from both sides of the coin to...

    • Language: English

  • Workshop 3: Is AI the Answer to Reducing Cyber-Attack Risks?

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    The media makes sensationalistic claims about AI. Is it a rising trend or just a buzzword? Trendy or not, Cisco has been using AI for years to help businesses ...

    • Language: English

  • The Zero-Trust Approach for Your Alert Haystack

    Wednesday10:00 - 10:2505 Jun 2019
    Tech Talks

    Current approaches for SOC automation are focused on making alerts more consumable and running playbooks, but ultimately defenders run the risk of having their ...

    • Language: English

  • Demystifying Intelligence-Led Red Teaming: What It Is & How to Automate It

    Wednesday10:00 - 10:2505 Jun 2019
    Strategy Talks

    On May 2018, the European Central Bank published the TIBER-EU, a framework for testing financial sector resilience to cyber attacks. TIBER-EU framework puts an...

    • Language: English

  • Workshop 4: Threat Hunting Workshop

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    Join your peers and other security experts for our interactive Threat Hunting Workshop. After the workshop, you'll walk away with an in-depth knowledge on how ...

    • Language: English

  • Get the Benefit You Deserve from Threat Intel

    Wednesday10:05 - 10:2005 Jun 2019
    Cyber Innovation Showcase

    As Cyber Threat Intelligence moves from the sharing of indicators to the sharing of TTPs (tactics, techniques and procedures) and beyond, there are significant ...

    • Language: English

  • Discovering the Digital Underworld: Privacy, the Dark Web, Tech & Democracy

    Wednesday10:15 - 11:0505 Jun 2019
    Keynote Stage

    Opening Keynote During this session, Jamie Bartlett will take you on a journey of discovery – sharing his insight into how technology is changing society. From ...

    • Language: English

  • Zero Trust: What Does it Mean for the CISO?

    Wednesday10:30 - 11:3005 Jun 2019
    Information Security Exchange

    Adopting Zero Trust is an often-repeated phrase in the security industry, and it is growing in popularity.  Set against this is the increasing pressure on the C...

    • Language: English

  • The Future of Authentication

    Wednesday10:30 - 10:4505 Jun 2019
    Cyber Innovation Showcase

    Data leaks and password thefts have proven that password-based authentication approach is inadequate to preserve security and privacy for IT systems. Behavioura...

    • Language: English

  • Managing the Insider Threat: Why Visibility is Critical

    Wednesday10:30 - 11:0005 Jun 2019
    Talking Tactics

    Ponemon research shows that the average time to spot and contain an insider threat is 72 days - only 16% of incidents are identified and contained within 30 day...

    • Language: English

  • Optimising Cloud for Security Now You’re “Up There!”

    Wednesday10:30 - 11:3005 Jun 2019
    Leaders Programme

    Over 90% of CISOs say that leveraging cloud security solutions allows them to be more effective. Find out the secrets to their success including: Ways to use ...

    • Language: English

  • Trust No One & Suspect Everyone: Zero Trust Security Model

    Wednesday10:30 - 11:1505 Jun 2019
    Insight Stage

    Identity & Access Management A threat is a threat—whether intentional or not—and the human factor that lends itself to malicious behaviour or inadvertent error...

    • Language: English

  • Deep Dive: Using Artificial Intelligence to Impersonate a Human & Undertake Vishing Attacks

    Wednesday10:30 - 11:1505 Jun 2019
    Geek Street

    Hear no Evil see no Evil; How an AI system was developed that could disguise itself as a human and deceive people. How did this work, what could it achieve? In ...

    • Language: English

  • Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

    Wednesday10:40 - 11:0505 Jun 2019
    Technology Showcase

    Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuf...

    • Language: English

  • Modern Cyber Threats & Prioritising Security Controls to Combat Them

    Wednesday10:40 - 11:0505 Jun 2019
    Strategy Talks

    Another year, another security show, what silver bullets are you hunting for this go round? In reality the threats we face today may be more sophisticated than ...

    • Language: English

  • Human Risk Protection

    Wednesday10:55 - 11:1005 Jun 2019
    Cyber Innovation Showcase

    Academic studies have demonstrated and explained the ineffectiveness of security awareness and education (Bada, Sasse & Nurse, 2016) and CISOs are seeing it eve...

    • Language: English

  • Protecting Your Organisation's Very Attacked People

    Wednesday11:15 - 11:4505 Jun 2019
    Talking Tactics

    90% of all cyberattacks start with an email targeting your end-users. The human factor—the instincts of curiosity and trust that lead well-meaning people to cli...

    • Language: English

  • Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx

    Wednesday11:20 - 11:3505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation As we face an ever-larger number of increasingly more complex cyber threats in networks operating at ever greater speeds, the developers ...

    • Language: English

  • Anatomy of a Cyber Attack: DNSpionage

    Wednesday11:20 - 11:4505 Jun 2019
    Tech Talks

    Threat actors continuously search for new techniques to compromise their victims. Recently, Cisco Talos identified a new malicious campaign named “DNSpionage”. ...

    • Language: English

  • The Office 365 Dilemma: How Secure is Secure?

    Wednesday11:20 - 11:4505 Jun 2019
    Strategy Talks

    Office 365 has captured the imagination of many organisations, offering a wide range of productivity applications in a single platform. However, as organisation...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.