Your Search

  • Date

    • 5th June 2019 (Wednesday) Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

49 - 89 of 89 results

|

Items per page:

Sort By
  • Integrating Cyber Risk into an Enterprise Risk Management Strategy: The CRO’s Perspective

    Wednesday13:45 - 14:2505 Jun 2019
    Keynote Stage

    Cyber risk is listed one of the top 10 risks in terms of both likelihood and risk  in the WEF Global Risk Report 2019. There is no doubt that cyber risk is a co...

    • Language: English

  • Branch Security for Direct Internet Access

    Wednesday13:45 - 14:1505 Jun 2019
    Talking Tactics

    Allowing branch sites access to business critical cloud applications such as Office 365 over a public Internet link is an understandably growing trend. Join us ...

    • Language: English

  • How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks

    Wednesday13:50 - 14:0505 Jun 2019
    Cyber Innovation Showcase

    There are five technical information security controls that if implemented correctly are known to eliminate 95% of cyber attacks. These are well documented as p...

    • Language: English

  • Workshop 1: With Your Head in the Cloud? Zero Trust Secure Access is Here to Help!

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    Rohini Kasturi, Chief Development Officer with Pulse Secure shares his vision on Zero Trust Secure Access Harvey Durrant, ICT Strategist, shares his vision o...

    • Language: English

  • Workshop 2: Speed & Precision: The Keys to Stopping Modern Adversarie

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight an...

    • Language: English

  • Workshop 3: Discover the Secrets of the SOC & How to Build a Threat Hunting Team

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    In the first half of this interactive workshop, we’ll talk about what goes into making a SOC work effectively. As well as providing the core monitoring and inci...

    • Language: English

  • Why Vulnerability Management Fails

    Wednesday14:00 - 14:2505 Jun 2019
    Technology Showcase

    Every wonder why so many companies struggle to manage vulnerabilities? Do you bang your head against your desk every time the security team hands you a new list...

    • Language: English

  • Workshop 4: Secure Programming in Java

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    A 2017 study conducted by DevOps.com found that 76% of developers indicated security and secure development education needed for today’s world of coding is miss...

    • Language: English

  • Evasive Malware: How Attackers Bypass Dynamic Analysis

    Wednesday14:00 - 14:2505 Jun 2019
    Tech Talks

    Mimecast’s Chief Scientist of Advanced Malware, Meni Farjon, will showcase high and low-level, known and unknown techniques for malware authors to evade current...

    • Language: English

  • Three CISOs Walk Into a Bar

    Wednesday14:00 - 14:2505 Jun 2019
    Strategy Talks

    Panel Discussion Featuring security leaders from three different industries as well as research from ESG (Enterprise Strategy Group), this panel discussion wil...

    • Language: English

  • Evolution or Revolution: What Has SIEM Become?

    Wednesday14:15 - 15:1505 Jun 2019
    Information Security Exchange

    Bulletproof explores the changing face of the SIEM industry and the evolving threat landscape it strives to counter. The seminar includes a case study of how to...

    • Language: English

  • A Journey of Self Driven Security Training

    Wednesday14:15 - 14:3005 Jun 2019
    Cyber Innovation Showcase

    This talk details a course of progression from engineer to security advocate, highlighting the importance of self driven teaching methodologies, the increased a...

    • Language: English

  • Phishing & OOB Exfiltration Through Purple Tinted Glasses

    Wednesday14:15 - 15:0005 Jun 2019
    Geek Street

    The proliferation of client-side attacks continues to grow, as attackers are increasingly aware their chances of success are increased if they can get the victi...

    • Language: English

  • The Rise of the Data Subject

    Wednesday14:30 - 15:1505 Jun 2019
    Insight Stage

    The impact of GDPR after 367 days, the complexity of GDPR, how businesses have had to change post GDPR and how Kingston can help you to deal with it. Over 1 yea...

    • Language: English

  • How Modern Access Management Can Accelerate Digital Transformation

    Wednesday14:30 - 15:0005 Jun 2019
    Talking Tactics

    Learn how modern access management can accelerate digital transformation by making it simpler, safer and more cost-effective for your users to access the apps a...

    • Language: English

  • Bin Alphanumeric Passwords!

    Wednesday14:40 - 14:5505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Tricerion’s mission is to ‘Bin Alphanumeric Passwords’, by replacing them with Picture Passwords. We are seeking to confront the complace...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Wednesday14:40 - 15:0505 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • Dissecting Today’s Attacks to See the Future of Cybersecurity

    Wednesday14:40 - 15:0505 Jun 2019
    Strategy Talks

    Dissecting the current threat landscape and analysing major data breaches from the last decade, this session explores how these insights can help us predict the...

    • Language: English

  • How to Optimise Investment in Cybersecurity Tools, Technologies & Products

    Wednesday14:40 - 15:3005 Jun 2019
    Keynote Stage

    Panel Discussion - CISOs in Conversation Peddling fear, uncertainty and doubt is a criticism that is frequently levelled at information security vendors with a...

    • Language: English

  • The Impact of Protocol Evolution on Network Security

    Wednesday14:40 - 15:0505 Jun 2019
    Tech Talks

    New protocols such as TLS 1.3, QUIC, DNS over HTTPS are designed to enhance privacy and end-user experience. However, these new protocols also have an impact on...

    • Language: English

  • Champagne CISO: Crisis Comms: How to Handle a Crisis in Front of the Media

    Wednesday15:00 - 16:3005 Jun 2019
    Leaders Programme

    Even at the most well-run companies things can go wrong, and when a crisis strikes your reputation is at stake. How you prepare for a crisis and implement a cr...

    • Language: English

  • Addressing One of the Largest Risks in Cybersecurity: Humans!

    Wednesday15:05 - 15:2005 Jun 2019
    Cyber Innovation Showcase

    Your employees today struggle to identify real cyber attacks, whilst traditional awareness campaigns has failed to drive cultural and behavioural change. HumanF...

    • Language: English

  • National or Sectorial Cybersecurity Capability Build-Out: Capability Assessments, CSIRT/SOCs, Threat Landscapes & CIIs

    Wednesday15:15 - 15:4505 Jun 2019
    Talking Tactics

    The session will cover cybersecurity capability build-out via cybersecurity capability assessment, establishment of cybersecurity framework, role of threat land...

    • Language: English

  • Cryptojacking: The Ghost of Cloud Security

    Wednesday15:20 - 15:4505 Jun 2019
    Tech Talks

    A new threat called cryptojacking that illicitly mines cryptocurrency was first documented on CBS’s showtime networks in late 2017. By mid-2018, cryptojacking h...

    • Language: English

  • Understanding & Leveraging GDPR Regulations to Justify IT Security Spend

    Wednesday15:20 - 15:4505 Jun 2019
    Strategy Talks

    This session draws upon Apricorn’s survey of over 100 IT security professionals which emphasises the security challenges IT executives face when balancing data ...

    • Language: English

  • From Liability to Asset: The Role DNS Should Be Playing in Your Security Architecture & Operations

    Wednesday15:20 - 15:4505 Jun 2019
    Technology Showcase

    DNS is a ubiquitous network service which has a front row seat when it comes to malware activities. Most organisations neglect to consider the scale and simplic...

    • Language: English

  • Unleash the Power of Your SOC: How to Measure Effectiveness & Mature Your Capabilities

    Wednesday15:30 - 16:3005 Jun 2019
    Information Security Exchange

    Despite the average organisation deploying dozens of security tools and products, major breaches are still happening.  In order to reduce the risk of experienc...

    • Language: English

  • Risk Management for the Cloud

    Wednesday15:30 - 16:1505 Jun 2019
    Insight Stage

    Protecting your customer data and mitigating risk is highly complex, especially when pursuing a multi-cloud strategy. To do this, your teams need the tools that...

    • Language: English

  • Automated Cyber Value-at-Risk for Application Security

    Wednesday15:30 - 15:4505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Uleska are leading the way in the automation of cyber value-at-risk determination for application security testing, and this session will...

    • Language: English

  • Cyber Defence 2019: An Overview of HIDS, NIDS & IPS Systems

    Wednesday15:30 - 16:1505 Jun 2019
    Geek Street

    This presentation will introduce you to cyber intrusion tools that help to prevent cyber intrusions threats from entering and harming your network. I will prese...

    • Language: English

  • Security by Design: Securing Software & Hardware Design & Development

    Wednesday15:45 - 16:2505 Jun 2019
    Keynote Stage

    As connectivity increases and IoT devices proliferate, building security into the design and development process has never been more critical. And yet the rapid...

    • Language: English

  • How to Become APT-Proof in 24 Hours

    Wednesday15:55 - 16:2005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Organisations like yours are investing $15 million annually in information security. They’re doing everything right. From perimeter secur...

    • Language: English

  • Cloud Key Management for Multinational Regulations

    Wednesday16:00 - 16:3005 Jun 2019
    Talking Tactics

    Understand strategies for key management architectures for cloud based applications that meet the needs of multinational corporations for GDPR, data privacy, da...

    • Language: English

  • Data Security Made Simple: Share, Work, & Protect

    Wednesday16:00 - 16:2505 Jun 2019
    Technology Showcase

    Data security is not an easy topic for enterprises—big or small—to tackle. From identifying the requirements and needs for compliance to actually implementing t...

    • Language: English

  • Evasive Phishing: New Attacks, Techniques & Trends

    Wednesday16:00 - 16:2505 Jun 2019
    Tech Talks

    We are experiencing a ‘perfect phishing storm’ of increasing sophistication, volume, and targeting in phishing attacks, driven by the maturation of the phishing...

    • Language: English

  • Why Artificial Intelligence Doesn't Work & Other Cybersecurity Failed Technologies

    Wednesday16:00 - 16:2505 Jun 2019
    Strategy Talks

    As the hype and talk of AI increases and with many organisations now claiming to have adopted AI capabilities in-house, Ian Mann discusses why Artificial Intell...

    • Language: English

  • Eliminating the WhatsApp & Dropbox Dilemma

    Wednesday16:30 - 16:5505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Consumer solutions such as WhatsApp and Dropbox are increasingly popular and have revolutionised the way of communication. However, when ...

    • Language: English

  • Protecting Your Network’s Precious Jewels with Micro-Segmentation

    Wednesday16:40 - 17:0505 Jun 2019
    Technology Showcase

    As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. Regardless of how many different firewalls you use, it’s merel...

    • Language: English

  • Navigating Complex Regulatory Oversight to Ensure Privacy, Security & Compliance

    Wednesday16:40 - 17:3005 Jun 2019
    Keynote Stage

    Panel Discussion Regulatory risk is a key challenge for organisations with the threat of huge fines in the event of a breach. Whilst GDPR is still forefront of...

    • Language: English

  • Putting Your Cyber Posture to The Test: Live Demo of Hacking an Enterprise

    Wednesday16:40 - 17:0505 Jun 2019
    Tech Talks

    How secure are your IT systems? Can your information security defences withstand the force of a machine-based hacking attack? The new technology, Automated Pene...

    • Language: English

  • Modelling a Data Breach: The Financial Implications

    Wednesday16:40 - 17:0505 Jun 2019
    Strategy Talks

    With large scale data breaches continually attracting large headlines, businesses are ever increasingly assessing their internal preparedness. Crucial to this p...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.