Your Search

  • Date

    • 5th June 2019 (Wednesday) Remove
  • Topic Area

    • Threats, exploits and vulnerabilities Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 33 of 33 results

|

Items per page:

Sort By
  • Workshop 2: Speed & Precision: The Keys to Stopping Modern Adversarie

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight an...

    • Language: English

  • How to Monitor & Protect Your Network Using NetFlow/IPFIX Data

    Wednesday10:00 - 10:2505 Jun 2019
    Technology Showcase

    A fast, reliable and well secured network is of crucial importance to any organisation. Flowmon is the answer to this challenge using leading edge IP flow monit...

    • Language: English

  • Workshop 1: From White House Email Prankster to White Hat Researcher: How Cyber Gangs Operate & How Businesses Can Protect Against Email Threats

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    SINON_REBORN was once an email prankster that fooled the White House, but now he hunts criminal email gangs. Learn his techniques from both sides of the coin to...

    • Language: English

  • Workshop 4: Threat Hunting Workshop

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    Join your peers and other security experts for our interactive Threat Hunting Workshop. After the workshop, you'll walk away with an in-depth knowledge on how ...

    • Language: English

  • Get the Benefit You Deserve from Threat Intel

    Wednesday10:05 - 10:2005 Jun 2019
    Cyber Innovation Showcase

    As Cyber Threat Intelligence moves from the sharing of indicators to the sharing of TTPs (tactics, techniques and procedures) and beyond, there are significant ...

    • Language: English

  • Discovering the Digital Underworld: Privacy, the Dark Web, Tech & Democracy

    Wednesday10:15 - 11:0505 Jun 2019
    Keynote Stage

    Opening Keynote During this session, Jamie Bartlett will take you on a journey of discovery – sharing his insight into how technology is changing society. From ...

    • Language: English

  • Trust No One & Suspect Everyone: Zero Trust Security Model

    Wednesday10:30 - 11:1505 Jun 2019
    Insight Stage

    Identity & Access Management A threat is a threat—whether intentional or not—and the human factor that lends itself to malicious behaviour or inadvertent error...

    • Language: English

  • Deep Dive: Using Artificial Intelligence to Impersonate a Human & Undertake Vishing Attacks

    Wednesday10:30 - 11:1505 Jun 2019
    Geek Street

    Hear no Evil see no Evil; How an AI system was developed that could disguise itself as a human and deceive people. How did this work, what could it achieve? In ...

    • Language: English

  • Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

    Wednesday10:40 - 11:0505 Jun 2019
    Technology Showcase

    Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuf...

    • Language: English

  • Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx

    Wednesday11:20 - 11:3505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation As we face an ever-larger number of increasingly more complex cyber threats in networks operating at ever greater speeds, the developers ...

    • Language: English

  • Anatomy of a Cyber Attack: DNSpionage

    Wednesday11:20 - 11:4505 Jun 2019
    Tech Talks

    Threat actors continuously search for new techniques to compromise their victims. Recently, Cisco Talos identified a new malicious campaign named “DNSpionage”. ...

    • Language: English

  • The Battle to Protect Public Services Against Phishing Attacks

    Wednesday12:00 - 12:3005 Jun 2019
    Talking Tactics

    A growing priority for Nikola Howard, Data Centre Manager at the London Borough of Camden, has been the need to keep employee and residents’ inboxes safe from t...

    • Language: English

  • How to Succeed at Threat Hunting & IR: Think Differently About Data

    Wednesday12:00 - 12:2505 Jun 2019
    Technology Showcase

    Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in thes...

    • Language: English

  • Cracking the Complexity Conundrum: How to Secure, Patch & Protect Complex, Dynamic Organisations

    Wednesday12:25 - 13:2505 Jun 2019
    Keynote Stage

    Panel Discussion Enterprises are more dynamic and complex than ever before.  From working practices, agile development and the latest technologies, to multiple...

    • Language: English

  • Malware, Security Analytics & Cybersecurity in 2019

    Wednesday12:40 - 13:0505 Jun 2019
    Technology Showcase

    Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decade...

    • Language: English

  • ZTE Router Vulnerabilities: A Demonstration on the Security Risks of the IoT

    Wednesday13:00 - 13:4505 Jun 2019
    Geek Street

    Positive Technologies researchers have discovered a number of vulnerabilities in a ZTE wifi router, used by 750-800 thousand devices globally. This presentation...

    • Language: English

  • Cyber Essentials Plus: Driving Adoption & Raising the Bar

    Wednesday13:25 - 13:4005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation The majority of common cyber attacks would be prevented by adherence to the 5 controls of the Cyber Essentials Scheme. And yet, despite t...

    • Language: English

  • Workshop 2: Speed & Precision: The Keys to Stopping Modern Adversarie

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight an...

    • Language: English

  • Workshop 3: Discover the Secrets of the SOC & How to Build a Threat Hunting Team

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    In the first half of this interactive workshop, we’ll talk about what goes into making a SOC work effectively. As well as providing the core monitoring and inci...

    • Language: English

  • Why Vulnerability Management Fails

    Wednesday14:00 - 14:2505 Jun 2019
    Technology Showcase

    Every wonder why so many companies struggle to manage vulnerabilities? Do you bang your head against your desk every time the security team hands you a new list...

    • Language: English

  • Workshop 4: Secure Programming in Java

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    A 2017 study conducted by DevOps.com found that 76% of developers indicated security and secure development education needed for today’s world of coding is miss...

    • Language: English

  • Evolution or Revolution: What Has SIEM Become?

    Wednesday14:15 - 15:1505 Jun 2019
    Information Security Exchange

    Bulletproof explores the changing face of the SIEM industry and the evolving threat landscape it strives to counter. The seminar includes a case study of how to...

    • Language: English

  • A Journey of Self Driven Security Training

    Wednesday14:15 - 14:3005 Jun 2019
    Cyber Innovation Showcase

    This talk details a course of progression from engineer to security advocate, highlighting the importance of self driven teaching methodologies, the increased a...

    • Language: English

  • Phishing & OOB Exfiltration Through Purple Tinted Glasses

    Wednesday14:15 - 15:0005 Jun 2019
    Geek Street

    The proliferation of client-side attacks continues to grow, as attackers are increasingly aware their chances of success are increased if they can get the victi...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Wednesday14:40 - 15:0505 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • How to Optimise Investment in Cybersecurity Tools, Technologies & Products

    Wednesday14:40 - 15:3005 Jun 2019
    Keynote Stage

    Panel Discussion - CISOs in Conversation Peddling fear, uncertainty and doubt is a criticism that is frequently levelled at information security vendors with a...

    • Language: English

  • Champagne CISO: Crisis Comms: How to Handle a Crisis in Front of the Media

    Wednesday15:00 - 16:3005 Jun 2019
    Leaders Programme

    Even at the most well-run companies things can go wrong, and when a crisis strikes your reputation is at stake. How you prepare for a crisis and implement a cr...

    • Language: English

  • National or Sectorial Cybersecurity Capability Build-Out: Capability Assessments, CSIRT/SOCs, Threat Landscapes & CIIs

    Wednesday15:15 - 15:4505 Jun 2019
    Talking Tactics

    The session will cover cybersecurity capability build-out via cybersecurity capability assessment, establishment of cybersecurity framework, role of threat land...

    • Language: English

  • Cryptojacking: The Ghost of Cloud Security

    Wednesday15:20 - 15:4505 Jun 2019
    Tech Talks

    A new threat called cryptojacking that illicitly mines cryptocurrency was first documented on CBS’s showtime networks in late 2017. By mid-2018, cryptojacking h...

    • Language: English

  • From Liability to Asset: The Role DNS Should Be Playing in Your Security Architecture & Operations

    Wednesday15:20 - 15:4505 Jun 2019
    Technology Showcase

    DNS is a ubiquitous network service which has a front row seat when it comes to malware activities. Most organisations neglect to consider the scale and simplic...

    • Language: English

  • Unleash the Power of Your SOC: How to Measure Effectiveness & Mature Your Capabilities

    Wednesday15:30 - 16:3005 Jun 2019
    Information Security Exchange

    Despite the average organisation deploying dozens of security tools and products, major breaches are still happening.  In order to reduce the risk of experienc...

    • Language: English

  • How to Become APT-Proof in 24 Hours

    Wednesday15:55 - 16:2005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Organisations like yours are investing $15 million annually in information security. They’re doing everything right. From perimeter secur...

    • Language: English

  • Navigating Complex Regulatory Oversight to Ensure Privacy, Security & Compliance

    Wednesday16:40 - 17:3005 Jun 2019
    Keynote Stage

    Panel Discussion Regulatory risk is a key challenge for organisations with the threat of huge fines in the event of a breach. Whilst GDPR is still forefront of...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.