Your Search

  • Date

    • 6th June 2019 (Thursday) Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

25 - 36 of 52 results

|

Items per page:

Sort By
  • State of Cybersecurity Report v2: Stats, Views & the Year in Infosec

    Thursday12:00 - 12:3006 Jun 2019
    Talking Tactics

    Last year Infosecurity Magazine conducted industry research to determine the driving trends in cybersecurity. In 2019, we did this again with a larger sample se...

    • Language: English

  • This is (Probably) a Drill: How to "Assume Compromise"

    Thursday12:00 - 12:2506 Jun 2019
    Strategy Talks

    Discover the value of running IR table top exercises. Learn how to run incident response readiness drills customised for your own enterprise. Takeaway the metho...

    • Language: English

  • Hunting for Zero-Days

    Thursday12:00 - 12:2506 Jun 2019
    Tech Talks

    New vulnerabilities are being found in code daily. Infact, 18,000+ new vulnerabilities are estimated to be disclosed in 2018, with a current growth rate of 27 p...

    • Language: English

  • How Machine Learning Empowers Threat Intelligence to Easily Solve Your Vulnerability Challenge, One Hundred Times Faster

    Thursday12:00 - 12:2506 Jun 2019
    Technology Showcase

    Organisations have too much information in their hands, and not enough contextual intelligence to act upon. One of the complex tasks CISOs and their departments...

    • Language: English

  • Case Study: Lessons Learned from the NotPetya Cyber-Attack

    Thursday12:25 - 13:1506 Jun 2019
    Keynote Stage

    In 2017 to NotPetya ransomware attack wreaked havoc on a range of global businesses including law firms, supermarkets and pharmaceuticals. The attack had a huge...

    • Language: English

  • Prevention: The Strategic Element in Your Security Stack

    Thursday12:40 - 13:0506 Jun 2019
    Technology Showcase

    Security architecture can be broken down into three main elements: Prevention, detection and remediation. Prevention can be considered the most strategically im...

    • Language: English

  • How to Identify and Prevent Evasive Threats Using your Organisation’s Data

    Thursday12:40 - 13:0506 Jun 2019
    Tech Talks

    Stealth operations that were once only possible for the most sophisticated state-actors, are now much more common. These new and sophisticated techniques bring ...

    • Language: English

  • How to Build Business Confidence when Migrating your Most Sensitive Data to the Cloud

    Thursday12:40 - 13:0506 Jun 2019
    Strategy Talks

    Today’s security threats combined with the cost-efficiencies of the cloud have forced businesses to look towards hosted platforms when sharing and managing thei...

    • Language: English

  • Automating Cryptographic Vulnerability Analysis in the CI Toolchain

    Thursday12:45 - 13:1506 Jun 2019
    Talking Tactics

    Accidental deployment of vulnerable cryptography can lead to significant data breaches - like the one that led to Uber paying a $200M fine in 2018. So companies...

    • Language: English

  • The Cloud-First Approach to Sustainable Data Governance

    Thursday13:00 - 14:0006 Jun 2019
    Information Security Exchange

    Businesses are driving an explosion in unstructured data. The volume of global business data doubles every 1.2 years, and unstructured content will soon count f...

    • Language: English

  • Black Mirrors: The Dark Web, The Enterprise & Platform Criminality

    Thursday13:00 - 13:4506 Jun 2019
    Geek Street

    Respected criminologist, Dr. Mike McGuire, delves into the murky world of platform criminality, crossing into the black mirror of the dark web to understand the...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Thursday13:20 - 13:4506 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.