Your Search

  • Date

    • 6th June 2019 (Thursday) Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

37 - 48 of 52 results

|

Items per page:

Sort By
  • The Price of PKI: The Cost of Mismanagement

    Thursday13:20 - 13:4506 Jun 2019
    Strategy Talks

    Most legitimate certificates cost anywhere between $0 - $2500 per year depending on the level of trust and protection an enterprise is willing to offer. But, ca...

    • Language: English

  • Workshop 3: Re-Thinking the Human Factor

    Thursday13:30 - 15:0006 Jun 2019
    Security Workshop

    People are what make organisations a success. And what makes people such a great success can also make them vulnerable. This is why the human factor is an essen...

    • Language: English

  • Strengthening Collaboration Between Law Enforcement & Business

    Thursday13:30 - 14:1006 Jun 2019
    Keynote Stage

    One of the continuing challenges facing the information security community is the conflicting objectives of law enforcement and business. In the event of a brea...

    • Language: English

  • The Rise of Automated Hacking & the Effect on Your Organisation's Security

    Thursday13:45 - 14:1506 Jun 2019
    Talking Tactics

    The presentation outlines the rise of automated hacking and the consequences for both the attackers and the cyberresilience of an organisation. The landscape of...

    • Language: English

  • Enabling Through-Life ISMS Value

    Thursday14:00 - 14:2506 Jun 2019
    Technology Showcase

    The SABSA Methodology is well regarded for Enterprise Security Architecture, but how can it benefit the implementation and operation of a security program withi...

    • Language: English

  • Growing Your New Cybersecurity Business

    Thursday14:00 - 15:3006 Jun 2019
    FutureSec

    Innovation: Technologies, start-ups, cyber business growth Growing Your New Cybersecurity Business Are you a new start-up looking at how to grow your business...

    • Language: English

  • Overcome the Tech & Politics of Securing Critical National Infrastructure (CNI)

    Thursday14:00 - 14:2506 Jun 2019
    Tech Talks

    The National Cyber Security Centre (NCSC) has warned that hostile states will attempt deadly cyberattacks against UK infrastructure, but argues that the UK gove...

    • Language: English

  • Building Cyber Resilience to Sustained & Persistent Cyberattacks

    Thursday14:00 - 14:2506 Jun 2019
    Strategy Talks

    Threat detection, threat intelligence and threat hunting – Enhancing business resilience to sustained and persistent cyberattacks. The talk will allow organisat...

    • Language: English

  • Zero Trusted Networks or: Why Perimeter Security is Dead

    Thursday14:05 - 14:3006 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Traditional IT network security is based on perimeter security. Perimeter security makes it hard to obtain access to the network, but eve...

    • Language: English

  • Cloud Risk Decoder Ring: Shared Responsibility & Ways to Avoid Self-Inflicted Harm

    Thursday14:15 - 15:1506 Jun 2019
    Information Security Exchange

    With continuing cloud data breach headlines, IT and Security teams are experiencing the painful nuances of the shared responsibility model. With a new set of te...

    • Language: English

  • Building an Intelligent Incident Response Plan: Lessons from the Front Line

    Thursday14:25 - 15:3506 Jun 2019
    Keynote Stage

    Panel Discussion Effective incident response brings together multiple stakeholders who must work together to deal swiftly with the incident. During this sessio...

    • Language: English

  • Automated Defences for DDoS

    Thursday14:30 - 15:0006 Jun 2019
    Talking Tactics

    With over 23 million DDoS weapons being tracked is your current security strategy up to date? Learn about all the latest information and strategies in DDoS dete...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.