Your Search

  • Date

    • 6th June 2019 (Thursday) Remove
  • Topic Area

    • Threats, exploits and vulnerabilities Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 18 results

|

Items per page:

Sort By
  • Defending the UK: The NCSC Vision for a more Secure UK

    Thursday10:15 - 11:0506 Jun 2019
    Keynote Stage

    Headliner Details to be announced.

    • Language: English

  • Cyber Resilience In the Face of Human Error

    Thursday10:30 - 11:3006 Jun 2019
    Information Security Exchange

    Cybersecurity has become the new battlefront amongst nations, enterprises, and individuals. This has led to the understanding and realisation that nothing is im...

    • Language: English

  • Tales from the Trenches: Reinvent Application Security Testing for DevOps & SecOps

    Thursday10:40 - 11:0506 Jun 2019
    Strategy Talks

    DevOps is a revolution starting to deliver. The “shift left” security approach is trying to catch up, but challenges remain. We will go over concrete security a...

    • Language: English

  • Effective Steps to Reduce Third-Party Risk

    Thursday11:15 - 11:4506 Jun 2019
    Talking Tactics

    As organisations struggle to protect themselves from the seemingly ubiquitous threat of cyberattack, the concept of risk management becomes all the more importa...

    • Language: English

  • How to Detect Malware in Encrypted Traffic, Without Decrypting it, Using Artificial Intelligence

    Thursday11:20 - 11:4506 Jun 2019
    Tech Talks

    The rapid rise of encrypted traffic is changing the threat landscape. It’s reported that as of 2018, nearly half of all Internet traffic is protected by HTTPS a...

    • Language: English

  • Rise of the Breaches

    Thursday11:20 - 12:1006 Jun 2019
    Keynote Stage

    Infosecurity Hall of Fame Annual Lecture Data breaches are the new normal. We’ve created ecosystems with so many moving parts and so many complex units, it’s l...

    • Language: English

  • Multi-Phased Attacks: The 1-2 Punch That Can Knock Your Business Cold

    Thursday11:45 - 12:1006 Jun 2019
    Cyber Innovation Showcase

    Download Presentation In 2019, the volume—and sophistication—of email threats is growing. Phishing is virtually indistinguishable from legitimate communication...

    • Language: English

  • How Machine Learning Empowers Threat Intelligence to Easily Solve Your Vulnerability Challenge, One Hundred Times Faster

    Thursday12:00 - 12:2506 Jun 2019
    Technology Showcase

    Organisations have too much information in their hands, and not enough contextual intelligence to act upon. One of the complex tasks CISOs and their departments...

    • Language: English

  • Case Study: Lessons Learned from the NotPetya Cyber-Attack

    Thursday12:25 - 13:1506 Jun 2019
    Keynote Stage

    In 2017 to NotPetya ransomware attack wreaked havoc on a range of global businesses including law firms, supermarkets and pharmaceuticals. The attack had a huge...

    • Language: English

  • Prevention: The Strategic Element in Your Security Stack

    Thursday12:40 - 13:0506 Jun 2019
    Technology Showcase

    Security architecture can be broken down into three main elements: Prevention, detection and remediation. Prevention can be considered the most strategically im...

    • Language: English

  • How to Identify and Prevent Evasive Threats Using your Organisation’s Data

    Thursday12:40 - 13:0506 Jun 2019
    Tech Talks

    Stealth operations that were once only possible for the most sophisticated state-actors, are now much more common. These new and sophisticated techniques bring ...

    • Language: English

  • Automating Cryptographic Vulnerability Analysis in the CI Toolchain

    Thursday12:45 - 13:1506 Jun 2019
    Talking Tactics

    Accidental deployment of vulnerable cryptography can lead to significant data breaches - like the one that led to Uber paying a $200M fine in 2018. So companies...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.