Your Search

  • Date

    • 6th June 2019 (Thursday) Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 6 of 6 results

|

Items per page:

Sort By
  • How to Detect Malware in Encrypted Traffic, Without Decrypting it, Using Artificial Intelligence

    Thursday11:20 - 11:4506 Jun 2019
    Tech Talks

    The rapid rise of encrypted traffic is changing the threat landscape. It’s reported that as of 2018, nearly half of all Internet traffic is protected by HTTPS a...

    • Language: English

  • Hardware-Based Mobile Security: Why Is It Important?

    Thursday11:45 - 12:4506 Jun 2019
    Information Security Exchange

    In this session the audience will learn four security principles to apply when choosing or designing secure mobile devices. Regardless of whether you are a buyi...

    • Language: English

  • Hunting for Zero-Days

    Thursday12:00 - 12:2506 Jun 2019
    Tech Talks

    New vulnerabilities are being found in code daily. Infact, 18,000+ new vulnerabilities are estimated to be disclosed in 2018, with a current growth rate of 27 p...

    • Language: English

  • How Machine Learning Empowers Threat Intelligence to Easily Solve Your Vulnerability Challenge, One Hundred Times Faster

    Thursday12:00 - 12:2506 Jun 2019
    Technology Showcase

    Organisations have too much information in their hands, and not enough contextual intelligence to act upon. One of the complex tasks CISOs and their departments...

    • Language: English

  • How to Identify and Prevent Evasive Threats Using your Organisation’s Data

    Thursday12:40 - 13:0506 Jun 2019
    Tech Talks

    Stealth operations that were once only possible for the most sophisticated state-actors, are now much more common. These new and sophisticated techniques bring ...

    • Language: English

  • How to Build Business Confidence when Migrating your Most Sensitive Data to the Cloud

    Thursday12:40 - 13:0506 Jun 2019
    Strategy Talks

    Today’s security threats combined with the cost-efficiencies of the cloud have forced businesses to look towards hosted platforms when sharing and managing thei...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.