Your Search

  • Topic Area

    • Security architecture & engineering Remove
  • Company Size

  • Type of Content

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 11 of 11 results

|

Items per page:

Sort By
  • Embracing Zero Trust

    Tuesday10:30 - 11:3004 Jun 2019
    Information Security Exchange

    In 2014, Google published “BeyondCorp: A New Approach to Enterprise Security” detailing their implementation of Zero Trust networks and the industry was aflutte...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Tuesday15:05 - 15:2004 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding rout...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Wednesday11:45 - 12:0005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding rout...

    • Language: English

  • Whose Transformation is it Anyway? How IT Security Teams can Support Digital Services

    Wednesday13:00 - 14:0005 Jun 2019
    Information Security Exchange

    Ask any CIO what phrase they have been asked about most often in the past year, and digital transformation is probably the most common response. Digital transfo...

    • Language: English (United Kingdom)

  • Workshop 1: With Your Head in the Cloud? Zero Trust Secure Access is Here to Help!

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    Rohini Kasturi, Chief Development Officer with Pulse Secure shares his vision on Zero Trust Secure Access Harvey Durrant, ICT Strategist, shares his vision o...

    • Language: English

  • How to Optimise Investment in Cybersecurity Tools, Technologies & Products

    Wednesday14:40 - 15:3005 Jun 2019
    Keynote Stage

    Panel Discussion - CISOs in Conversation Peddling fear, uncertainty and doubt is a criticism that is frequently levelled at information security vendors with a...

    • Language: English

  • From Liability to Asset: The Role DNS Should Be Playing in Your Security Architecture & Operations

    Wednesday15:20 - 15:4505 Jun 2019
    Technology Showcase

    DNS is a ubiquitous network service which has a front row seat when it comes to malware activities. Most organisations neglect to consider the scale and simplic...

    • Language: English

  • Security by Design: Securing Software & Hardware Design & Development

    Wednesday15:45 - 16:2505 Jun 2019
    Keynote Stage

    As connectivity increases and IoT devices proliferate, building security into the design and development process has never been more critical. And yet the rapid...

    • Language: English

  • Effective Steps to Reduce Third-Party Risk

    Thursday11:15 - 11:4506 Jun 2019
    Talking Tactics

    As organisations struggle to protect themselves from the seemingly ubiquitous threat of cyberattack, the concept of risk management becomes all the more importa...

    • Language: English

  • Enabling Through-Life ISMS Value

    Thursday14:00 - 14:2506 Jun 2019
    Technology Showcase

    The SABSA Methodology is well regarded for Enterprise Security Architecture, but how can it benefit the implementation and operation of a security program withi...

    • Language: English

  • Zero Trusted Networks or: Why Perimeter Security is Dead

    Thursday14:05 - 14:3006 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Traditional IT network security is based on perimeter security. Perimeter security makes it hard to obtain access to the network, but eve...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.