Your Search

  • Topic Area

    • Threats, exploits and vulnerabilities Remove
  • Company Size

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 38 results

|

Items per page:

Sort By
  • The “Industrial Revolution” of Penetration Testing

    Tuesday10:00 - 10:2504 Jun 2019
    Technology Showcase

    With the increasing exploits and tools hackers use to gain access to a company's IT infrastructure, the need to combat them grows more and more. Automated Penet...

    • Language: English

  • Workshop 1: The 3Ps of Third Party Risk: Prevention, Policies, Promises

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Independent research revealed that while 60% of firms have formal third party risk policies, nearly half have experienced a significant breach caused by a vendo...

    • Language: English

  • Cyber Essentials Plus: Driving Adoption & Raising the Bar

    Tuesday10:05 - 10:2004 Jun 2019
    Cyber Innovation Showcase

    Download Presentation The majority of common cyber attacks would be prevented by adherence to the 5 controls of the Cyber Essentials Scheme. And yet, despite t...

    • Language: English

  • A Journey of Self Driven Security Training

    Tuesday10:55 - 11:1004 Jun 2019
    Cyber Innovation Showcase

    This talk details a course of progression from engineer to security advocate, highlighting the importance of self driven teaching methodologies, the increased a...

    • Language: English

  • Radical Innovation in Security: A Game-Changing Review of Security Techniques & Outcomes

    Tuesday11:20 - 11:4504 Jun 2019
    Strategy Talks

    Self driving cars, artificial intelligence, smart speakers, Internet of Things, the “race to digitise” and the rapid move toward hyper-connectivity is introduci...

    • Language: English

  • Malware, Security Analytics & Cybersecurity in 2019

    Tuesday12:00 - 12:2504 Jun 2019
    Technology Showcase

    Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decade...

    • Language: English

  • "Yes We Can Get In. Now What?"

    Tuesday12:00 - 12:2504 Jun 2019
    Tech Talks

    The results of a red-team test (or breach) can be a thunderclap under a clear blue sky. The recommendations might look idealistic and expensive. Management migh...

    • Language: English

  • The Inside Story Behind VTech Storio Max Vulnerability - CVE-2018-16618

    Tuesday13:00 - 13:4504 Jun 2019
    Geek Street

    SureCloud's Senior Security Consultant will be discussing a critical disclosure discovered on the children's VTech Storio Max tablet, which allowed attackers fu...

    • Language: English

  • DNS: Cybersecurity’s Best Kept Secret for Eliminating Network Threats

    Tuesday13:00 - 14:0004 Jun 2019
    Information Security Exchange

    Growing numbers of cyber threats and volumes of data are creating significant problems. Stretched security teams need to keep networks secure, yet still cope wi...

    • Language: English

  • Securing SMEs Symposium

    Tuesday14:00 - 16:3004 Jun 2019
    Securing SMEs Symposium

    Implementing Information Security Controls to Manage Risk in the SME When: Tuesday 4th June, 14.00-16.30 Where: Pillar Hall, Olympia The 2018 Verizon Data Br...

    • Language: English

  • Cybercriminal Abuse in European IP Space

    Tuesday14:15 - 15:0004 Jun 2019
    Geek Street

    Through concrete use cases and practical examples we will learn how to track criminal hosting infrastructures and we will understand the taxonomy and business m...

    • Language: English

  • How Financial Companies Can Starve Attackers Who Live off the Land

    Tuesday14:30 - 15:1504 Jun 2019
    Insight Stage

    Securing Finance Cyberattackers and malicious insiders increasingly rely on living-off-the-land techniques. Leveraging native connectivity to move through the ...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.