Your Search

  • Topic Area

    • Threats, exploits and vulnerabilities Remove
  • Company Size

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 38 of 38 results

|

Items per page:

Sort By
  • The “Industrial Revolution” of Penetration Testing

    Tuesday10:00 - 10:2504 Jun 2019
    Technology Showcase

    With the increasing exploits and tools hackers use to gain access to a company's IT infrastructure, the need to combat them grows more and more. Automated Penet...

    • Language: English

  • Workshop 1: The 3Ps of Third Party Risk: Prevention, Policies, Promises

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Independent research revealed that while 60% of firms have formal third party risk policies, nearly half have experienced a significant breach caused by a vendo...

    • Language: English

  • Cyber Essentials Plus: Driving Adoption & Raising the Bar

    Tuesday10:05 - 10:2004 Jun 2019
    Cyber Innovation Showcase

    Download Presentation The majority of common cyber attacks would be prevented by adherence to the 5 controls of the Cyber Essentials Scheme. And yet, despite t...

    • Language: English

  • A Journey of Self Driven Security Training

    Tuesday10:55 - 11:1004 Jun 2019
    Cyber Innovation Showcase

    This talk details a course of progression from engineer to security advocate, highlighting the importance of self driven teaching methodologies, the increased a...

    • Language: English

  • Radical Innovation in Security: A Game-Changing Review of Security Techniques & Outcomes

    Tuesday11:20 - 11:4504 Jun 2019
    Strategy Talks

    Self driving cars, artificial intelligence, smart speakers, Internet of Things, the “race to digitise” and the rapid move toward hyper-connectivity is introduci...

    • Language: English

  • Malware, Security Analytics & Cybersecurity in 2019

    Tuesday12:00 - 12:2504 Jun 2019
    Technology Showcase

    Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decade...

    • Language: English

  • "Yes We Can Get In. Now What?"

    Tuesday12:00 - 12:2504 Jun 2019
    Tech Talks

    The results of a red-team test (or breach) can be a thunderclap under a clear blue sky. The recommendations might look idealistic and expensive. Management migh...

    • Language: English

  • The Inside Story Behind VTech Storio Max Vulnerability - CVE-2018-16618

    Tuesday13:00 - 13:4504 Jun 2019
    Geek Street

    SureCloud's Senior Security Consultant will be discussing a critical disclosure discovered on the children's VTech Storio Max tablet, which allowed attackers fu...

    • Language: English

  • DNS: Cybersecurity’s Best Kept Secret for Eliminating Network Threats

    Tuesday13:00 - 14:0004 Jun 2019
    Information Security Exchange

    Growing numbers of cyber threats and volumes of data are creating significant problems. Stretched security teams need to keep networks secure, yet still cope wi...

    • Language: English

  • Securing SMEs Symposium

    Tuesday14:00 - 16:3004 Jun 2019
    Securing SMEs Symposium

    Implementing Information Security Controls to Manage Risk in the SME When: Tuesday 4th June, 14.00-16.30 Where: Pillar Hall, Olympia The 2018 Verizon Data Br...

    • Language: English

  • Cybercriminal Abuse in European IP Space

    Tuesday14:15 - 15:0004 Jun 2019
    Geek Street

    Through concrete use cases and practical examples we will learn how to track criminal hosting infrastructures and we will understand the taxonomy and business m...

    • Language: English

  • How Financial Companies Can Starve Attackers Who Live off the Land

    Tuesday14:30 - 15:1504 Jun 2019
    Insight Stage

    Securing Finance Cyberattackers and malicious insiders increasingly rely on living-off-the-land techniques. Leveraging native connectivity to move through the ...

    • Language: English

  • 10 Ways to Stop Phishing Attacks

    Tuesday14:30 - 15:0004 Jun 2019
    Talking Tactics

    77% of phishing attacks in 2018 targeted financial institutions and phishing sites now use SSL certificates and HTTPS to trick your Internet users. Unsurprising...

    • Language: English

  • The More We Share, the More Resilient We Are: Why Threat Intelligence is the Future of Cybersecurity

    Tuesday14:40 - 15:0504 Jun 2019
    Tech Talks

    Sharing threat intelligence can be the difference in a company bouncing back from or suffering through a cyberattack, perhaps never recovering. The future of en...

    • Language: English

  • Two Attacks for the Price of One? Defending Against Multi-Intent Malware

    Tuesday15:20 - 15:4504 Jun 2019
    Tech Talks

    Malware engineers are diversifying their businesses with multi-intent malware, where a single successful compromise can open up multiple streams of revenue. In ...

    • Language: English

  • Scamming you at Infosec? Easy.

    Tuesday16:30 - 16:5504 Jun 2019
    Cyber Innovation Showcase

    You may know a thing or two about cybersecurity. However, modern hackers are sophisticated, risk-calculating, online marketing experts who take social engineeri...

    • Language: English

  • Workshop 2: Speed & Precision: The Keys to Stopping Modern Adversarie

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight an...

    • Language: English

  • How to Monitor & Protect Your Network Using NetFlow/IPFIX Data

    Wednesday10:00 - 10:2505 Jun 2019
    Technology Showcase

    A fast, reliable and well secured network is of crucial importance to any organisation. Flowmon is the answer to this challenge using leading edge IP flow monit...

    • Language: English

  • Trust No One & Suspect Everyone: Zero Trust Security Model

    Wednesday10:30 - 11:1505 Jun 2019
    Insight Stage

    Identity & Access Management A threat is a threat—whether intentional or not—and the human factor that lends itself to malicious behaviour or inadvertent error...

    • Language: English

  • Deep Dive: Using Artificial Intelligence to Impersonate a Human & Undertake Vishing Attacks

    Wednesday10:30 - 11:1505 Jun 2019
    Geek Street

    Hear no Evil see no Evil; How an AI system was developed that could disguise itself as a human and deceive people. How did this work, what could it achieve? In ...

    • Language: English

  • Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

    Wednesday10:40 - 11:0505 Jun 2019
    Technology Showcase

    Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuf...

    • Language: English

  • The Battle to Protect Public Services Against Phishing Attacks

    Wednesday12:00 - 12:3005 Jun 2019
    Talking Tactics

    A growing priority for Nikola Howard, Data Centre Manager at the London Borough of Camden, has been the need to keep employee and residents’ inboxes safe from t...

    • Language: English

  • Malware, Security Analytics & Cybersecurity in 2019

    Wednesday12:40 - 13:0505 Jun 2019
    Technology Showcase

    Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decade...

    • Language: English

  • ZTE Router Vulnerabilities: A Demonstration on the Security Risks of the IoT

    Wednesday13:00 - 13:4505 Jun 2019
    Geek Street

    Positive Technologies researchers have discovered a number of vulnerabilities in a ZTE wifi router, used by 750-800 thousand devices globally. This presentation...

    • Language: English

  • Cyber Essentials Plus: Driving Adoption & Raising the Bar

    Wednesday13:25 - 13:4005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation The majority of common cyber attacks would be prevented by adherence to the 5 controls of the Cyber Essentials Scheme. And yet, despite t...

    • Language: English

  • Workshop 2: Speed & Precision: The Keys to Stopping Modern Adversarie

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight an...

    • Language: English

  • Why Vulnerability Management Fails

    Wednesday14:00 - 14:2505 Jun 2019
    Technology Showcase

    Every wonder why so many companies struggle to manage vulnerabilities? Do you bang your head against your desk every time the security team hands you a new list...

    • Language: English

  • Workshop 4: Secure Programming in Java

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    A 2017 study conducted by DevOps.com found that 76% of developers indicated security and secure development education needed for today’s world of coding is miss...

    • Language: English

  • Evolution or Revolution: What Has SIEM Become?

    Wednesday14:15 - 15:1505 Jun 2019
    Information Security Exchange

    Bulletproof explores the changing face of the SIEM industry and the evolving threat landscape it strives to counter. The seminar includes a case study of how to...

    • Language: English

  • A Journey of Self Driven Security Training

    Wednesday14:15 - 14:3005 Jun 2019
    Cyber Innovation Showcase

    This talk details a course of progression from engineer to security advocate, highlighting the importance of self driven teaching methodologies, the increased a...

    • Language: English

  • Phishing & OOB Exfiltration Through Purple Tinted Glasses

    Wednesday14:15 - 15:0005 Jun 2019
    Geek Street

    The proliferation of client-side attacks continues to grow, as attackers are increasingly aware their chances of success are increased if they can get the victi...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Wednesday14:40 - 15:0505 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • How to Optimise Investment in Cybersecurity Tools, Technologies & Products

    Wednesday14:40 - 15:3005 Jun 2019
    Keynote Stage

    Panel Discussion - CISOs in Conversation Peddling fear, uncertainty and doubt is a criticism that is frequently levelled at information security vendors with a...

    • Language: English

  • How to Become APT-Proof in 24 Hours

    Wednesday15:55 - 16:2005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Organisations like yours are investing $15 million annually in information security. They’re doing everything right. From perimeter secur...

    • Language: English

  • Rise of the Breaches

    Thursday11:20 - 12:1006 Jun 2019
    Keynote Stage

    Infosecurity Hall of Fame Annual Lecture Data breaches are the new normal. We’ve created ecosystems with so many moving parts and so many complex units, it’s l...

    • Language: English

  • Prevention: The Strategic Element in Your Security Stack

    Thursday12:40 - 13:0506 Jun 2019
    Technology Showcase

    Security architecture can be broken down into three main elements: Prevention, detection and remediation. Prevention can be considered the most strategically im...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Thursday13:20 - 13:4506 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • Growing Your New Cybersecurity Business

    Thursday14:00 - 15:3006 Jun 2019
    FutureSec

    Innovation: Technologies, start-ups, cyber business growth Growing Your New Cybersecurity Business Are you a new start-up looking at how to grow your business...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.