Your Search

  • Date

    • 5th June 2019 (Wednesday) Remove
  • Company Size

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 55 results

|

Items per page:

Sort By
  • Keynote Briefing: The Power of People: Amplifying our Human Capacity Through Technology & Community

    Wednesday08:15 - 09:3005 Jun 2019
    Keynote Stage

    IMPORTANT: This session is only open to people who have pre-registered and confirmed their participation as numbers are limited.   People are being empowered th...

    • Language: English

  • Women in Cybersecurity

    Wednesday08:30 - 11:0005 Jun 2019
    Women in Cybersecurity

    Infosecurity Magazine’s Women in Cybersecurity Networking Event Infosecurity Magazine’s third annual Women in Cybersecurity networking event at Infosecurity Eu...

    • Language: English

  • Workshop 2: Speed & Precision: The Keys to Stopping Modern Adversarie

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight an...

    • Language: English

  • How to Monitor & Protect Your Network Using NetFlow/IPFIX Data

    Wednesday10:00 - 10:2505 Jun 2019
    Technology Showcase

    A fast, reliable and well secured network is of crucial importance to any organisation. Flowmon is the answer to this challenge using leading edge IP flow monit...

    • Language: English

  • Workshop 3: Is AI the Answer to Reducing Cyber-Attack Risks?

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    The media makes sensationalistic claims about AI. Is it a rising trend or just a buzzword? Trendy or not, Cisco has been using AI for years to help businesses ...

    • Language: English

  • The Zero-Trust Approach for Your Alert Haystack

    Wednesday10:00 - 10:2505 Jun 2019
    Tech Talks

    Current approaches for SOC automation are focused on making alerts more consumable and running playbooks, but ultimately defenders run the risk of having their ...

    • Language: English

  • Demystifying Intelligence-Led Red Teaming: What It Is & How to Automate It

    Wednesday10:00 - 10:2505 Jun 2019
    Strategy Talks

    On May 2018, the European Central Bank published the TIBER-EU, a framework for testing financial sector resilience to cyber attacks. TIBER-EU framework puts an...

    • Language: English

  • Zero Trust: What Does it Mean for the CISO?

    Wednesday10:30 - 11:3005 Jun 2019
    Information Security Exchange

    Adopting Zero Trust is an often-repeated phrase in the security industry, and it is growing in popularity.  Set against this is the increasing pressure on the C...

    • Language: English

  • The Future of Authentication

    Wednesday10:30 - 10:4505 Jun 2019
    Cyber Innovation Showcase

    Data leaks and password thefts have proven that password-based authentication approach is inadequate to preserve security and privacy for IT systems. Behavioura...

    • Language: English

  • Managing the Insider Threat: Why Visibility is Critical

    Wednesday10:30 - 11:0005 Jun 2019
    Talking Tactics

    Ponemon research shows that the average time to spot and contain an insider threat is 72 days - only 16% of incidents are identified and contained within 30 day...

    • Language: English

  • Trust No One & Suspect Everyone: Zero Trust Security Model

    Wednesday10:30 - 11:1505 Jun 2019
    Insight Stage

    Identity & Access Management A threat is a threat—whether intentional or not—and the human factor that lends itself to malicious behaviour or inadvertent error...

    • Language: English

  • Deep Dive: Using Artificial Intelligence to Impersonate a Human & Undertake Vishing Attacks

    Wednesday10:30 - 11:1505 Jun 2019
    Geek Street

    Hear no Evil see no Evil; How an AI system was developed that could disguise itself as a human and deceive people. How did this work, what could it achieve? In ...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.