Your Search

  • Topic Area

    • Threats, exploits and vulnerabilities Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 11 of 11 results

|

Items per page:

Sort By
  • Cyber Essentials Plus: Driving Adoption & Raising the Bar

    Tuesday10:05 - 10:2004 Jun 2019
    Cyber Innovation Showcase

    Download Presentation The majority of common cyber attacks would be prevented by adherence to the 5 controls of the Cyber Essentials Scheme. And yet, despite t...

    • Language: English

  • CyberThreat: Rethinking Cyber Defence to Combat Complex Risks, Threats & Vulnerabilities

    Tuesday13:55 - 14:5504 Jun 2019
    Keynote Stage

    Panel Discussion As the attack landscape becomes ever more complex as organisations digitise and transform, and cybercriminals use increasingly sophisticated t...

    • Language: English

  • Cybercriminal Abuse in European IP Space

    Tuesday14:15 - 15:0004 Jun 2019
    Geek Street

    Through concrete use cases and practical examples we will learn how to track criminal hosting infrastructures and we will understand the taxonomy and business m...

    • Language: English

  • Cyber-Physical Security: Cyber Risk Management Strategies for Connected OT & IT Networks

    Tuesday16:30 - 17:2504 Jun 2019
    Keynote Stage

    In Conversation Traditionally, IT and OT are separate functions with different priorities – confidentiality and privacy versus safety and availability. Most op...

    • Language: English

  • Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

    Wednesday10:40 - 11:0505 Jun 2019
    Technology Showcase

    Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuf...

    • Language: English

  • Cracking the Complexity Conundrum: How to Secure, Patch & Protect Complex, Dynamic Organisations

    Wednesday12:25 - 13:2505 Jun 2019
    Keynote Stage

    Panel Discussion Enterprises are more dynamic and complex than ever before.  From working practices, agile development and the latest technologies, to multiple...

    • Language: English

  • Cyber Essentials Plus: Driving Adoption & Raising the Bar

    Wednesday13:25 - 13:4005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation The majority of common cyber attacks would be prevented by adherence to the 5 controls of the Cyber Essentials Scheme. And yet, despite t...

    • Language: English

  • Champagne CISO: Crisis Comms: How to Handle a Crisis in Front of the Media

    Wednesday15:00 - 16:3005 Jun 2019
    Leaders Programme

    Even at the most well-run companies things can go wrong, and when a crisis strikes your reputation is at stake. How you prepare for a crisis and implement a cr...

    • Language: English

  • Cryptojacking: The Ghost of Cloud Security

    Wednesday15:20 - 15:4505 Jun 2019
    Tech Talks

    A new threat called cryptojacking that illicitly mines cryptocurrency was first documented on CBS’s showtime networks in late 2017. By mid-2018, cryptojacking h...

    • Language: English

  • Cyber Resilience In the Face of Human Error

    Thursday10:30 - 11:3006 Jun 2019
    Information Security Exchange

    Cybersecurity has become the new battlefront amongst nations, enterprises, and individuals. This has led to the understanding and realisation that nothing is im...

    • Language: English

  • Case Study: Lessons Learned from the NotPetya Cyber-Attack

    Thursday12:25 - 13:1506 Jun 2019
    Keynote Stage

    In 2017 to NotPetya ransomware attack wreaked havoc on a range of global businesses including law firms, supermarkets and pharmaceuticals. The attack had a huge...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.