Your Search

  • Company Size

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 16 of 16 results

|

Items per page:

Sort By
  • Cryptojacking: What You Need to Know

    Tuesday10:00 - 10:2504 Jun 2019
    Tech Talks

    In his talk, Chris Marrison, Consulting Solutions Architect at Infoblox, will provide a brief yet informative history on everything ‘crypto’, including crypto c...

    • Language: English

  • Cyber Essentials Plus: Driving Adoption & Raising the Bar

    Tuesday10:05 - 10:2004 Jun 2019
    Cyber Innovation Showcase

    Download Presentation The majority of common cyber attacks would be prevented by adherence to the 5 controls of the Cyber Essentials Scheme. And yet, despite t...

    • Language: English

  • Cybersecurity for CNI & II Symposium

    Tuesday10:15 - 12:5004 Jun 2019
    Cybersecurity for CNI & II Symposium

    Building Cyber Resilience in Critical National Infrastructure & Industrial Infrastructure When: Tuesday 4th June, 10.15-12.50 Where: Pillar Hall, Olympia As ...

    • Language: English

  • Cyber Threat Intelligence & Criminal Innovation

    Tuesday10:40 - 11:0504 Jun 2019
    Strategy Talks

    In this talk Max Vetter will explore the innovative nature of cyber criminals and demonstrate why they are consistently ahead of the game. He will also introduc...

    • Language: English

  • Cybercriminal Abuse in European IP Space

    Tuesday14:15 - 15:0004 Jun 2019
    Geek Street

    Through concrete use cases and practical examples we will learn how to track criminal hosting infrastructures and we will understand the taxonomy and business m...

    • Language: English

  • Combating Open Source Security Vulnerabilities Without Slowing Down Developers

    Tuesday16:00 - 16:2504 Jun 2019
    Tech Talks

    Development teams are facing nowadays an unprecedented challenge to accommodate requirements of application security while maintaining an agile development proc...

    • Language: English

  • Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

    Wednesday10:40 - 11:0505 Jun 2019
    Technology Showcase

    Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuf...

    • Language: English

  • Challenges in Securing Open Source Components

    Wednesday13:20 - 13:4505 Jun 2019
    Technology Showcase

    Open Source Components can provide a huge advantage for software developers in terms of speed of delivery and range of functionality but they can also represent...

    • Language: English

  • Cyber Essentials Plus: Driving Adoption & Raising the Bar

    Wednesday13:25 - 13:4005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation The majority of common cyber attacks would be prevented by adherence to the 5 controls of the Cyber Essentials Scheme. And yet, despite t...

    • Language: English

  • Champagne CISO: Crisis Comms: How to Handle a Crisis in Front of the Media

    Wednesday15:00 - 16:3005 Jun 2019
    Leaders Programme

    Even at the most well-run companies things can go wrong, and when a crisis strikes your reputation is at stake. How you prepare for a crisis and implement a cr...

    • Language: English

  • Cryptojacking: The Ghost of Cloud Security

    Wednesday15:20 - 15:4505 Jun 2019
    Tech Talks

    A new threat called cryptojacking that illicitly mines cryptocurrency was first documented on CBS’s showtime networks in late 2017. By mid-2018, cryptojacking h...

    • Language: English

  • Cyber Defence 2019: An Overview of HIDS, NIDS & IPS Systems

    Wednesday15:30 - 16:1505 Jun 2019
    Geek Street

    This presentation will introduce you to cyber intrusion tools that help to prevent cyber intrusions threats from entering and harming your network. I will prese...

    • Language: English

  • Cloud Key Management for Multinational Regulations

    Wednesday16:00 - 16:3005 Jun 2019
    Talking Tactics

    Understand strategies for key management architectures for cloud based applications that meet the needs of multinational corporations for GDPR, data privacy, da...

    • Language: English

  • Cyber Resilience In the Face of Human Error

    Thursday10:30 - 11:3006 Jun 2019
    Information Security Exchange

    Cybersecurity has become the new battlefront amongst nations, enterprises, and individuals. This has led to the understanding and realisation that nothing is im...

    • Language: English

  • Case Study: Lessons Learned from the NotPetya Cyber-Attack

    Thursday12:25 - 13:1506 Jun 2019
    Keynote Stage

    In 2017 to NotPetya ransomware attack wreaked havoc on a range of global businesses including law firms, supermarkets and pharmaceuticals. The attack had a huge...

    • Language: English

  • Cloud Risk Decoder Ring: Shared Responsibility & Ways to Avoid Self-Inflicted Harm

    Thursday14:15 - 15:1506 Jun 2019
    Information Security Exchange

    With continuing cloud data breach headlines, IT and Security teams are experiencing the painful nuances of the shared responsibility model. With a new set of te...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.