Your Search

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 10 of 10 results

|

Items per page:

Sort By
  • Digitalisation & the Cyber INsecurity Gap

    Tuesday10:40 - 11:0504 Jun 2019
    Technology Showcase

    79% of executives report their organisation is adopting new technologies faster than they can address security issues. As companies rely more on digital IT, clo...

    • Language: English

  • DNS: Cybersecurity’s Best Kept Secret for Eliminating Network Threats

    Tuesday13:00 - 14:0004 Jun 2019
    Information Security Exchange

    Growing numbers of cyber threats and volumes of data are creating significant problems. Stretched security teams need to keep networks secure, yet still cope wi...

    • Language: English

  • Death of the Password: Picture Authentication

    Tuesday16:40 - 17:0504 Jun 2019
    Technology Showcase

    Say goodbye to passwords! PixelPin offers an alternative authentication method to traditional passwords and biometrics, by utilising pictures to create a deligh...

    • Language: English

  • Demystifying Intelligence-Led Red Teaming: What It Is & How to Automate It

    Wednesday10:00 - 10:2505 Jun 2019
    Strategy Talks

    On May 2018, the European Central Bank published the TIBER-EU, a framework for testing financial sector resilience to cyber attacks. TIBER-EU framework puts an...

    • Language: English

  • Deep Dive: Using Artificial Intelligence to Impersonate a Human & Undertake Vishing Attacks

    Wednesday10:30 - 11:1505 Jun 2019
    Geek Street

    Hear no Evil see no Evil; How an AI system was developed that could disguise itself as a human and deceive people. How did this work, what could it achieve? In ...

    • Language: English

  • Don’t Acquire Your Next Breach: Managing Vendor Risk Under the GDPR

    Wednesday11:45 - 12:4505 Jun 2019
    Information Security Exchange

    Managing vendor risk before, during and after onboarding is a continuous effort under the GDPR and impending data protection regulations. While outsourcing oper...

    • Language: English

  • Dissecting Today’s Attacks to See the Future of Cybersecurity

    Wednesday14:40 - 15:0505 Jun 2019
    Strategy Talks

    Dissecting the current threat landscape and analysing major data breaches from the last decade, this session explores how these insights can help us predict the...

    • Language: English

  • Data Security Made Simple: Share, Work, & Protect

    Wednesday16:00 - 16:2505 Jun 2019
    Technology Showcase

    Data security is not an easy topic for enterprises—big or small—to tackle. From identifying the requirements and needs for compliance to actually implementing t...

    • Language: English

  • Device Authentication with ICMetrics

    Thursday10:00 - 10:2506 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Current secure device authentication and encryption technology has serious limitations in assuring the identity of a given device and its...

    • Language: English

  • Defeat Ransomware: Leveraging ATP & Machine Learning to Orchestrate a Synchronised Cybersecurity Environment Across Endpoint & Email

    Thursday11:10 - 11:3506 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Join us to hear Sam Mayne speak about our advanced threat protection engines. Learn about the current cybersecurity threat landscape and ...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.