Your Search

 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 24 of 27 results

|

Items per page:

Sort By
  • Workshop 3: CISSP Preview: A Risk Based Approach to Security

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Risk and security remain inextricably linked, this workshop examines practical approaches to the effective management of this important relationship, including ...

    • Language: English

  • Workshop 2: Stressless ISMS: How Shakespeare Helps When Setting Up an ISMS

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    The session will contain two parts, one in which practical aspects of how to set up and run a certified ISMS are explained and another containing examples of se...

    • Language: English

  • Workshop 1: The 3Ps of Third Party Risk: Prevention, Policies, Promises

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Independent research revealed that while 60% of firms have formal third party risk policies, nearly half have experienced a significant breach caused by a vendo...

    • Language: English

  • Workshop 4: Tales from the SOC

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Let Neustar take you through the key workings of our world class SOC. Learn how we mitigate attacks of all shapes and sizes. Get an overview of the types of att...

    • Language: English

  • Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions

    Tuesday10:00 - 10:2504 Jun 2019
    Strategy Talks

    Wishful thinking won’t protect your data and systems. Without understanding two key psychological constructs, motivated reasoning and decision fatigue, people w...

    • Language: English

  • What’s New with the ePrivacy Regulation? Key Considerations for Tomorrow’s Electronic Communications

    Tuesday11:15 - 11:4504 Jun 2019
    Talking Tactics

    The ePrivacy Regulation will have a profound effect on marketing activities moving forward. Faced with the legal and financial ramifications of ignoring a consu...

    • Language: English

  • Workshop 1: Hacked! How to Detect, Investigate & Respond to an Advanced Cyber-Attack

    Tuesday14:00 - 16:0004 Jun 2019
    Security Workshop

    “How did this happen?!” When a serious cyber-breach is detected, questions usually outnumber answers. Two seasoned Bitdefender experts will take you on a journe...

    • Language: English

  • Workshop 3: CISSP Preview: An Introduction to Encryption

    Tuesday14:00 - 16:0004 Jun 2019
    Security Workshop

    Encryption is critical to protection of information assets at rest and in transit, this accessible introduction to encryption reviews key concepts, technologies...

    • Language: English

  • Workshop 4: LIVE Security Pentest: Exploring the Limitations of 802.1x and Beyond

    Tuesday14:00 - 16:0004 Jun 2019
    Security Workshop

    Dive into the reality of today’s heterogeneous networks in large enterprises – In this workshop, we will highlight the challenges these networks are facing and ...

    • Language: English

  • Workshop 2: Discover the Secrets of the SOC & How to Build a Threat Hunting Team

    Tuesday14:00 - 16:0004 Jun 2019
    Security Workshop

    In the first half of this interactive workshop, we’ll talk about what goes into making a SOC work effectively. As well as providing the core monitoring and inci...

    • Language: English

  • Women in Cybersecurity

    Wednesday08:30 - 11:0005 Jun 2019
    Women in Cybersecurity

    Infosecurity Magazine’s Women in Cybersecurity Networking Event Infosecurity Magazine’s third annual Women in Cybersecurity networking event at Infosecurity Eu...

    • Language: English

  • Workshop 2: Speed & Precision: The Keys to Stopping Modern Adversarie

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight an...

    • Language: English

  • Workshop 1: From White House Email Prankster to White Hat Researcher: How Cyber Gangs Operate & How Businesses Can Protect Against Email Threats

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    SINON_REBORN was once an email prankster that fooled the White House, but now he hunts criminal email gangs. Learn his techniques from both sides of the coin to...

    • Language: English

  • Workshop 3: Is AI the Answer to Reducing Cyber-Attack Risks?

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    The media makes sensationalistic claims about AI. Is it a rising trend or just a buzzword? Trendy or not, Cisco has been using AI for years to help businesses ...

    • Language: English

  • Workshop 4: Threat Hunting Workshop

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    Join your peers and other security experts for our interactive Threat Hunting Workshop. After the workshop, you'll walk away with an in-depth knowledge on how ...

    • Language: English

  • Why do Software Flaws Persist so Long After Being Discovered?

    Wednesday12:00 - 12:2505 Jun 2019
    Strategy Talks

    It takes time to fix security flaws. But developers simply can’t wave a magic wand over the portfolio to fix the majority of flaws in an instant, or even a week...

    • Language: English

  • Whose Transformation is it Anyway? How IT Security Teams can Support Digital Services

    Wednesday13:00 - 14:0005 Jun 2019
    Information Security Exchange

    Ask any CIO what phrase they have been asked about most often in the past year, and digital transformation is probably the most common response. Digital transfo...

    • Language: English (United Kingdom)

  • Workshop 1: With Your Head in the Cloud? Zero Trust Secure Access is Here to Help!

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    Rohini Kasturi, Chief Development Officer with Pulse Secure shares his vision on Zero Trust Secure Access Harvey Durrant, ICT Strategist, shares his vision o...

    • Language: English

  • Workshop 2: Speed & Precision: The Keys to Stopping Modern Adversarie

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight an...

    • Language: English

  • Workshop 3: Discover the Secrets of the SOC & How to Build a Threat Hunting Team

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    In the first half of this interactive workshop, we’ll talk about what goes into making a SOC work effectively. As well as providing the core monitoring and inci...

    • Language: English

  • Why Vulnerability Management Fails

    Wednesday14:00 - 14:2505 Jun 2019
    Technology Showcase

    Every wonder why so many companies struggle to manage vulnerabilities? Do you bang your head against your desk every time the security team hands you a new list...

    • Language: English

  • Workshop 4: Secure Programming in Java

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    A 2017 study conducted by DevOps.com found that 76% of developers indicated security and secure development education needed for today’s world of coding is miss...

    • Language: English

  • Why Artificial Intelligence Doesn't Work & Other Cybersecurity Failed Technologies

    Wednesday16:00 - 16:2505 Jun 2019
    Strategy Talks

    As the hype and talk of AI increases and with many organisations now claiming to have adopted AI capabilities in-house, Ian Mann discusses why Artificial Intell...

    • Language: English

  • Workshop 1: Illuminating the Dark Web

    Thursday10:00 - 12:0006 Jun 2019
    Security Workshop

    This workshop will provide an introduction and practical demonstration of the dark web. We will start by defining the dark web and the notion of anonymity, lea...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.