Your Search

  • Topic Area

  • Type of Content

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 16 results

|

Items per page:

Sort By
  • Devil in the Details: A Reverse Engineering Campaign Across 30 Financial Services Mobile Apps

    Tuesday12:40 - 13:0504 Jun 2019
    Tech Talks

    Following a six-week research study I performed into reverse engineering financial services mobile apps, I am on a world tour unveiling my vulnerability finding...

    • Language: English

  • Bringing Rapid Prototyping to the Threat Model Process

    Tuesday15:30 - 16:1504 Jun 2019
    Geek Street

    Introduction to the Rapid Threat Model Prototyping methodology, a radical departure from standard architectural threat modeling. This new methodology allows sof...

    • Language: English

  • Automate Remote Access Procedures & Configurations

    Tuesday15:55 - 16:2004 Jun 2019
    Cyber Innovation Showcase

    Combis ARA (Automated Remote Access) is a state of the art, unified remote access management solution, that includes: On-line application for remote access re...

    • Language: English

  • The Zero-Trust Approach for Your Alert Haystack

    Wednesday10:00 - 10:2505 Jun 2019
    Tech Talks

    Current approaches for SOC automation are focused on making alerts more consumable and running playbooks, but ultimately defenders run the risk of having their ...

    • Language: English

  • Challenges in Securing Open Source Components

    Wednesday13:20 - 13:4505 Jun 2019
    Technology Showcase

    Open Source Components can provide a huge advantage for software developers in terms of speed of delivery and range of functionality but they can also represent...

    • Language: English

  • Workshop 4: Secure Programming in Java

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    A 2017 study conducted by DevOps.com found that 76% of developers indicated security and secure development education needed for today’s world of coding is miss...

    • Language: English

  • Evasive Malware: How Attackers Bypass Dynamic Analysis

    Wednesday14:00 - 14:2505 Jun 2019
    Tech Talks

    Mimecast’s Chief Scientist of Advanced Malware, Meni Farjon, will showcase high and low-level, known and unknown techniques for malware authors to evade current...

    • Language: English

  • Cryptojacking: The Ghost of Cloud Security

    Wednesday15:20 - 15:4505 Jun 2019
    Tech Talks

    A new threat called cryptojacking that illicitly mines cryptocurrency was first documented on CBS’s showtime networks in late 2017. By mid-2018, cryptojacking h...

    • Language: English

  • Risk Management for the Cloud

    Wednesday15:30 - 16:1505 Jun 2019
    Insight Stage

    Protecting your customer data and mitigating risk is highly complex, especially when pursuing a multi-cloud strategy. To do this, your teams need the tools that...

    • Language: English

  • Evasive Phishing: New Attacks, Techniques & Trends

    Wednesday16:00 - 16:2505 Jun 2019
    Tech Talks

    We are experiencing a ‘perfect phishing storm’ of increasing sophistication, volume, and targeting in phishing attacks, driven by the maturation of the phishing...

    • Language: English

  • Workshop 1: Illuminating the Dark Web

    Thursday10:00 - 12:0006 Jun 2019
    Security Workshop

    This workshop will provide an introduction and practical demonstration of the dark web. We will start by defining the dark web and the notion of anonymity, lea...

    • Language: English

  • The State of Open Source Vulnerabilities Management in 2019

    Thursday10:40 - 11:0506 Jun 2019
    Technology Showcase

    Open source usage has become a mainstream practice — it’s impossible to keep up with today’s pace without it. The rise in open source usage has led to a dramati...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.