Skip to main content
1 - 43 of 43 results
Items per page:
With the increasing exploits and tools hackers use to gain access to a company's IT infrastructure, the need to combat them grows more and more. Automated Penet...
In his talk, Chris Marrison, Consulting Solutions Architect at Infoblox, will provide a brief yet informative history on everything ‘crypto’, including crypto c...
With an increasing skills gap and wave of autonomous attacks, military, governments and global enterprises are asking industry to deliver “self-healing, self-de...
Join FC in a discussion of cracking and analysis of nearly a billion passwords: Why we do it, what benefits we see and the thorny issue of the law. What things ...
The results of a red-team test (or breach) can be a thunderclap under a clear blue sky. The recommendations might look idealistic and expensive. Management migh...
SureCloud's Senior Security Consultant will be discussing a critical disclosure discovered on the children's VTech Storio Max tablet, which allowed attackers fu...
Smart devices are a big part of our lives. Bluetooth Smart (BLE), which was introduced on IoT devices in 2011, made their number explode. So now we have cheaper...
Encryption is critical to protection of information assets at rest and in transit, this accessible introduction to encryption reviews key concepts, technologies...
Through concrete use cases and practical examples we will learn how to track criminal hosting infrastructures and we will understand the taxonomy and business m...
Data leaks and password thefts have proven that password-based authentication approach is inadequate to preserve security and privacy for IT systems. Behavioura...
Sharing threat intelligence can be the difference in a company bouncing back from or suffering through a cyberattack, perhaps never recovering. The future of en...
Malware engineers are diversifying their businesses with multi-intent malware, where a single successful compromise can open up multiple streams of revenue. In ...
Introduction to the Rapid Threat Model Prototyping methodology, a radical departure from standard architectural threat modeling. This new methodology allows sof...
Development teams are facing nowadays an unprecedented challenge to accommodate requirements of application security while maintaining an agile development proc...
Say goodbye to passwords! PixelPin offers an alternative authentication method to traditional passwords and biometrics, by utilising pictures to create a deligh...
A fast, reliable and well secured network is of crucial importance to any organisation. Flowmon is the answer to this challenge using leading edge IP flow monit...
The media makes sensationalistic claims about AI. Is it a rising trend or just a buzzword? Trendy or not, Cisco has been using AI for years to help businesses ...
Ponemon research shows that the average time to spot and contain an insider threat is 72 days - only 16% of incidents are identified and contained within 30 day...
Hear no Evil see no Evil; How an AI system was developed that could disguise itself as a human and deceive people. How did this work, what could it achieve? In ...
Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuf...
Domain names are cheap, easy-to-get assets – the perfect tool for the perfect crime. In this presentation, internet pioneer and Farsight Security CEO Dr. Paul V...
In this presentation you’ll get a potted history of the shambles that is IoT security. You’ll gain an understanding of systemic security issues, and how and why...
A growing priority for Nikola Howard, Data Centre Manager at the London Borough of Camden, has been the need to keep employee and residents’ inboxes safe from t...
After this talk, you'll be able to establish your own DevSecOps pipeline immediately. This reference implementation can be adapted easily to almost any tools an...
Positive Technologies researchers have discovered a number of vulnerabilities in a ZTE wifi router, used by 750-800 thousand devices globally. This presentation...
A 2017 study conducted by DevOps.com found that 76% of developers indicated security and secure development education needed for today’s world of coding is miss...
The proliferation of client-side attacks continues to grow, as attackers are increasingly aware their chances of success are increased if they can get the victi...
This presentation will introduce you to cyber intrusion tools that help to prevent cyber intrusions threats from entering and harming your network. I will prese...
We are experiencing a ‘perfect phishing storm’ of increasing sophistication, volume, and targeting in phishing attacks, driven by the maturation of the phishing...
As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. Regardless of how many different firewalls you use, it’s merel...
How secure are your IT systems? Can your information security defences withstand the force of a machine-based hacking attack? The new technology, Automated Pene...
This workshop will provide an introduction and practical demonstration of the dark web. We will start by defining the dark web and the notion of anonymity, lea...
Attendees will learn of the security and privacy successes – and failures – of smart city initiatives. By examining components of smart cities (transport system...
So much of the information security world is reactionary… it took years for credential relaying to see any sort of solution and it still isn’t completely fixed....
People: Careers, skills, next-gen Are you new to information security? Thinking about starting a career in the industry? Trying to work out your next move? ...
In this session the audience will learn four security principles to apply when choosing or designing secure mobile devices. Regardless of whether you are a buyi...
There are several sensationalised stories about the vulnerability of internet connected critical infrastructure - especially in the water and energy sectors. He...
Security architecture can be broken down into three main elements: Prevention, detection and remediation. Prevention can be considered the most strategically im...
Respected criminologist, Dr. Mike McGuire, delves into the murky world of platform criminality, crossing into the black mirror of the dark web to understand the...
Identifying, building and acting on insider threat cases. This will include discussion of criminal trends and investigative practices, as well as balancing data...
The National Cyber Security Centre (NCSC) has warned that hostile states will attempt deadly cyberattacks against UK infrastructure, but argues that the UK gove...
As nimble organisations deliver new innovations, adversaries are also upping their game, something we’ve seen in recent high profile and devastating cyberattack...
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.