Your Search

  • Company Size

  • Type of Content

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 4 of 4 results

|

Items per page:

Sort By
  • Be the Hunter, Not the Hunted: What the Latest Cyber Attacks Mean to the Defenders

    Tuesday13:30 - 14:1504 Jun 2019
    Insight Stage

    Threats & Attacks Throughout the past year we’ve seen quite a lot - from organisations being sprayed with malware by cybercrime groups to nation state backed A...

    • Language: English

  • Bringing Rapid Prototyping to the Threat Model Process

    Tuesday15:30 - 16:1504 Jun 2019
    Geek Street

    Introduction to the Rapid Threat Model Prototyping methodology, a radical departure from standard architectural threat modeling. This new methodology allows sof...

    • Language: English

  • Branch Security for Direct Internet Access

    Wednesday13:45 - 14:1505 Jun 2019
    Talking Tactics

    Allowing branch sites access to business critical cloud applications such as Office 365 over a public Internet link is an understandably growing trend. Join us ...

    • Language: English

  • Black Mirrors: The Dark Web, The Enterprise & Platform Criminality

    Thursday13:00 - 13:4506 Jun 2019
    Geek Street

    Respected criminologist, Dr. Mike McGuire, delves into the murky world of platform criminality, crossing into the black mirror of the dark web to understand the...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.