Your Search

  • Date

    • 5th June 2019 (Wednesday) Remove
  • Topic Area

    • Threats, exploits and vulnerabilities Remove
  • Type of Content

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 20 of 20 results

|

Items per page:

Sort By
  • Workshop 2: Speed & Precision: The Keys to Stopping Modern Adversarie

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight an...

    • Language: English

  • Workshop 1: From White House Email Prankster to White Hat Researcher: How Cyber Gangs Operate & How Businesses Can Protect Against Email Threats

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    SINON_REBORN was once an email prankster that fooled the White House, but now he hunts criminal email gangs. Learn his techniques from both sides of the coin to...

    • Language: English

  • Get the Benefit You Deserve from Threat Intel

    Wednesday10:05 - 10:2005 Jun 2019
    Cyber Innovation Showcase

    As Cyber Threat Intelligence moves from the sharing of indicators to the sharing of TTPs (tactics, techniques and procedures) and beyond, there are significant ...

    • Language: English

  • Discovering the Digital Underworld: Privacy, the Dark Web, Tech & Democracy

    Wednesday10:15 - 11:0505 Jun 2019
    Keynote Stage

    Opening Keynote During this session, Jamie Bartlett will take you on a journey of discovery – sharing his insight into how technology is changing society. From ...

    • Language: English

  • Trust No One & Suspect Everyone: Zero Trust Security Model

    Wednesday10:30 - 11:1505 Jun 2019
    Insight Stage

    Identity & Access Management A threat is a threat—whether intentional or not—and the human factor that lends itself to malicious behaviour or inadvertent error...

    • Language: English

  • Cracking the Complexity Conundrum: How to Secure, Patch & Protect Complex, Dynamic Organisations

    Wednesday12:25 - 13:2505 Jun 2019
    Keynote Stage

    Panel Discussion Enterprises are more dynamic and complex than ever before.  From working practices, agile development and the latest technologies, to multiple...

    • Language: English

  • Malware, Security Analytics & Cybersecurity in 2019

    Wednesday12:40 - 13:0505 Jun 2019
    Technology Showcase

    Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decade...

    • Language: English

  • Cyber Essentials Plus: Driving Adoption & Raising the Bar

    Wednesday13:25 - 13:4005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation The majority of common cyber attacks would be prevented by adherence to the 5 controls of the Cyber Essentials Scheme. And yet, despite t...

    • Language: English

  • Workshop 2: Speed & Precision: The Keys to Stopping Modern Adversarie

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight an...

    • Language: English

  • Why Vulnerability Management Fails

    Wednesday14:00 - 14:2505 Jun 2019
    Technology Showcase

    Every wonder why so many companies struggle to manage vulnerabilities? Do you bang your head against your desk every time the security team hands you a new list...

    • Language: English

  • Evolution or Revolution: What Has SIEM Become?

    Wednesday14:15 - 15:1505 Jun 2019
    Information Security Exchange

    Bulletproof explores the changing face of the SIEM industry and the evolving threat landscape it strives to counter. The seminar includes a case study of how to...

    • Language: English

  • A Journey of Self Driven Security Training

    Wednesday14:15 - 14:3005 Jun 2019
    Cyber Innovation Showcase

    This talk details a course of progression from engineer to security advocate, highlighting the importance of self driven teaching methodologies, the increased a...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Wednesday14:40 - 15:0505 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • How to Optimise Investment in Cybersecurity Tools, Technologies & Products

    Wednesday14:40 - 15:3005 Jun 2019
    Keynote Stage

    Panel Discussion - CISOs in Conversation Peddling fear, uncertainty and doubt is a criticism that is frequently levelled at information security vendors with a...

    • Language: English

  • Champagne CISO: Crisis Comms: How to Handle a Crisis in Front of the Media

    Wednesday15:00 - 16:3005 Jun 2019
    Leaders Programme

    Even at the most well-run companies things can go wrong, and when a crisis strikes your reputation is at stake. How you prepare for a crisis and implement a cr...

    • Language: English

  • National or Sectorial Cybersecurity Capability Build-Out: Capability Assessments, CSIRT/SOCs, Threat Landscapes & CIIs

    Wednesday15:15 - 15:4505 Jun 2019
    Talking Tactics

    The session will cover cybersecurity capability build-out via cybersecurity capability assessment, establishment of cybersecurity framework, role of threat land...

    • Language: English

  • From Liability to Asset: The Role DNS Should Be Playing in Your Security Architecture & Operations

    Wednesday15:20 - 15:4505 Jun 2019
    Technology Showcase

    DNS is a ubiquitous network service which has a front row seat when it comes to malware activities. Most organisations neglect to consider the scale and simplic...

    • Language: English

  • Unleash the Power of Your SOC: How to Measure Effectiveness & Mature Your Capabilities

    Wednesday15:30 - 16:3005 Jun 2019
    Information Security Exchange

    Despite the average organisation deploying dozens of security tools and products, major breaches are still happening.  In order to reduce the risk of experienc...

    • Language: English

  • How to Become APT-Proof in 24 Hours

    Wednesday15:55 - 16:2005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Organisations like yours are investing $15 million annually in information security. They’re doing everything right. From perimeter secur...

    • Language: English

  • Navigating Complex Regulatory Oversight to Ensure Privacy, Security & Compliance

    Wednesday16:40 - 17:3005 Jun 2019
    Keynote Stage

    Panel Discussion Regulatory risk is a key challenge for organisations with the threat of huge fines in the event of a breach. Whilst GDPR is still forefront of...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.