Your Search

 

2019 Conference

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 7 of 7 results

|

Items per page:

Sort By
  • Digitalisation & the Cyber INsecurity Gap

    Tuesday10:40 - 11:0504 Jun 2019
    Technology Showcase

    79% of executives report their organisation is adopting new technologies faster than they can address security issues. As companies rely more on digital IT, clo...

    • Language: English

  • DNS: Cybersecurity’s Best Kept Secret for Eliminating Network Threats

    Tuesday13:00 - 14:0004 Jun 2019
    Information Security Exchange

    Growing numbers of cyber threats and volumes of data are creating significant problems. Stretched security teams need to keep networks secure, yet still cope wi...

    • Language: English

  • Destination Unknown: A Data Science Perspective on UEBA Deployment

    Tuesday16:40 - 17:0504 Jun 2019
    Tech Talks

    User and Entity Behaviour Analytics (UEBA) has emerged as a viable tool in detecting security threats that are otherwise impossible to find via traditional appr...

    • Language: English

  • Demystifying Intelligence-Led Red Teaming: What It Is and How to Automate It

    Wednesday10:00 - 10:2505 Jun 2019
    Strategy Talks

    On May 2018, the European Central Bank published the TIBER-EU, a framework for testing financial sector resilience to cyber attacks. TIBER-EU framework puts an...

    • Language: English

  • Device Centric Security Strategies for the Modern Work Place

    Wednesday11:20 - 11:4505 Jun 2019
    Technology Showcase

    Mobile devices in law firms now generate more corporate traffic than laptops or PCs. However traditional security investments such as SWG and EPP don't pay off ...

    • Language: English

  • Don’t Acquire Your Next Breach: Managing Vendor Risk Under the GDPR

    Wednesday11:45 - 12:4505 Jun 2019
    Information Security Exchange

    Managing vendor risk before, during and after onboarding is a continuous effort under the GDPR and impending data protection regulations. While outsourcing oper...

    • Language: English

  • Dissecting Today’s Attacks to See the Future of Cybersecurity

    Wednesday14:40 - 15:0505 Jun 2019
    Strategy Talks

    Dissecting the current threat landscape and analysing major data breaches from the last decade, this session explores how these insights can help us predict the...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.