Your Search

 

2019 Conference

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 7 of 7 results

|

Items per page:

Sort By
  • Malware, Security Analytics & Cybersecurity in 2019

    Tuesday12:00 - 12:2504 Jun 2019
    Technology Showcase

    Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decade...

    • Language: English

  • Metrics that Matters: Help Management with Decision Making and Improve Security Posture of the Organisation

    Tuesday12:40 - 13:0504 Jun 2019
    Tech Talks

    Information Security Metrics presents a holistic view of the information security posture of the organisation and help the management with decision making to pr...

    • Language: English

  • Modern Cyber Threats & Prioritising Security Controls to Combat Them

    Wednesday10:40 - 11:0505 Jun 2019
    Strategy Talks

    Another year, another security show, what silver bullets are you hunting for this go round? In reality the threats we face today may be more sophisticated than ...

    • Language: English

  • Managing Supply Chain Risk

    Wednesday11:25 - 12:0505 Jun 2019
    Keynote Stage

    Special Focus The traditional network perimeter is vanishing as organisational complexity and sprawl increase and third parties are used to enhance business ag...

    • Language: English

  • Malware, Security Analytics & Cybersecurity in 2019

    Wednesday12:40 - 13:0505 Jun 2019
    Technology Showcase

    Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decade...

    • Language: English

  • Monitoring Active Directory & Windows: Indications you are Under Attack

    Wednesday13:20 - 13:4505 Jun 2019
    Tech Talks

    Most attackers will take the path of least resistance when trying to breach your environment. It makes sense that monitoring the common attack paths could resul...

    • Language: English

  • Modelling a Data Breach: The Financial Implications

    Wednesday16:40 - 17:0505 Jun 2019
    Strategy Talks

    With large scale data breaches continually attracting large headlines, businesses are ever increasingly assessing their internal preparedness. Crucial to this p...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.