Your Search

 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 12 results

|

Items per page:

Sort By
  • Perspectives from the Frontline: Managing Risk & Building Resilience

    Tuesday10:15 - 11:0504 Jun 2019
    Keynote Stage

    Opening Keynote   As one BBC Chief News Reporter Kate Adie reported from most of the world’s hotspots and war zones, broadcasting from the Gulf War and Tiananme...

    • Language: English

  • Protecting Your People & Securing the Cloud with CASB

    Tuesday12:40 - 13:0504 Jun 2019
    Technology Showcase

    Driven by Microsoft Office 365, digital transformation is remaking every aspect of modern business. And although early initial hesitations about cloud-based ser...

    • Language: English

  • Predicting the Unpredictable: A Look Into the 2019 Cyber Threat Landscape

    Tuesday14:40 - 15:0504 Jun 2019
    Technology Showcase

    Learn about the latest cyber threat landscape & how you can stay one step ahead always.

    • Language: English

  • Privileged Access Management Made Easy

    Tuesday16:00 - 16:3004 Jun 2019
    Talking Tactics

    Keeping sensitive information secure, maintaining data regulation compliance, and enabling privileged users to work efficiently, at the right levels of access, ...

    • Language: English

  • Personality Traits Meet Cybersecurity

    Tuesday16:40 - 17:0504 Jun 2019
    Strategy Talks

    The art of “people hacking” tricks people into unwillingly participate in scams. Certain personality traits make people more (and less) likely to fall prey to s...

    • Language: English

  • Protecting Your Organisation's Very Attacked People

    Wednesday11:15 - 11:4505 Jun 2019
    Talking Tactics

    90% of all cyberattacks start with an email targeting your end-users. The human factor—the instincts of curiosity and trust that lead well-meaning people to cli...

    • Language: English

  • Practical DevSecOps: The Simple Free Pipeline Anyone Can Create

    Wednesday12:40 - 13:0505 Jun 2019
    Tech Talks

    After this talk, you'll be able to establish your own DevSecOps pipeline immediately. This reference implementation can be adapted easily to almost any tools an...

    • Language: English

  • Phishing & OOB Exfiltration Through Purple Tinted Glasses

    Wednesday14:15 - 15:0005 Jun 2019
    Geek Street

    The proliferation of client-side attacks continues to grow, as attackers are increasingly aware their chances of success are increased if they can get the victi...

    • Language: English

  • Protecting Your Network’s Precious Jewels with Micro-Segmentation

    Wednesday16:40 - 17:0505 Jun 2019
    Technology Showcase

    As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. Regardless of how many different firewalls you use, it’s merel...

    • Language: English

  • Putting Your Cyber Posture to The Test: Live Demo of Hacking an Enterprise

    Wednesday16:40 - 17:0505 Jun 2019
    Tech Talks

    How secure are your IT systems? Can your information security defences withstand the force of a machine-based hacking attack? The new technology, Automated Pene...

    • Language: English

  • Planning your Information Security Career: What you Need to Know

    Thursday10:00 - 10:4006 Jun 2019
    FutureSec

    People: Careers, skills, next-gen The information security sector is one of the most vibrant and growing areas of technology. It is also suffering from a shorta...

    • Language: English

  • Prevention: The Strategic Element in Your Security Stack

    Thursday12:40 - 13:0506 Jun 2019
    Technology Showcase

    Security architecture can be broken down into three main elements: Prevention, detection and remediation. Prevention can be considered the most strategically im...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.