Your Search

  • Type of Content

Reset Search
 

2019 Conference

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 68 results

|

Items per page:

Sort By
  • Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions

    Tuesday10:00 - 10:2504 Jun 2019
    Strategy Talks

    Wishful thinking won’t protect your data and systems. Without understanding two key psychological constructs, motivated reasoning and decision fatigue, people w...

    • Language: English

  • Headliner to be announced...

    Tuesday10:15 - 11:0504 Jun 2019
    Keynote Stage

    Details to be announced.

    • Language: English

  • Embracing Zero Trust (When You Aren't the World's Largest Internet Company)

    Tuesday10:30 - 11:3004 Jun 2019
    Information Security Exchange

    In 2014, Google published “BeyondCorp: A New Approach to Enterprise Security” detailing their implementation of Zero Trust networks and the industry was aflutte...

    • Language: English

  • Digitalisation & the Cyber INsecurity Gap

    Tuesday10:40 - 11:0504 Jun 2019
    Technology Showcase

    79% of executives report their organisation is adopting new technologies faster than they can address security issues. As companies rely more on digital IT, clo...

    • Language: English

  • Cyber Threat Intelligence and Criminal Innovation

    Tuesday10:40 - 11:0504 Jun 2019
    Strategy Talks

    In this talk Max Vetter will explore the innovative nature of cyber criminals and demonstrate why they are consistently ahead of the game. He will also introduc...

    • Language: English

  • What’s New with the ePrivacy Regulation? Key Considerations for Tomorrow’s Electronic Communications

    Tuesday11:15 - 11:4504 Jun 2019
    Talking Tactics

    The ePrivacy Regulation will have a profound effect on marketing activities moving forward. Faced with the legal and financial ramifications of ignoring a consu...

    • Language: English

  • The Key to Securing Your Hybrid Cloud Starts with "ABC"

    Tuesday11:20 - 11:4504 Jun 2019
    Technology Showcase

    Many enterprises are adopting a cloud-first strategy to drive their business. As cloud deployments increase, security requirements increase with them, leading t...

    • Language: English

  • Building Brand Infosec: Engaging Employees to Drive Secure Behaviour

    Tuesday11:25 - 12:3504 Jun 2019
    Keynote Stage

    Panel Discussion High profile breaches over the last 12 months have demonstrated that no matter how much sophisticated security technology is in place, it cann...

    • Language: English

  • API Security: What you Absolutely Need to Know Now, with Real World Examples of API Attacks

    Tuesday11:45 - 12:4504 Jun 2019
    Information Security Exchange

    In 2018, at least 85% of organisations consider web APIs and API-based integration fundamental to their business strategy and continued success. However, the ex...

    • Language: English

  • Malware, Security Analytics & Cybersecurity in 2019

    Tuesday12:00 - 12:2504 Jun 2019
    Technology Showcase

    Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decade...

    • Language: English

  • Neither Phish nor Flash: How Cyber-criminals Target Business Email Inboxes Without Phishing

    Tuesday12:00 - 12:2504 Jun 2019
    Strategy Talks

    Well-resourced actors typically access business email accounts through targeted phishing campaigns or using information-stealing malware. The barriers to entry,...

    • Language: English

  • The Digital Risk Dilemma: How to Protect What You Don’t Control

    Tuesday12:40 - 13:0504 Jun 2019
    Strategy Talks

    Everyday more of your attack surface moves to web infrastructure that you neither own nor directly control. To protect your digital assets and thwart malicious ...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.