Your Search

  • Topic Area

    • Incident response & security operations Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 48 of 48 results

|

Items per page:

Sort By
  • Workshop 2: Stressless ISMS: How Shakespeare Helps When Setting Up an ISMS

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    The session will contain two parts, one in which practical aspects of how to set up and run a certified ISMS are explained and another containing examples of se...

    • Language: English

  • Workshop 1: The 3Ps of Third Party Risk: Prevention, Policies, Promises

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Independent research revealed that while 60% of firms have formal third party risk policies, nearly half have experienced a significant breach caused by a vendo...

    • Language: English

  • Workshop 4: Tales from the SOC

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Let Neustar take you through the key workings of our world class SOC. Learn how we mitigate attacks of all shapes and sizes. Get an overview of the types of att...

    • Language: English

  • Perspectives from the Frontline: Managing Risk & Building Resilience

    Tuesday10:15 - 11:0504 Jun 2019
    Keynote Stage

    Opening Keynote   As one BBC Chief News Reporter Kate Adie reported from most of the world’s hotspots and war zones, broadcasting from the Gulf War and Tiananme...

    • Language: English

  • Digitalisation & the Cyber INsecurity Gap

    Tuesday10:40 - 11:0504 Jun 2019
    Technology Showcase

    79% of executives report their organisation is adopting new technologies faster than they can address security issues. As companies rely more on digital IT, clo...

    • Language: English

  • AI: Past Failures, Current Capability & the Future of "Nation State" Defence

    Tuesday10:40 - 11:0504 Jun 2019
    Tech Talks

    With an increasing skills gap and wave of autonomous attacks, military, governments and global enterprises are asking industry to deliver “self-healing, self-de...

    • Language: English

  • Addressing One of the Largest Risks in Cybersecurity: Humans!

    Tuesday11:20 - 11:3504 Jun 2019
    Cyber Innovation Showcase

    Your employees today struggle to identify real cyber attacks, whilst traditional awareness campaigns has failed to drive cultural and behavioural change. HumanF...

    • Language: English

  • Is That Really You? The Importance of Identity in Breach Readiness & Response

    Tuesday11:20 - 11:4504 Jun 2019
    Tech Talks

    Monitoring your users’ access and privileges, and securing them as they interact with the internet is core to a Zero Trust approach to cybersecurity. But what i...

    • Language: English

  • How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks

    Tuesday11:45 - 12:0004 Jun 2019
    Cyber Innovation Showcase

    There are five technical information security controls that if implemented correctly are known to eliminate 95% of cyber attacks. These are well documented as p...

    • Language: English

  • Neither Phish nor Flash: How Cyber-Criminals Target Business Email Inboxes Without Phishing

    Tuesday12:00 - 12:2504 Jun 2019
    Strategy Talks

    Well-resourced actors typically access business email accounts through targeted phishing campaigns or using information-stealing malware. The barriers to entry,...

    • Language: English

  • Incident & Breach Management for Privacy & Security Teams

    Tuesday12:45 - 13:1504 Jun 2019
    Talking Tactics

    Privacy and security professionals often approach incident and breach response from two different outlooks. Whereas security teams focus on threat vectors, priv...

    • Language: English

  • From Beyond the Wall to the Seven Kingdoms: Why Email Threat-Sharing Gives Us A Chance

    Tuesday13:00 - 13:1504 Jun 2019
    Cyber Innovation Showcase

    Download Presentation For business leaders and aspiring Iron Throne rulers.  As members of the security community suffering from the constant onslaught of cyb...

    • Language: English

  • Your Smart Scale Leaks More Than Just Your Weight

    Tuesday13:20 - 13:4504 Jun 2019
    Tech Talks

    Smart devices are a big part of our lives. Bluetooth Smart (BLE), which was introduced on IoT devices in 2011, made their number explode. So now we have cheaper...

    • Language: English

  • Be the Hunter, Not the Hunted: What the Latest Cyber Attacks Mean to the Defenders

    Tuesday13:30 - 14:1504 Jun 2019
    Insight Stage

    Threats & Attacks Throughout the past year we’ve seen quite a lot - from organisations being sprayed with malware by cybercrime groups to nation state backed A...

    • Language: English

  • Building or Modernising Own CSIRT/SOC: Practical Tips

    Tuesday13:45 - 14:1504 Jun 2019
    Talking Tactics

    The presentation will centre around cybersecurity capability build-out via the establishment of governmental, sectorial and organisational Computer Security Inc...

    • Language: English

  • Workshop 1: Hacked! How to Detect, Investigate & Respond to an Advanced Cyber-Attack

    Tuesday14:00 - 16:0004 Jun 2019
    Security Workshop

    “How did this happen?!” When a serious cyber-breach is detected, questions usually outnumber answers. Two seasoned Bitdefender experts will take you on a journe...

    • Language: English

  • Workshop 2: Discover the Secrets of the SOC & How to Build a Threat Hunting Team

    Tuesday14:00 - 16:0004 Jun 2019
    Security Workshop

    In the first half of this interactive workshop, we’ll talk about what goes into making a SOC work effectively. As well as providing the core monitoring and inci...

    • Language: English

  • Expense in Depth: Managing Your Total Cost of Controls

    Tuesday14:00 - 14:2504 Jun 2019
    Strategy Talks

    John McClurg, Vice President - Ambassador-At-Large, Cylance will show how current approaches to information security are economically inefficient and why a Tota...

    • Language: English

  • Red Team, Blue team: Two Sides of the Same Coin

    Tuesday14:15 - 15:1504 Jun 2019
    Information Security Exchange

    Our industry has adopted myriad attack detection tactics, security frameworks, threat intelligence schemes, and incident response plans over the past few decade...

    • Language: English

  • Building a Secure Architectural Foundation for Next Generation Networks & Digital Transformation

    Tuesday15:20 - 15:4504 Jun 2019
    Technology Showcase

    Organisations have grown their security defences as they have responded to the rapidly evolving threat landscape. This has led to a disjointed, fragile security...

    • Language: English

  • Combating Open Source Security Vulnerabilities Without Slowing Down Developers

    Tuesday16:00 - 16:2504 Jun 2019
    Tech Talks

    Development teams are facing nowadays an unprecedented challenge to accommodate requirements of application security while maintaining an agile development proc...

    • Language: English

  • Demystifying Intelligence-Led Red Teaming: What It Is & How to Automate It

    Wednesday10:00 - 10:2505 Jun 2019
    Strategy Talks

    On May 2018, the European Central Bank published the TIBER-EU, a framework for testing financial sector resilience to cyber attacks. TIBER-EU framework puts an...

    • Language: English

  • Managing the Insider Threat: Why Visibility is Critical

    Wednesday10:30 - 11:0005 Jun 2019
    Talking Tactics

    Ponemon research shows that the average time to spot and contain an insider threat is 72 days - only 16% of incidents are identified and contained within 30 day...

    • Language: English

  • Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

    Wednesday10:40 - 11:0505 Jun 2019
    Technology Showcase

    Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuf...

    • Language: English

  • Anatomy of a Cyber Attack: DNSpionage

    Wednesday11:20 - 11:4505 Jun 2019
    Tech Talks

    Threat actors continuously search for new techniques to compromise their victims. Recently, Cisco Talos identified a new malicious campaign named “DNSpionage”. ...

    • Language: English

  • How to Succeed at Threat Hunting & IR: Think Differently About Data

    Wednesday12:00 - 12:2505 Jun 2019
    Technology Showcase

    Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in thes...

    • Language: English

  • It Might Get Loud! Exfiltrating Data Using Audio Interfaces

    Wednesday12:00 - 12:2505 Jun 2019
    Tech Talks

    Turning files into analogue signals is not a novel idea, modems did this many years ago... But how about using a USB soundcard to transfer files from a computer...

    • Language: English

  • From Beyond the Wall to the Seven Kingdoms: Why Email Threat-Sharing Gives Us A Chance

    Wednesday12:10 - 12:2505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation For business leaders and aspiring Iron Throne rulers.  As members of the security community suffering from the constant onslaught of cyb...

    • Language: English

  • AI in Security Operations Centres: What We’ve Learnt so Far

    Wednesday12:30 - 13:1505 Jun 2019
    Insight Stage

    Is it time for the traditional multi-tiered SOC to end? Get beyond the InfoSec buzzwords in this practitioner-lead session in which we'll we share our insights ...

    • Language: English

  • Strategic Autonomous Response: Learning from Patient Zero to Protect the Network at Large

    Wednesday12:40 - 13:0505 Jun 2019
    Strategy Talks

    With email still the most common vector of attack, it is time for a new approach to defending our digital businesses. AI cyber defences can now be deployed acro...

    • Language: English

  • Monitoring Active Directory & Windows: Indications you are Under Attack

    Wednesday13:20 - 13:4505 Jun 2019
    Tech Talks

    Most attackers will take the path of least resistance when trying to breach your environment. It makes sense that monitoring the common attack paths could resul...

    • Language: English

  • How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks

    Wednesday13:50 - 14:0505 Jun 2019
    Cyber Innovation Showcase

    There are five technical information security controls that if implemented correctly are known to eliminate 95% of cyber attacks. These are well documented as p...

    • Language: English

  • Workshop 3: Discover the Secrets of the SOC & How to Build a Threat Hunting Team

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    In the first half of this interactive workshop, we’ll talk about what goes into making a SOC work effectively. As well as providing the core monitoring and inci...

    • Language: English

  • Phishing & OOB Exfiltration Through Purple Tinted Glasses

    Wednesday14:15 - 15:0005 Jun 2019
    Geek Street

    The proliferation of client-side attacks continues to grow, as attackers are increasingly aware their chances of success are increased if they can get the victi...

    • Language: English

  • The Impact of Protocol Evolution on Network Security

    Wednesday14:40 - 15:0505 Jun 2019
    Tech Talks

    New protocols such as TLS 1.3, QUIC, DNS over HTTPS are designed to enhance privacy and end-user experience. However, these new protocols also have an impact on...

    • Language: English

  • Addressing One of the Largest Risks in Cybersecurity: Humans!

    Wednesday15:05 - 15:2005 Jun 2019
    Cyber Innovation Showcase

    Your employees today struggle to identify real cyber attacks, whilst traditional awareness campaigns has failed to drive cultural and behavioural change. HumanF...

    • Language: English

  • Unleash the Power of Your SOC: How to Measure Effectiveness & Mature Your Capabilities

    Wednesday15:30 - 16:3005 Jun 2019
    Information Security Exchange

    Despite the average organisation deploying dozens of security tools and products, major breaches are still happening.  In order to reduce the risk of experienc...

    • Language: English

  • Cyber Defence 2019: An Overview of HIDS, NIDS & IPS Systems

    Wednesday15:30 - 16:1505 Jun 2019
    Geek Street

    This presentation will introduce you to cyber intrusion tools that help to prevent cyber intrusions threats from entering and harming your network. I will prese...

    • Language: English

  • Why Artificial Intelligence Doesn't Work & Other Cybersecurity Failed Technologies

    Wednesday16:00 - 16:2505 Jun 2019
    Strategy Talks

    As the hype and talk of AI increases and with many organisations now claiming to have adopted AI capabilities in-house, Ian Mann discusses why Artificial Intell...

    • Language: English

  • Automating Business Security is Possible: Why do so Many Enterprises Not Know & Are They Missing Out?

    Thursday10:40 - 11:0506 Jun 2019
    Tech Talks

    Business certificate management is an often-overlooked but vital issue in the enterprise. Manual management can result in outages and time wastage; this talk ex...

    • Language: English

  • Multi-Phased Attacks: The 1-2 Punch That Can Knock Your Business Cold

    Thursday11:45 - 12:1006 Jun 2019
    Cyber Innovation Showcase

    Download Presentation In 2019, the volume—and sophistication—of email threats is growing. Phishing is virtually indistinguishable from legitimate communication...

    • Language: English

  • Feel the Flow: Where Water & Energy Industries are Most Vulnerable

    Thursday11:45 - 12:3006 Jun 2019
    Geek Street

    There are several sensationalised stories about the vulnerability of internet connected critical infrastructure - especially in the water and energy sectors. He...

    • Language: English

  • State of Cybersecurity Report v2: Stats, Views & the Year in Infosec

    Thursday12:00 - 12:3006 Jun 2019
    Talking Tactics

    Last year Infosecurity Magazine conducted industry research to determine the driving trends in cybersecurity. In 2019, we did this again with a larger sample se...

    • Language: English

  • This is (Probably) a Drill: How to "Assume Compromise"

    Thursday12:00 - 12:2506 Jun 2019
    Strategy Talks

    Discover the value of running IR table top exercises. Learn how to run incident response readiness drills customised for your own enterprise. Takeaway the metho...

    • Language: English

  • How to Identify and Prevent Evasive Threats Using your Organisation’s Data

    Thursday12:40 - 13:0506 Jun 2019
    Tech Talks

    Stealth operations that were once only possible for the most sophisticated state-actors, are now much more common. These new and sophisticated techniques bring ...

    • Language: English

  • Building Cyber Resilience to Sustained & Persistent Cyberattacks

    Thursday14:00 - 14:2506 Jun 2019
    Strategy Talks

    Threat detection, threat intelligence and threat hunting – Enhancing business resilience to sustained and persistent cyberattacks. The talk will allow organisat...

    • Language: English

  • Building an Intelligent Incident Response Plan: Lessons from the Front Line

    Thursday14:25 - 15:3506 Jun 2019
    Keynote Stage

    Panel Discussion Effective incident response brings together multiple stakeholders who must work together to deal swiftly with the incident. During this sessio...

    • Language: English

  • The Power Hacker: Don’t Let the Lights Go Out: A Look Inside the Mind of a Hacker

    Thursday15:20 - 15:4506 Jun 2019
    Tech Talks

    This session is a real-world hack into a power station that explains the process on planning and preparation, the major challenges of hacking into a power stati...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.