Your Search

  • Date

    • 6th June 2019 (Thursday) Remove
Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 48 of 52 results

|

Items per page:

Sort By
  • Device Authentication with ICMetrics

    Thursday10:00 - 10:2506 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Current secure device authentication and encryption technology has serious limitations in assuring the identity of a given device and its...

    • Language: English

  • Workshop 1: Illuminating the Dark Web

    Thursday10:00 - 12:0006 Jun 2019
    Security Workshop

    This workshop will provide an introduction and practical demonstration of the dark web. We will start by defining the dark web and the notion of anonymity, lea...

    • Language: English

  • Is it Really You? Protect Your Digital Self

    Thursday10:00 - 10:2506 Jun 2019
    Technology Showcase

    In this session we will cover how the new technologies and cyber attack tactics evolved to target individual identities with malicious purpose to businesses and...

    • Language: English

  • Workshop 3: Security Maturity: Developing Metrics to Measure & Inform the Security Programme of Organisations

    Thursday10:00 - 11:3006 Jun 2019
    Security Workshop

    Security professionals often come under pressure to assess the success of security initiatives in their organisations, with board members seeking to understand ...

    • Language: English

  • Planning your Information Security Career: What you Need to Know

    Thursday10:00 - 10:4006 Jun 2019
    FutureSec

    People: Careers, skills, next-gen The information security sector is one of the most vibrant and growing areas of technology. It is also suffering from a shorta...

    • Language: English

  • Workshop 4: The Broad Impact of Active Directory Attacks: A Significant Threat to Business Continuity & How Sanofi Dealt With It

    Thursday10:00 - 12:0006 Jun 2019
    Security Workshop

    Most enterprises have integrated cyber-resilience in their Business Continuity Plans. Unfortunately, and despite tangible evidence, those plans tend to underest...

    • Language: English

  • The Tortoise & the Hare: IoT Security & The Cyber Physical World

    Thursday10:00 - 10:2506 Jun 2019
    Strategy Talks

    As an industry, we are not doing enough with our expertise to support vulnerable, yet converging, networks across the region, to catch up with advancing IoT tec...

    • Language: English (United Kingdom)

  • Securing Smarter Cities: Practical Protocol & Policy

    Thursday10:00 - 10:2506 Jun 2019
    Tech Talks

    Attendees will learn of the security and privacy successes – and failures – of smart city initiatives. By examining components of smart cities (transport system...

    • Language: English

  • Defending the UK: The NCSC Vision for a more Secure UK

    Thursday10:15 - 11:0506 Jun 2019
    Keynote Stage

    Headliner Details to be announced.

    • Language: English

  • The World’s Most Sought-After Security Researchers...Working For You

    Thursday10:30 - 11:0006 Jun 2019
    Talking Tactics

    Cisco’s Talos organisation is an elite team of 250 of the world’s most sought-after security researchers analysing billions of security signatures and postures ...

    • Language: English

  • Cyber Resilience In the Face of Human Error

    Thursday10:30 - 11:3006 Jun 2019
    Information Security Exchange

    Cybersecurity has become the new battlefront amongst nations, enterprises, and individuals. This has led to the understanding and realisation that nothing is im...

    • Language: English

  • The Art of DNS Rebinding

    Thursday10:30 - 11:1506 Jun 2019
    Geek Street

    So much of the information security world is reactionary… it took years for credential relaying to see any sort of solution and it still isn’t completely fixed....

    • Language: English

  • The State of Open Source Vulnerabilities Management in 2019

    Thursday10:40 - 11:0506 Jun 2019
    Technology Showcase

    Open source usage has become a mainstream practice — it’s impossible to keep up with today’s pace without it. The rise in open source usage has led to a dramati...

    • Language: English

  • Tales from the Trenches: Reinvent Application Security Testing for DevOps & SecOps

    Thursday10:40 - 11:0506 Jun 2019
    Strategy Talks

    DevOps is a revolution starting to deliver. The “shift left” security approach is trying to catch up, but challenges remain. We will go over concrete security a...

    • Language: English

  • A Day in the Life of… CISO, Security Analyst, Pen-tester, Security Architect

    Thursday10:45 - 11:4506 Jun 2019
    FutureSec

    People: Careers, skills, next-gen Are you new to information security? Thinking about starting a career in the industry? Trying to work out your next move? ...

    • Language: English

  • Defeat Ransomware: Leveraging ATP & Machine Learning to Orchestrate a Synchronised Cybersecurity Environment Across Endpoint & Email

    Thursday11:10 - 11:3506 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Join us to hear Sam Mayne speak about our advanced threat protection engines. Learn about the current cybersecurity threat landscape and ...

    • Language: English

  • Effective Steps to Reduce Third-Party Risk

    Thursday11:15 - 11:4506 Jun 2019
    Talking Tactics

    As organisations struggle to protect themselves from the seemingly ubiquitous threat of cyberattack, the concept of risk management becomes all the more importa...

    • Language: English

  • How to Detect Malware in Encrypted Traffic, Without Decrypting it, Using Artificial Intelligence

    Thursday11:20 - 11:4506 Jun 2019
    Tech Talks

    The rapid rise of encrypted traffic is changing the threat landscape. It’s reported that as of 2018, nearly half of all Internet traffic is protected by HTTPS a...

    • Language: English

  • Back to the Future: A Data Breach Prevention Plan

    Thursday11:20 - 11:4506 Jun 2019
    Technology Showcase

    Great Scott! Every day you see headlines about huge enterprises being attacked, but is this a problem only for the “giants”? Not at all. There is no big or smal...

    • Language: English

  • Rise of the Breaches

    Thursday11:20 - 12:1006 Jun 2019
    Keynote Stage

    Infosecurity Hall of Fame Annual Lecture Data breaches are the new normal. We’ve created ecosystems with so many moving parts and so many complex units, it’s l...

    • Language: English

  • Hardware-Based Mobile Security: Why Is It Important?

    Thursday11:45 - 12:4506 Jun 2019
    Information Security Exchange

    In this session the audience will learn four security principles to apply when choosing or designing secure mobile devices. Regardless of whether you are a buyi...

    • Language: English

  • Multi-Phased Attacks: The 1-2 Punch That Can Knock Your Business Cold

    Thursday11:45 - 12:1006 Jun 2019
    Cyber Innovation Showcase

    Download Presentation In 2019, the volume—and sophistication—of email threats is growing. Phishing is virtually indistinguishable from legitimate communication...

    • Language: English

  • Feel the Flow: Where Water & Energy Industries are Most Vulnerable

    Thursday11:45 - 12:3006 Jun 2019
    Geek Street

    There are several sensationalised stories about the vulnerability of internet connected critical infrastructure - especially in the water and energy sectors. He...

    • Language: English

  • Skills, Skills, Skills…. Building the Security Team of the Future

    Thursday11:50 - 12:5006 Jun 2019
    FutureSec

    People: Careers, skills, next-gen As risks and technologies develop at breakneck speed the demands on the information security team are changing. During this s...

    • Language: English

  • State of Cybersecurity Report v2: Stats, Views & the Year in Infosec

    Thursday12:00 - 12:3006 Jun 2019
    Talking Tactics

    Last year Infosecurity Magazine conducted industry research to determine the driving trends in cybersecurity. In 2019, we did this again with a larger sample se...

    • Language: English

  • This is (Probably) a Drill: How to "Assume Compromise"

    Thursday12:00 - 12:2506 Jun 2019
    Strategy Talks

    Discover the value of running IR table top exercises. Learn how to run incident response readiness drills customised for your own enterprise. Takeaway the metho...

    • Language: English

  • Hunting for Zero-Days

    Thursday12:00 - 12:2506 Jun 2019
    Tech Talks

    New vulnerabilities are being found in code daily. Infact, 18,000+ new vulnerabilities are estimated to be disclosed in 2018, with a current growth rate of 27 p...

    • Language: English

  • How Machine Learning Empowers Threat Intelligence to Easily Solve Your Vulnerability Challenge, One Hundred Times Faster

    Thursday12:00 - 12:2506 Jun 2019
    Technology Showcase

    Organisations have too much information in their hands, and not enough contextual intelligence to act upon. One of the complex tasks CISOs and their departments...

    • Language: English

  • Case Study: Lessons Learned from the NotPetya Cyber-Attack

    Thursday12:25 - 13:1506 Jun 2019
    Keynote Stage

    In 2017 to NotPetya ransomware attack wreaked havoc on a range of global businesses including law firms, supermarkets and pharmaceuticals. The attack had a huge...

    • Language: English

  • Prevention: The Strategic Element in Your Security Stack

    Thursday12:40 - 13:0506 Jun 2019
    Technology Showcase

    Security architecture can be broken down into three main elements: Prevention, detection and remediation. Prevention can be considered the most strategically im...

    • Language: English

  • How to Identify and Prevent Evasive Threats Using your Organisation’s Data

    Thursday12:40 - 13:0506 Jun 2019
    Tech Talks

    Stealth operations that were once only possible for the most sophisticated state-actors, are now much more common. These new and sophisticated techniques bring ...

    • Language: English

  • How to Build Business Confidence when Migrating your Most Sensitive Data to the Cloud

    Thursday12:40 - 13:0506 Jun 2019
    Strategy Talks

    Today’s security threats combined with the cost-efficiencies of the cloud have forced businesses to look towards hosted platforms when sharing and managing thei...

    • Language: English

  • Automating Cryptographic Vulnerability Analysis in the CI Toolchain

    Thursday12:45 - 13:1506 Jun 2019
    Talking Tactics

    Accidental deployment of vulnerable cryptography can lead to significant data breaches - like the one that led to Uber paying a $200M fine in 2018. So companies...

    • Language: English

  • The Cloud-First Approach to Sustainable Data Governance

    Thursday13:00 - 14:0006 Jun 2019
    Information Security Exchange

    Businesses are driving an explosion in unstructured data. The volume of global business data doubles every 1.2 years, and unstructured content will soon count f...

    • Language: English

  • Black Mirrors: The Dark Web, The Enterprise & Platform Criminality

    Thursday13:00 - 13:4506 Jun 2019
    Geek Street

    Respected criminologist, Dr. Mike McGuire, delves into the murky world of platform criminality, crossing into the black mirror of the dark web to understand the...

    • Language: English

  • Beyond the Castle Walls: How do we Protect in a De-Perimiterised World?

    Thursday13:20 - 13:4506 Jun 2019
    Technology Showcase

    In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ security. Since that time our use of technology has changed ...

    • Language: English

  • The Price of PKI: The Cost of Mismanagement

    Thursday13:20 - 13:4506 Jun 2019
    Strategy Talks

    Most legitimate certificates cost anywhere between $0 - $2500 per year depending on the level of trust and protection an enterprise is willing to offer. But, ca...

    • Language: English

  • Workshop 3: Re-Thinking the Human Factor

    Thursday13:30 - 15:0006 Jun 2019
    Security Workshop

    People are what make organisations a success. And what makes people such a great success can also make them vulnerable. This is why the human factor is an essen...

    • Language: English

  • Strengthening Collaboration Between Law Enforcement & Business

    Thursday13:30 - 14:1006 Jun 2019
    Keynote Stage

    One of the continuing challenges facing the information security community is the conflicting objectives of law enforcement and business. In the event of a brea...

    • Language: English

  • The Rise of Automated Hacking & the Effect on Your Organisation's Security

    Thursday13:45 - 14:1506 Jun 2019
    Talking Tactics

    The presentation outlines the rise of automated hacking and the consequences for both the attackers and the cyberresilience of an organisation. The landscape of...

    • Language: English

  • Enabling Through-Life ISMS Value

    Thursday14:00 - 14:2506 Jun 2019
    Technology Showcase

    The SABSA Methodology is well regarded for Enterprise Security Architecture, but how can it benefit the implementation and operation of a security program withi...

    • Language: English

  • Growing Your New Cybersecurity Business

    Thursday14:00 - 15:3006 Jun 2019
    FutureSec

    Innovation: Technologies, start-ups, cyber business growth Growing Your New Cybersecurity Business Are you a new start-up looking at how to grow your business...

    • Language: English

  • Overcome the Tech & Politics of Securing Critical National Infrastructure (CNI)

    Thursday14:00 - 14:2506 Jun 2019
    Tech Talks

    The National Cyber Security Centre (NCSC) has warned that hostile states will attempt deadly cyberattacks against UK infrastructure, but argues that the UK gove...

    • Language: English

  • Building Cyber Resilience to Sustained & Persistent Cyberattacks

    Thursday14:00 - 14:2506 Jun 2019
    Strategy Talks

    Threat detection, threat intelligence and threat hunting – Enhancing business resilience to sustained and persistent cyberattacks. The talk will allow organisat...

    • Language: English

  • Zero Trusted Networks or: Why Perimeter Security is Dead

    Thursday14:05 - 14:3006 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Traditional IT network security is based on perimeter security. Perimeter security makes it hard to obtain access to the network, but eve...

    • Language: English

  • Cloud Risk Decoder Ring: Shared Responsibility & Ways to Avoid Self-Inflicted Harm

    Thursday14:15 - 15:1506 Jun 2019
    Information Security Exchange

    With continuing cloud data breach headlines, IT and Security teams are experiencing the painful nuances of the shared responsibility model. With a new set of te...

    • Language: English

  • Building an Intelligent Incident Response Plan: Lessons from the Front Line

    Thursday14:25 - 15:3506 Jun 2019
    Keynote Stage

    Panel Discussion Effective incident response brings together multiple stakeholders who must work together to deal swiftly with the incident. During this sessio...

    • Language: English

  • Automated Defences for DDoS

    Thursday14:30 - 15:0006 Jun 2019
    Talking Tactics

    With over 23 million DDoS weapons being tracked is your current security strategy up to date? Learn about all the latest information and strategies in DDoS dete...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.