Your Search

  • Type of Content

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 48 of 91 results

|

Items per page:

Sort By
  • The “Industrial Revolution” of Penetration Testing

    Tuesday10:00 - 10:2504 Jun 2019
    Technology Showcase

    With the increasing exploits and tools hackers use to gain access to a company's IT infrastructure, the need to combat them grows more and more. Automated Penet...

    • Language: English

  • Workshop 4: Tales from the SOC

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Let Neustar take you through the key workings of our world class SOC. Learn how we mitigate attacks of all shapes and sizes. Get an overview of the types of att...

    • Language: English

  • Cryptojacking: What You Need to Know

    Tuesday10:00 - 10:2504 Jun 2019
    Tech Talks

    In his talk, Chris Marrison, Consulting Solutions Architect at Infoblox, will provide a brief yet informative history on everything ‘crypto’, including crypto c...

    • Language: English

  • The World’s Most Sought-After Security Researchers...Working For You

    Tuesday10:30 - 11:0004 Jun 2019
    Talking Tactics

    Cisco’s Talos organisation is an elite team of 250 of the world’s most sought-after security researchers analysing billions of security signatures and postures ...

    • Language: English

  • The "S" in "IoT" stands for "Security"

    Tuesday10:30 - 10:4504 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Along with the proliferation of IoT devices in our homes and lives has come string of laughable breaches to the extent that IoT has becom...

    • Language: English

  • AI: Past Failures, Current Capability & the Future of "Nation State" Defence

    Tuesday10:40 - 11:0504 Jun 2019
    Tech Talks

    With an increasing skills gap and wave of autonomous attacks, military, governments and global enterprises are asking industry to deliver “self-healing, self-de...

    • Language: English

  • Is That Really You? The Importance of Identity in Breach Readiness & Response

    Tuesday11:20 - 11:4504 Jun 2019
    Tech Talks

    Monitoring your users’ access and privileges, and securing them as they interact with the internet is core to a Zero Trust approach to cybersecurity. But what i...

    • Language: English

  • Lessons from Nearly a Billion Passwords

    Tuesday11:45 - 12:3004 Jun 2019
    Geek Street

    Join FC in a discussion of cracking and analysis of nearly a billion passwords: Why we do it, what benefits we see and the thorny issue of the law. What things ...

    • Language: English

  • "Yes We Can Get In. Now What?"

    Tuesday12:00 - 12:2504 Jun 2019
    Tech Talks

    The results of a red-team test (or breach) can be a thunderclap under a clear blue sky. The recommendations might look idealistic and expensive. Management migh...

    • Language: English

  • Zero Trust Privilege for DevOps & App Developers

    Tuesday12:30 - 13:1504 Jun 2019
    Insight Stage

    DevOps has emerged as a new attack surface being targeted by threat actors. In this presentation, we will highlight how Zero Trust Privilege is being used to pr...

    • Language: English

  • Devil in the Details: A Reverse Engineering Campaign Across 30 Financial Services Mobile Apps

    Tuesday12:40 - 13:0504 Jun 2019
    Tech Talks

    Following a six-week research study I performed into reverse engineering financial services mobile apps, I am on a world tour unveiling my vulnerability finding...

    • Language: English

  • Protecting Your People & Securing the Cloud with CASB

    Tuesday12:40 - 13:0504 Jun 2019
    Technology Showcase

    Driven by Microsoft Office 365, digital transformation is remaking every aspect of modern business. And although early initial hesitations about cloud-based ser...

    • Language: English

  • The Inside Story Behind VTech Storio Max Vulnerability - CVE-2018-16618

    Tuesday13:00 - 13:4504 Jun 2019
    Geek Street

    SureCloud's Senior Security Consultant will be discussing a critical disclosure discovered on the children's VTech Storio Max tablet, which allowed attackers fu...

    • Language: English

  • Your Smart Scale Leaks More Than Just Your Weight

    Tuesday13:20 - 13:4504 Jun 2019
    Tech Talks

    Smart devices are a big part of our lives. Bluetooth Smart (BLE), which was introduced on IoT devices in 2011, made their number explode. So now we have cheaper...

    • Language: English

  • Be the Hunter, Not the Hunted: What the Latest Cyber Attacks Mean to the Defenders

    Tuesday13:30 - 14:1504 Jun 2019
    Insight Stage

    Threats & Attacks Throughout the past year we’ve seen quite a lot - from organisations being sprayed with malware by cybercrime groups to nation state backed A...

    • Language: English

  • Human Risk Protection

    Tuesday13:50 - 14:0504 Jun 2019
    Cyber Innovation Showcase

    Academic studies have demonstrated and explained the ineffectiveness of security awareness and education (Bada, Sasse & Nurse, 2016) and CISOs are seeing it eve...

    • Language: English

  • Workshop 1: Hacked! How to Detect, Investigate & Respond to an Advanced Cyber-Attack

    Tuesday14:00 - 16:0004 Jun 2019
    Security Workshop

    “How did this happen?!” When a serious cyber-breach is detected, questions usually outnumber answers. Two seasoned Bitdefender experts will take you on a journe...

    • Language: English

  • Workshop 3: CISSP Preview: An Introduction to Encryption

    Tuesday14:00 - 16:0004 Jun 2019
    Security Workshop

    Encryption is critical to protection of information assets at rest and in transit, this accessible introduction to encryption reviews key concepts, technologies...

    • Language: English

  • Workshop 4: LIVE Security Pentest: Exploring the Limitations of 802.1x and Beyond

    Tuesday14:00 - 16:0004 Jun 2019
    Security Workshop

    Dive into the reality of today’s heterogeneous networks in large enterprises – In this workshop, we will highlight the challenges these networks are facing and ...

    • Language: English

  • Taming the Storm Clouds: Managing Network Security Across the Hybrid & Multi-Cloud Estate

    Tuesday14:00 - 14:2504 Jun 2019
    Technology Showcase

    Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visib...

    • Language: English

  • Workshop 2: Discover the Secrets of the SOC & How to Build a Threat Hunting Team

    Tuesday14:00 - 16:0004 Jun 2019
    Security Workshop

    In the first half of this interactive workshop, we’ll talk about what goes into making a SOC work effectively. As well as providing the core monitoring and inci...

    • Language: English

  • Troll Hunting Using Behavioural Analytics

    Tuesday14:00 - 14:2504 Jun 2019
    Tech Talks

    Influence operation on the web and in social media today target everything from elections to corporate interests and high profile individuals. In this talk we p...

    • Language: English

  • Cybercriminal Abuse in European IP Space

    Tuesday14:15 - 15:0004 Jun 2019
    Geek Street

    Through concrete use cases and practical examples we will learn how to track criminal hosting infrastructures and we will understand the taxonomy and business m...

    • Language: English

  • Red Team, Blue team: Two Sides of the Same Coin

    Tuesday14:15 - 15:1504 Jun 2019
    Information Security Exchange

    Our industry has adopted myriad attack detection tactics, security frameworks, threat intelligence schemes, and incident response plans over the past few decade...

    • Language: English

  • The Future of Authentication

    Tuesday14:40 - 14:5504 Jun 2019
    Cyber Innovation Showcase

    Data leaks and password thefts have proven that password-based authentication approach is inadequate to preserve security and privacy for IT systems. Behavioura...

    • Language: English

  • The More We Share, the More Resilient We Are: Why Threat Intelligence is the Future of Cybersecurity

    Tuesday14:40 - 15:0504 Jun 2019
    Tech Talks

    Sharing threat intelligence can be the difference in a company bouncing back from or suffering through a cyberattack, perhaps never recovering. The future of en...

    • Language: English

  • FutureTech: Future Proofing Cybersecurity for the Next Tech Frontier: Quantum, AI, Blockchain

    Tuesday15:15 - 16:1504 Jun 2019
    Keynote Stage

    Panel Discussion Technology is advancing at breakneck speed generating a lot of media and marketing hype – but what do these developments really mean for infor...

    • Language: English

  • Two Attacks for the Price of One? Defending Against Multi-Intent Malware

    Tuesday15:20 - 15:4504 Jun 2019
    Tech Talks

    Malware engineers are diversifying their businesses with multi-intent malware, where a single successful compromise can open up multiple streams of revenue. In ...

    • Language: English

  • Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx

    Tuesday15:30 - 15:4504 Jun 2019
    Cyber Innovation Showcase

    Download Presentation As we face an ever-larger number of increasingly more complex cyber threats in networks operating at ever greater speeds, the developers ...

    • Language: English

  • Bringing Rapid Prototyping to the Threat Model Process

    Tuesday15:30 - 16:1504 Jun 2019
    Geek Street

    Introduction to the Rapid Threat Model Prototyping methodology, a radical departure from standard architectural threat modeling. This new methodology allows sof...

    • Language: English

  • Automate Remote Access Procedures & Configurations

    Tuesday15:55 - 16:2004 Jun 2019
    Cyber Innovation Showcase

    Combis ARA (Automated Remote Access) is a state of the art, unified remote access management solution, that includes: On-line application for remote access re...

    • Language: English

  • Combating Open Source Security Vulnerabilities Without Slowing Down Developers

    Tuesday16:00 - 16:2504 Jun 2019
    Tech Talks

    Development teams are facing nowadays an unprecedented challenge to accommodate requirements of application security while maintaining an agile development proc...

    • Language: English

  • Death of the Password: Picture Authentication

    Tuesday16:40 - 17:0504 Jun 2019
    Technology Showcase

    Say goodbye to passwords! PixelPin offers an alternative authentication method to traditional passwords and biometrics, by utilising pictures to create a deligh...

    • Language: English

  • Destination Unknown: A Data Science Perspective on UEBA Deployment

    Tuesday16:40 - 17:0504 Jun 2019
    Tech Talks

    User and Entity Behaviour Analytics (UEBA) has emerged as a viable tool in detecting security threats that are otherwise impossible to find via traditional appr...

    • Language: English

  • How to Monitor & Protect Your Network Using NetFlow/IPFIX Data

    Wednesday10:00 - 10:2505 Jun 2019
    Technology Showcase

    A fast, reliable and well secured network is of crucial importance to any organisation. Flowmon is the answer to this challenge using leading edge IP flow monit...

    • Language: English

  • Workshop 3: Is AI the Answer to Reducing Cyber-Attack Risks?

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    The media makes sensationalistic claims about AI. Is it a rising trend or just a buzzword? Trendy or not, Cisco has been using AI for years to help businesses ...

    • Language: English

  • The Zero-Trust Approach for Your Alert Haystack

    Wednesday10:00 - 10:2505 Jun 2019
    Tech Talks

    Current approaches for SOC automation are focused on making alerts more consumable and running playbooks, but ultimately defenders run the risk of having their ...

    • Language: English

  • Workshop 4: Threat Hunting Workshop

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    Join your peers and other security experts for our interactive Threat Hunting Workshop. After the workshop, you'll walk away with an in-depth knowledge on how ...

    • Language: English

  • The Future of Authentication

    Wednesday10:30 - 10:4505 Jun 2019
    Cyber Innovation Showcase

    Data leaks and password thefts have proven that password-based authentication approach is inadequate to preserve security and privacy for IT systems. Behavioura...

    • Language: English

  • Managing the Insider Threat: Why Visibility is Critical

    Wednesday10:30 - 11:0005 Jun 2019
    Talking Tactics

    Ponemon research shows that the average time to spot and contain an insider threat is 72 days - only 16% of incidents are identified and contained within 30 day...

    • Language: English

  • Deep Dive: Using Artificial Intelligence to Impersonate a Human & Undertake Vishing Attacks

    Wednesday10:30 - 11:1505 Jun 2019
    Geek Street

    Hear no Evil see no Evil; How an AI system was developed that could disguise itself as a human and deceive people. How did this work, what could it achieve? In ...

    • Language: English

  • Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

    Wednesday10:40 - 11:0505 Jun 2019
    Technology Showcase

    Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuf...

    • Language: English

  • Short, Brutal & Nasty: New Domains & Their Life & Times

    Wednesday10:40 - 11:0505 Jun 2019
    Tech Talks

    Domain names are cheap, easy-to-get assets – the perfect tool for the perfect crime. In this presentation, internet pioneer and Farsight Security CEO Dr. Paul V...

    • Language: English

  • Human Risk Protection

    Wednesday10:55 - 11:1005 Jun 2019
    Cyber Innovation Showcase

    Academic studies have demonstrated and explained the ineffectiveness of security awareness and education (Bada, Sasse & Nurse, 2016) and CISOs are seeing it eve...

    • Language: English

  • Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx

    Wednesday11:20 - 11:3505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation As we face an ever-larger number of increasingly more complex cyber threats in networks operating at ever greater speeds, the developers ...

    • Language: English

  • Anatomy of a Cyber Attack: DNSpionage

    Wednesday11:20 - 11:4505 Jun 2019
    Tech Talks

    Threat actors continuously search for new techniques to compromise their victims. Recently, Cisco Talos identified a new malicious campaign named “DNSpionage”. ...

    • Language: English

  • Regulating the IoT. A Dream too far?

    Wednesday11:45 - 12:3005 Jun 2019
    Geek Street

    In this presentation you’ll get a potted history of the shambles that is IoT security. You’ll gain an understanding of systemic security issues, and how and why...

    • Language: English

  • The Battle to Protect Public Services Against Phishing Attacks

    Wednesday12:00 - 12:3005 Jun 2019
    Talking Tactics

    A growing priority for Nikola Howard, Data Centre Manager at the London Borough of Camden, has been the need to keep employee and residents’ inboxes safe from t...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.