Your Search

 

2019 Conference

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 64 of 103 results

|

Items per page:

Sort By
  • Workshop 4: Tales from the SOC

    Tuesday10:00 - 12:0004 Jun 2019
    Security Workshop

    Let Neustar take you through the key workings of our world class SOC. Learn how we mitigate attacks of all shapes and sizes. Get an overview of the types of att...

    • Language: English

  • Cryptojacking: What You Need to Know

    Tuesday10:00 - 10:2504 Jun 2019
    Tech Talks

    In his talk, Chris Marrison, Consulting Solutions Architect at Infoblox, will provide a brief yet informative history on everything ‘crypto’, including crypto c...

    • Language: English

  • Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions

    Tuesday10:00 - 10:2504 Jun 2019
    Strategy Talks

    Wishful thinking won’t protect your data and systems. Without understanding two key psychological constructs, motivated reasoning and decision fatigue, people w...

    • Language: English

  • Headliner to be announced...

    Tuesday10:15 - 11:0504 Jun 2019
    Keynote Stage

    Details to be announced.

    • Language: English

  • Embracing Zero Trust (When You Aren't the World's Largest Internet Company)

    Tuesday10:30 - 11:3004 Jun 2019
    Information Security Exchange

    In 2014, Google published “BeyondCorp: A New Approach to Enterprise Security” detailing their implementation of Zero Trust networks and the industry was aflutte...

    • Language: English

  • Digitalisation & the Cyber INsecurity Gap

    Tuesday10:40 - 11:0504 Jun 2019
    Technology Showcase

    79% of executives report their organisation is adopting new technologies faster than they can address security issues. As companies rely more on digital IT, clo...

    • Language: English

  • Cyber Threat Intelligence and Criminal Innovation

    Tuesday10:40 - 11:0504 Jun 2019
    Strategy Talks

    In this talk Max Vetter will explore the innovative nature of cyber criminals and demonstrate why they are consistently ahead of the game. He will also introduc...

    • Language: English

  • AI: Past Failures, Current Capability & the Future of "Nation State" Defence

    Tuesday10:40 - 11:0504 Jun 2019
    Tech Talks

    With an increasing skills gap and wave of autonomous attacks, military, governments and global enterprises are asking industry to deliver “self-healing, self-de...

    • Language: English

  • What’s New with the ePrivacy Regulation? Key Considerations for Tomorrow’s Electronic Communications

    Tuesday11:15 - 11:4504 Jun 2019
    Talking Tactics

    The ePrivacy Regulation will have a profound effect on marketing activities moving forward. Faced with the legal and financial ramifications of ignoring a consu...

    • Language: English

  • The Key to Securing Your Hybrid Cloud Starts with "ABC"

    Tuesday11:20 - 11:4504 Jun 2019
    Technology Showcase

    Many enterprises are adopting a cloud-first strategy to drive their business. As cloud deployments increase, security requirements increase with them, leading t...

    • Language: English

  • Building Brand Infosec: Engaging Employees to Drive Secure Behaviour

    Tuesday11:25 - 12:3504 Jun 2019
    Keynote Stage

    Panel Discussion High profile breaches over the last 12 months have demonstrated that no matter how much sophisticated security technology is in place, it cann...

    • Language: English

  • API Security: What you Absolutely Need to Know Now, with Real World Examples of API Attacks

    Tuesday11:45 - 12:4504 Jun 2019
    Information Security Exchange

    In 2018, at least 85% of organisations consider web APIs and API-based integration fundamental to their business strategy and continued success. However, the ex...

    • Language: English

  • Malware, Security Analytics & Cybersecurity in 2019

    Tuesday12:00 - 12:2504 Jun 2019
    Technology Showcase

    Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decade...

    • Language: English

  • "Yes We Can Get In. Now What?"

    Tuesday12:00 - 12:2504 Jun 2019
    Tech Talks

    The results of a red-team test (or breach) can be a thunderclap under a clear blue sky. The recommendations might look idealistic and expensive. Management migh...

    • Language: English

  • Neither Phish nor Flash: How Cyber-criminals Target Business Email Inboxes Without Phishing

    Tuesday12:00 - 12:2504 Jun 2019
    Strategy Talks

    Well-resourced actors typically access business email accounts through targeted phishing campaigns or using information-stealing malware. The barriers to entry,...

    • Language: English

  • The Digital Risk Dilemma: How to Protect What You Don’t Control

    Tuesday12:40 - 13:0504 Jun 2019
    Strategy Talks

    Everyday more of your attack surface moves to web infrastructure that you neither own nor directly control. To protect your digital assets and thwart malicious ...

    • Language: English

  • Metrics that Matters: Help Management with Decision Making and Improve Security Posture of the Organisation

    Tuesday12:40 - 13:0504 Jun 2019
    Tech Talks

    Information Security Metrics presents a holistic view of the information security posture of the organisation and help the management with decision making to pr...

    • Language: English

  • Incident & Breach Management for Privacy & Security Teams

    Tuesday12:45 - 13:1504 Jun 2019
    Talking Tactics

    Privacy and security professionals often approach incident and breach response from two different outlooks. Whereas security teams focus on threat vectors, priv...

    • Language: English

  • It’s all About Peanut Butter: Building a Multi-Disciplinary Infosec Team to Manage Cyber Risk

    Tuesday12:55 - 13:3504 Jun 2019
    Keynote Stage

    Keynote Presentation Ever been told that security always says NO? Or asked why we need information security when we’re merely in the business of selling peanut...

    • Language: English

  • DNS: Cybersecurity’s Best Kept Secret for Eliminating Network Threats

    Tuesday13:00 - 14:0004 Jun 2019
    Information Security Exchange

    Growing numbers of cyber threats and volumes of data are creating significant problems. Stretched security teams need to keep networks secure, yet still cope wi...

    • Language: English

  • Your Smart Scale Leaks More Than Just Your Weight

    Tuesday13:20 - 13:4504 Jun 2019
    Tech Talks

    Smart devices are a big part of our lives. Bluetooth Smart (BLE), which was introduced on IoT devices in 2011, made their number explode. So now we have cheaper...

    • Language: English

  • SSH Keys: Security Asset or Liability?

    Tuesday13:20 - 13:4504 Jun 2019
    Strategy Talks

    All enterprises rely on SSH for routine administrative tasks by systems administrators, as well as for secure machine-to-machine automation of critical business...

    • Language: English

  • Building or Modernising Own CSIRT/SOC: Practical Tips

    Tuesday13:45 - 14:1504 Jun 2019
    Talking Tactics

    The presentation will centre around cybersecurity capability build-out via the establishment of governmental, sectorial and organisational Computer Security Inc...

    • Language: English

  • CyberThreat: Rethinking Cyber Defence to Combat Complex Risks, Threats & Vulnerabilities

    Tuesday13:55 - 14:5504 Jun 2019
    Keynote Stage

    Panel Discussion As the attack landscape becomes ever more complex as organisations digitise and transform, and cybercriminals use increasingly sophisticated t...

    • Language: English

  • Troll Hunting Using Behavioural Analytics

    Tuesday14:00 - 14:2504 Jun 2019
    Tech Talks

    Influence operation on the web and in social media today target everything from elections to corporate interests and high profile individuals. In this talk we p...

    • Language: English

  • Expense in Depth: Managing Your Total Cost of Controls

    Tuesday14:00 - 14:2504 Jun 2019
    Strategy Talks

    Cylance Chief Security and Trust Officer Malcolm Harkins will show how current approaches to information security are economically inefficient and why a Total C...

    • Language: English

  • Red Team, Blue team: Two Sides of the Same Coin

    Tuesday14:15 - 15:1504 Jun 2019
    Information Security Exchange

    Our industry has adopted myriad attack detection tactics, security frameworks, threat intelligence schemes, and incident response plans over the past few decade...

    • Language: English

  • 10 Ways to Stop Phishing Attacks

    Tuesday14:30 - 15:0004 Jun 2019
    Talking Tactics

    77% of phishing attacks in 2018 targeted financial institutions and phishing sites now use SSL certificates and HTTPS to trick your Internet users. Unsurprising...

    • Language: English

  • Turning a Ship Takes Planning & Effort from Every Angle

    Tuesday14:40 - 15:0504 Jun 2019
    Strategy Talks

    Changing the attitudes and behaviours of employees within an organisation can be a gargantuan task. From appropriately managing incidents to creating efficient ...

    • Language: English

  • The More We Share, the More Resilient We Are: Why Threat Intelligence is the Future of Cybersecurity

    Tuesday14:40 - 15:0504 Jun 2019
    Tech Talks

    Sharing threat intelligence can be the difference in a company bouncing back from or suffering through a cyberattack, perhaps never recovering. The future of en...

    • Language: English

  • FutureTech: Future Proofing Cybersecurity for the Next Tech Frontier: Quantum, AI, Blockchain

    Tuesday15:15 - 16:1504 Jun 2019
    Keynote Stage

    Panel Discussion Technology is advancing at breakneck speed generating a lot of media and marketing hype – but what do these developments really mean for infor...

    • Language: English

  • How to Find Infrastructure Shadow IT in the Cloud

    Tuesday15:15 - 15:4504 Jun 2019
    Talking Tactics

    The cloud has enabled increases in agility and cost savings in IT, but has allowed employees to buy and provision out-of-policy cloud infrastructure without app...

    • Language: English

  • Two Attacks for the Price of One? Defending Against Multi-Intent Malware

    Tuesday15:20 - 15:4504 Jun 2019
    Tech Talks

    Malware engineers are diversifying their businesses with multi-intent malware, where a single successful compromise can open up multiple streams of revenue. In ...

    • Language: English

  • CISO: Do You Know What Your Data is up to?

    Tuesday15:20 - 15:4504 Jun 2019
    Strategy Talks

    Data is the new Currency and we have a responsibility to protect it. With the amounts of data growing out of control, machine learning and AI technology is mand...

    • Language: English

  • Optimising Security Operations Using Ecosystem Integrations, DNS & Threat Intel Data

    Tuesday15:20 - 15:4504 Jun 2019
    Technology Showcase

    Your enterprise network relies on a vast assortment of security devices and solutions, each generating their own alerts. More often than not, security teams don...

    • Language: English

  • Automate Remote Access Procedures & Configurations

    Tuesday15:55 - 16:2004 Jun 2019
    Cyber Innovation Showcase

    Combis ARA (Automated Remote Access) is a state of the art, unified remote access management solution, that includes: On-line application for remote access re...

    • Language: English

  • Combating Open Source Security Vulnerabilities Without Slowing Down Developers

    Tuesday16:00 - 16:2504 Jun 2019
    Tech Talks

    Development teams are facing nowadays an unprecedented challenge to accommodate requirements of application security while maintaining an agile development proc...

    • Language: English

  • The Song Remains the Same: Moving the Cybersecurity Dial…

    Tuesday16:00 - 16:2504 Jun 2019
    Strategy Talks

    We're still victim of vulnerabilities which are more than 20 years old despite the evolution of cyber security solutions in the same period.  How can we truly ...

    • Language: English

  • Cyber-Physical Security: Cyber Risk Management Strategies for Connected OT & IT Networks

    Tuesday16:30 - 17:2504 Jun 2019
    Keynote Stage

    In Conversation Traditionally, IT and OT are separate functions with different priorities – confidentiality and privacy versus safety and availability. Most op...

    • Language: English

  • Personality Traits Meet Cybersecurity

    Tuesday16:40 - 17:0504 Jun 2019
    Strategy Talks

    The art of “people hacking” tricks people into unwillingly participate in scams. Certain personality traits make people more (and less) likely to fall prey to s...

    • Language: English

  • Destination Unknown: A Data Science Perspective on UEBA Deployment

    Tuesday16:40 - 17:0504 Jun 2019
    Tech Talks

    User and Entity Behaviour Analytics (UEBA) has emerged as a viable tool in detecting security threats that are otherwise impossible to find via traditional appr...

    • Language: English

  • Workshop 3: Is AI the Answer to Reducing Cyber-Attack Risks?

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    The media makes sensationalistic claims about AI. Is it a rising trend or just a buzzword? Trendy or not, Cisco has been using AI for years to help businesses ...

    • Language: English

  • The Zero-Trust Approach for Your Alert Haystack

    Wednesday10:00 - 10:2505 Jun 2019
    Tech Talks

    Current approaches for SOC automation are focused on making alerts more consumable and running playbooks, but ultimately defenders run the risk of having their ...

    • Language: English

  • Demystifying Intelligence-Led Red Teaming: What It Is and How to Automate It

    Wednesday10:00 - 10:2505 Jun 2019
    Strategy Talks

    On May 2018, the European Central Bank published the TIBER-EU, a framework for testing financial sector resilience to cyber attacks. TIBER-EU framework puts an...

    • Language: English

  • Workshop 4: Threat Hunting Workshop

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    Join your peers and other security experts for our interactive Threat Hunting Workshop. After the workshop, you'll walk away with an in-depth knowledge on how ...

    • Language: English

  • Headliner to be announced...

    Wednesday10:15 - 11:0505 Jun 2019
    Keynote Stage

    Details to be announced.

    • Language: English

  • Short, Brutal & Nasty: New Domains & Their Life & Times

    Wednesday10:40 - 11:0505 Jun 2019
    Tech Talks

    Domain names are cheap, easy-to-get assets – the perfect tool for the perfect crime. In this presentation, internet pioneer and Farsight Security CEO Dr. Paul V...

    • Language: English

  • Modern Cyber Threats & Prioritising Security Controls to Combat Them

    Wednesday10:40 - 11:0505 Jun 2019
    Strategy Talks

    Another year, another security show, what silver bullets are you hunting for this go round? In reality the threats we face today may be more sophisticated than ...

    • Language: English

  • Device Centric Security Strategies for the Modern Work Place

    Wednesday11:20 - 11:4505 Jun 2019
    Technology Showcase

    Mobile devices in law firms now generate more corporate traffic than laptops or PCs. However traditional security investments such as SWG and EPP don't pay off ...

    • Language: English

  • Managing Supply Chain Risk

    Wednesday11:25 - 12:0505 Jun 2019
    Keynote Stage

    Special Focus The traditional network perimeter is vanishing as organisational complexity and sprawl increase and third parties are used to enhance business ag...

    • Language: English

  • Don’t Acquire Your Next Breach: Managing Vendor Risk Under the GDPR

    Wednesday11:45 - 12:4505 Jun 2019
    Information Security Exchange

    Managing vendor risk before, during and after onboarding is a continuous effort under the GDPR and impending data protection regulations. While outsourcing oper...

    • Language: English

  • It Might Get Loud! Exfiltrating Data Using Audio Interfaces

    Wednesday12:00 - 12:2505 Jun 2019
    Tech Talks

    Turning files into analogue signals is not a novel idea, modems did this many years ago... But how about using a USB soundcard to transfer files from a computer...

    • Language: English

  • Why do Software Flaws Persist so Long After Being Discovered?

    Wednesday12:00 - 12:2505 Jun 2019
    Strategy Talks

    It takes time to fix security flaws. But developers simply can’t wave a magic wand over the portfolio to fix the majority of flaws in an instant, or even a week...

    • Language: English

  • Cracking the Complexity Conundrum: How to Secure, Patch & Protect Complex, Dynamic Organisations

    Wednesday12:25 - 13:2505 Jun 2019
    Keynote Stage

    Panel Discussion Enterprises are more dynamic and complex than ever before.  From working practices, agile development and the latest technologies, to multiple...

    • Language: English

  • Malware, Security Analytics & Cybersecurity in 2019

    Wednesday12:40 - 13:0505 Jun 2019
    Technology Showcase

    Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decade...

    • Language: English

  • Practical DevSecOps: The Simple Free Pipeline Anyone Can Create

    Wednesday12:40 - 13:0505 Jun 2019
    Tech Talks

    After this talk, you'll be able to establish your own DevSecOps pipeline immediately. This reference implementation can be adapted easily to almost any tools an...

    • Language: English

  • Strategic Autonomous Response: Learning from Patient Zero to Protect the Network at Large

    Wednesday12:40 - 13:0505 Jun 2019
    Strategy Talks

    With email still the most common vector of attack, it is time for a new approach to defending our digital businesses. AI cyber defences can now be deployed acro...

    • Language: English

  • How the UK’s Data Protection Act of 2018 Impacts Your GDPR Programme

    Wednesday12:45 - 13:1505 Jun 2019
    Talking Tactics

    While the UK's Data Protection Act of 2018 complements the GDPR, there are several key pieces that impact how individual's personal data is managed. The Act sup...

    • Language: English

  • Monitoring Active Directory & Windows: Indications you are Under Attack

    Wednesday13:20 - 13:4505 Jun 2019
    Tech Talks

    Most attackers will take the path of least resistance when trying to breach your environment. It makes sense that monitoring the common attack paths could resul...

    • Language: English

  • App-abet Soup: Should You DAST, SAST, IAST or RASP?

    Wednesday13:20 - 13:4505 Jun 2019
    Strategy Talks

    While web applications offer convenience to businesses and customers alike, their ubiquity makes them a popular attack target for cybercriminals. As a result, w...

    • Language: English

  • Challenges in Securing Open Source Components

    Wednesday13:20 - 13:4505 Jun 2019
    Technology Showcase

    Open Source Components can provide a huge advantage for software developers in terms of speed of delivery and range of functionality but they can also represent...

    • Language: English

  • Solving the Identity Crisis: IAM for the Digital Age

    Wednesday13:45 - 14:2505 Jun 2019
    Keynote Stage

    Keynote Presentation As organisational complexity increases, the role of identity in protecting information assets has never been more crucial. Increased conne...

    • Language: English

  • Workshop 4: Secure Programming in Java

    Wednesday14:00 - 16:0005 Jun 2019
    Security Workshop

    A 2017 study conducted by DevOps.com found that 76% of developers indicated security and secure development education needed for today’s world of coding is miss...

    • Language: English

  • Evasive Malware: How Attackers Bypass Dynamic Analysis

    Wednesday14:00 - 14:2505 Jun 2019
    Tech Talks

    Mimecast’s Chief Scientist of Advanced Malware, Meni Farjon, will showcase high and low-level, known and unknown techniques for malware authors to evade current...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.