Your Search

Reset Search
 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 31 of 31 results

|

Items per page:

Sort By
  • Cryptojacking: What You Need to Know

    Tuesday10:00 - 10:2504 Jun 2019
    Tech Talks

    In his talk, Chris Marrison, Consulting Solutions Architect at Infoblox, will provide a brief yet informative history on everything ‘crypto’, including crypto c...

    • Language: English

  • AI: Past Failures, Current Capability & the Future of "Nation State" Defence

    Tuesday10:40 - 11:0504 Jun 2019
    Tech Talks

    With an increasing skills gap and wave of autonomous attacks, military, governments and global enterprises are asking industry to deliver “self-healing, self-de...

    • Language: English

  • Is That Really You? The Importance of Identity in Breach Readiness & Response

    Tuesday11:20 - 11:4504 Jun 2019
    Tech Talks

    Monitoring your users’ access and privileges, and securing them as they interact with the internet is core to a Zero Trust approach to cybersecurity. But what i...

    • Language: English

  • "Yes We Can Get In. Now What?"

    Tuesday12:00 - 12:2504 Jun 2019
    Tech Talks

    The results of a red-team test (or breach) can be a thunderclap under a clear blue sky. The recommendations might look idealistic and expensive. Management migh...

    • Language: English

  • Devil in the Details: A Reverse Engineering Campaign Across 30 Financial Services Mobile Apps

    Tuesday12:40 - 13:0504 Jun 2019
    Tech Talks

    Following a six-week research study I performed into reverse engineering financial services mobile apps, I am on a world tour unveiling my vulnerability finding...

    • Language: English

  • Your Smart Scale Leaks More Than Just Your Weight

    Tuesday13:20 - 13:4504 Jun 2019
    Tech Talks

    Smart devices are a big part of our lives. Bluetooth Smart (BLE), which was introduced on IoT devices in 2011, made their number explode. So now we have cheaper...

    • Language: English

  • Troll Hunting Using Behavioural Analytics

    Tuesday14:00 - 14:2504 Jun 2019
    Tech Talks

    Influence operation on the web and in social media today target everything from elections to corporate interests and high profile individuals. In this talk we p...

    • Language: English

  • The More We Share, the More Resilient We Are: Why Threat Intelligence is the Future of Cybersecurity

    Tuesday14:40 - 15:0504 Jun 2019
    Tech Talks

    Sharing threat intelligence can be the difference in a company bouncing back from or suffering through a cyberattack, perhaps never recovering. The future of en...

    • Language: English

  • Two Attacks for the Price of One? Defending Against Multi-Intent Malware

    Tuesday15:20 - 15:4504 Jun 2019
    Tech Talks

    Malware engineers are diversifying their businesses with multi-intent malware, where a single successful compromise can open up multiple streams of revenue. In ...

    • Language: English

  • Combating Open Source Security Vulnerabilities Without Slowing Down Developers

    Tuesday16:00 - 16:2504 Jun 2019
    Tech Talks

    Development teams are facing nowadays an unprecedented challenge to accommodate requirements of application security while maintaining an agile development proc...

    • Language: English

  • Destination Unknown: A Data Science Perspective on UEBA Deployment

    Tuesday16:40 - 17:0504 Jun 2019
    Tech Talks

    User and Entity Behaviour Analytics (UEBA) has emerged as a viable tool in detecting security threats that are otherwise impossible to find via traditional appr...

    • Language: English

  • The Zero-Trust Approach for Your Alert Haystack

    Wednesday10:00 - 10:2505 Jun 2019
    Tech Talks

    Current approaches for SOC automation are focused on making alerts more consumable and running playbooks, but ultimately defenders run the risk of having their ...

    • Language: English

  • Short, Brutal & Nasty: New Domains & Their Life & Times

    Wednesday10:40 - 11:0505 Jun 2019
    Tech Talks

    Domain names are cheap, easy-to-get assets – the perfect tool for the perfect crime. In this presentation, internet pioneer and Farsight Security CEO Dr. Paul V...

    • Language: English

  • Anatomy of a Cyber Attack: DNSpionage

    Wednesday11:20 - 11:4505 Jun 2019
    Tech Talks

    Threat actors continuously search for new techniques to compromise their victims. Recently, Cisco Talos identified a new malicious campaign named “DNSpionage”. ...

    • Language: English

  • It Might Get Loud! Exfiltrating Data Using Audio Interfaces

    Wednesday12:00 - 12:2505 Jun 2019
    Tech Talks

    Turning files into analogue signals is not a novel idea, modems did this many years ago... But how about using a USB soundcard to transfer files from a computer...

    • Language: English

  • Practical DevSecOps: The Simple Free Pipeline Anyone Can Create

    Wednesday12:40 - 13:0505 Jun 2019
    Tech Talks

    After this talk, you'll be able to establish your own DevSecOps pipeline immediately. This reference implementation can be adapted easily to almost any tools an...

    • Language: English

  • Monitoring Active Directory & Windows: Indications you are Under Attack

    Wednesday13:20 - 13:4505 Jun 2019
    Tech Talks

    Most attackers will take the path of least resistance when trying to breach your environment. It makes sense that monitoring the common attack paths could resul...

    • Language: English

  • Evasive Malware: How Attackers Bypass Dynamic Analysis

    Wednesday14:00 - 14:2505 Jun 2019
    Tech Talks

    Mimecast’s Chief Scientist of Advanced Malware, Meni Farjon, will showcase high and low-level, known and unknown techniques for malware authors to evade current...

    • Language: English

  • The Impact of Protocol Evolution on Network Security

    Wednesday14:40 - 15:0505 Jun 2019
    Tech Talks

    New protocols such as TLS 1.3, QUIC, DNS over HTTPS are designed to enhance privacy and end-user experience. However, these new protocols also have an impact on...

    • Language: English

  • Cryptojacking: The Ghost of Cloud Security

    Wednesday15:20 - 15:4505 Jun 2019
    Tech Talks

    A new threat called cryptojacking that illicitly mines cryptocurrency was first documented on CBS’s showtime networks in late 2017. By mid-2018, cryptojacking h...

    • Language: English

  • Evasive Phishing: New Attacks, Techniques & Trends

    Wednesday16:00 - 16:2505 Jun 2019
    Tech Talks

    We are experiencing a ‘perfect phishing storm’ of increasing sophistication, volume, and targeting in phishing attacks, driven by the maturation of the phishing...

    • Language: English

  • Putting Your Cyber Posture to The Test: Live Demo of Hacking an Enterprise

    Wednesday16:40 - 17:0505 Jun 2019
    Tech Talks

    How secure are your IT systems? Can your information security defences withstand the force of a machine-based hacking attack? The new technology, Automated Pene...

    • Language: English

  • Securing Smarter Cities: Practical Protocol & Policy

    Thursday10:00 - 10:2506 Jun 2019
    Tech Talks

    Attendees will learn of the security and privacy successes – and failures – of smart city initiatives. By examining components of smart cities (transport system...

    • Language: English

  • Automating Business Security is Possible: Why do so Many Enterprises Not Know & Are They Missing Out?

    Thursday10:40 - 11:0506 Jun 2019
    Tech Talks

    Business certificate management is an often-overlooked but vital issue in the enterprise. Manual management can result in outages and time wastage; this talk ex...

    • Language: English

  • How to Detect Malware in Encrypted Traffic, Without Decrypting it, Using Artificial Intelligence

    Thursday11:20 - 11:4506 Jun 2019
    Tech Talks

    The rapid rise of encrypted traffic is changing the threat landscape. It’s reported that as of 2018, nearly half of all Internet traffic is protected by HTTPS a...

    • Language: English

  • Hunting for Zero-Days

    Thursday12:00 - 12:2506 Jun 2019
    Tech Talks

    New vulnerabilities are being found in code daily. Infact, 18,000+ new vulnerabilities are estimated to be disclosed in 2018, with a current growth rate of 27 p...

    • Language: English

  • How to Identify and Prevent Evasive Threats Using your Organisation’s Data

    Thursday12:40 - 13:0506 Jun 2019
    Tech Talks

    Stealth operations that were once only possible for the most sophisticated state-actors, are now much more common. These new and sophisticated techniques bring ...

    • Language: English

  • The Devil Inside

    Thursday13:20 - 13:4506 Jun 2019
    Tech Talks

    Identifying, building and acting on insider threat cases. This will include discussion of criminal trends and investigative practices, as well as balancing data...

    • Language: English

  • Overcome the Tech & Politics of Securing Critical National Infrastructure (CNI)

    Thursday14:00 - 14:2506 Jun 2019
    Tech Talks

    The National Cyber Security Centre (NCSC) has warned that hostile states will attempt deadly cyberattacks against UK infrastructure, but argues that the UK gove...

    • Language: English

  • Automate or Die: DevSecOps in the Age of Software Supply Chain Attacks

    Thursday14:40 - 15:0506 Jun 2019
    Tech Talks

    As nimble organisations deliver new innovations, adversaries are also upping their game, something we’ve seen in recent high profile and devastating cyberattack...

    • Language: English

  • The Power Hacker: Don’t Let the Lights Go Out: A Look Inside the Mind of a Hacker

    Thursday15:20 - 15:4506 Jun 2019
    Tech Talks

    This session is a real-world hack into a power station that explains the process on planning and preparation, the major challenges of hacking into a power stati...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.