Your Search

 

2019 Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

65 - 128 of 236 results

|

Items per page:

Sort By
  • How Financial Companies Can Starve Attackers Who Live off the Land

    Tuesday14:30 - 15:1504 Jun 2019
    Insight Stage

    Securing Finance Cyberattackers and malicious insiders increasingly rely on living-off-the-land techniques. Leveraging native connectivity to move through the ...

    • Language: English

  • 10 Ways to Stop Phishing Attacks

    Tuesday14:30 - 15:0004 Jun 2019
    Talking Tactics

    77% of phishing attacks in 2018 targeted financial institutions and phishing sites now use SSL certificates and HTTPS to trick your Internet users. Unsurprising...

    • Language: English

  • Predicting the Unpredictable: A Look Into the 2019 Cyber Threat Landscape

    Tuesday14:40 - 15:0504 Jun 2019
    Technology Showcase

    Learn about the latest cyber threat landscape & how you can stay one step ahead always.

    • Language: English

  • The Future of Authentication

    Tuesday14:40 - 14:5504 Jun 2019
    Cyber Innovation Showcase

    Data leaks and password thefts have proven that password-based authentication approach is inadequate to preserve security and privacy for IT systems. Behavioura...

    • Language: English

  • Turning a Ship Takes Planning & Effort from Every Angle

    Tuesday14:40 - 15:0504 Jun 2019
    Strategy Talks

    Changing the attitudes and behaviours of employees within an organisation can be a gargantuan task. From appropriately managing incidents to creating efficient ...

    • Language: English

  • The More We Share, the More Resilient We Are: Why Threat Intelligence is the Future of Cybersecurity

    Tuesday14:40 - 15:0504 Jun 2019
    Tech Talks

    Sharing threat intelligence can be the difference in a company bouncing back from or suffering through a cyberattack, perhaps never recovering. The future of en...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Tuesday15:05 - 15:2004 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding rout...

    • Language: English

  • FutureTech: Future Proofing Cybersecurity for the Next Tech Frontier: Quantum, AI, Blockchain

    Tuesday15:15 - 16:1504 Jun 2019
    Keynote Stage

    Panel Discussion Technology is advancing at breakneck speed generating a lot of media and marketing hype – but what do these developments really mean for infor...

    • Language: English

  • How to Find Infrastructure Shadow IT in the Cloud

    Tuesday15:15 - 15:4504 Jun 2019
    Talking Tactics

    The cloud has enabled increases in agility and cost savings in IT, but has allowed employees to buy and provision out-of-policy cloud infrastructure without app...

    • Language: English

  • Security at the Speed of DevOps: Building In, Not Bolting On

    Tuesday15:20 - 15:4504 Jun 2019
    Strategy Talks

    Security embedded within DevOps reduces risk exposure up to 80%. Adopt security automation in the DevOps process, providing automation and actionable data to de...

    • Language: English

  • Two Attacks for the Price of One? Defending Against Multi-Intent Malware

    Tuesday15:20 - 15:4504 Jun 2019
    Tech Talks

    Malware engineers are diversifying their businesses with multi-intent malware, where a single successful compromise can open up multiple streams of revenue. In ...

    • Language: English

  • Building a Secure Architectural Foundation for Next Generation Networks & Digital Transformation

    Tuesday15:20 - 15:4504 Jun 2019
    Technology Showcase

    Organisations have grown their security defences as they have responded to the rapidly evolving threat landscape. This has led to a disjointed, fragile security...

    • Language: English

  • "We Take Security Seriously"

    Tuesday15:30 - 16:1504 Jun 2019
    Insight Stage

    We take security seriously – it’s a ‘throwaway’ phrase commonly used by companies who have just been breached and are trying to rebuild confidence among their s...

    • Language: English

  • Trusted Access: Excuse Me Do I Know You?

    Tuesday15:30 - 16:3004 Jun 2019
    Information Security Exchange

    Trusted Access provides a zero-trust approach to securing all access across your applications and environment, from any user, device and location. It protects y...

    • Language: English

  • Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx

    Tuesday15:30 - 15:4504 Jun 2019
    Cyber Innovation Showcase

    Download Presentation As we face an ever-larger number of increasingly more complex cyber threats in networks operating at ever greater speeds, the developers ...

    • Language: English

  • Bringing Rapid Prototyping to the Threat Model Process

    Tuesday15:30 - 16:1504 Jun 2019
    Geek Street

    Introduction to the Rapid Threat Model Prototyping methodology, a radical departure from standard architectural threat modeling. This new methodology allows sof...

    • Language: English

  • Automate Remote Access Procedures & Configurations

    Tuesday15:55 - 16:2004 Jun 2019
    Cyber Innovation Showcase

    Combis ARA (Automated Remote Access) is a state of the art, unified remote access management solution, that includes: On-line application for remote access re...

    • Language: English

  • Privileged Access Management Made Easy

    Tuesday16:00 - 16:3004 Jun 2019
    Talking Tactics

    Keeping sensitive information secure, maintaining data regulation compliance, and enabling privileged users to work efficiently, at the right levels of access, ...

    • Language: English

  • How to Secure Your Data in the Cloud

    Tuesday16:00 - 16:2504 Jun 2019
    Technology Showcase

    The cloud revolution is upon us. More and more organisations are moving their critical data to the cloud due to the tremendous potential of cloud platforms. But...

    • Language: English

  • Combating Open Source Security Vulnerabilities Without Slowing Down Developers

    Tuesday16:00 - 16:2504 Jun 2019
    Tech Talks

    Development teams are facing nowadays an unprecedented challenge to accommodate requirements of application security while maintaining an agile development proc...

    • Language: English

  • The Song Remains the Same: Moving the Cybersecurity Dial…

    Tuesday16:00 - 16:2504 Jun 2019
    Strategy Talks

    We're still victim of vulnerabilities which are more than 20 years old despite the evolution of cyber security solutions in the same period.  How can we truly ...

    • Language: English

  • Scamming you at Infosec? Easy.

    Tuesday16:30 - 16:5504 Jun 2019
    Cyber Innovation Showcase

    You may know a thing or two about cybersecurity. However, modern hackers are sophisticated, risk-calculating, online marketing experts who take social engineeri...

    • Language: English

  • Cyber-Physical Security: Cyber Risk Management Strategies for Connected OT & IT Networks

    Tuesday16:30 - 17:2504 Jun 2019
    Keynote Stage

    In Conversation Traditionally, IT and OT are separate functions with different priorities – confidentiality and privacy versus safety and availability. Most op...

    • Language: English

  • Death of the Password: Picture Authentication

    Tuesday16:40 - 17:0504 Jun 2019
    Technology Showcase

    Say goodbye to passwords! PixelPin offers an alternative authentication method to traditional passwords and biometrics, by utilising pictures to create a deligh...

    • Language: English

  • Personality Traits Meet Cybersecurity

    Tuesday16:40 - 17:0504 Jun 2019
    Strategy Talks

    The art of “people hacking” tricks people into unwillingly participate in scams. Certain personality traits make people more (and less) likely to fall prey to s...

    • Language: English

  • Destination Unknown: A Data Science Perspective on UEBA Deployment

    Tuesday16:40 - 17:0504 Jun 2019
    Tech Talks

    User and Entity Behaviour Analytics (UEBA) has emerged as a viable tool in detecting security threats that are otherwise impossible to find via traditional appr...

    • Language: English

  • Keynote Briefing: The Power of People: Amplifying our Human Capacity Through Technology & Community

    Wednesday08:15 - 09:3005 Jun 2019
    Keynote Stage

    IMPORTANT: This session is only open to people who have pre-registered and confirmed their participation as numbers are limited.   People are being empowered th...

    • Language: English

  • Women in Cybersecurity

    Wednesday08:30 - 11:0005 Jun 2019
    Women in Cybersecurity

    Infosecurity Magazine’s Women in Cybersecurity Networking Event Infosecurity Magazine’s third annual Women in Cybersecurity networking event at Infosecurity Eu...

    • Language: English

  • Workshop 2: Speed & Precision: The Keys to Stopping Modern Adversarie

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight an...

    • Language: English

  • How to Monitor & Protect Your Network Using NetFlow/IPFIX Data

    Wednesday10:00 - 10:2505 Jun 2019
    Technology Showcase

    A fast, reliable and well secured network is of crucial importance to any organisation. Flowmon is the answer to this challenge using leading edge IP flow monit...

    • Language: English

  • Workshop 1: From White House Email Prankster to White Hat Researcher: How Cyber Gangs Operate & How Businesses Can Protect Against Email Threats

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    SINON_REBORN was once an email prankster that fooled the White House, but now he hunts criminal email gangs. Learn his techniques from both sides of the coin to...

    • Language: English

  • Workshop 3: Is AI the Answer to Reducing Cyber-Attack Risks?

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    The media makes sensationalistic claims about AI. Is it a rising trend or just a buzzword? Trendy or not, Cisco has been using AI for years to help businesses ...

    • Language: English

  • The Zero-Trust Approach for Your Alert Haystack

    Wednesday10:00 - 10:2505 Jun 2019
    Tech Talks

    Current approaches for SOC automation are focused on making alerts more consumable and running playbooks, but ultimately defenders run the risk of having their ...

    • Language: English

  • Demystifying Intelligence-Led Red Teaming: What It Is & How to Automate It

    Wednesday10:00 - 10:2505 Jun 2019
    Strategy Talks

    On May 2018, the European Central Bank published the TIBER-EU, a framework for testing financial sector resilience to cyber attacks. TIBER-EU framework puts an...

    • Language: English

  • Workshop 4: Threat Hunting Workshop

    Wednesday10:00 - 12:0005 Jun 2019
    Security Workshop

    Join your peers and other security experts for our interactive Threat Hunting Workshop. After the workshop, you'll walk away with an in-depth knowledge on how ...

    • Language: English

  • Get the Benefit You Deserve from Threat Intel

    Wednesday10:05 - 10:2005 Jun 2019
    Cyber Innovation Showcase

    As Cyber Threat Intelligence moves from the sharing of indicators to the sharing of TTPs (tactics, techniques and procedures) and beyond, there are significant ...

    • Language: English

  • Discovering the Digital Underworld: Privacy, the Dark Web, Tech & Democracy

    Wednesday10:15 - 11:0505 Jun 2019
    Keynote Stage

    Opening Keynote During this session, Jamie Bartlett will take you on a journey of discovery – sharing his insight into how technology is changing society. From ...

    • Language: English

  • Zero Trust: What Does it Mean for the CISO?

    Wednesday10:30 - 11:3005 Jun 2019
    Information Security Exchange

    Adopting Zero Trust is an often-repeated phrase in the security industry, and it is growing in popularity.  Set against this is the increasing pressure on the C...

    • Language: English

  • The Future of Authentication

    Wednesday10:30 - 10:4505 Jun 2019
    Cyber Innovation Showcase

    Data leaks and password thefts have proven that password-based authentication approach is inadequate to preserve security and privacy for IT systems. Behavioura...

    • Language: English

  • Managing the Insider Threat: Why Visibility is Critical

    Wednesday10:30 - 11:0005 Jun 2019
    Talking Tactics

    Ponemon research shows that the average time to spot and contain an insider threat is 72 days - only 16% of incidents are identified and contained within 30 day...

    • Language: English

  • Optimising Cloud for Security Now You’re “Up There!”

    Wednesday10:30 - 11:3005 Jun 2019
    Leaders Programme

    Over 90% of CISOs say that leveraging cloud security solutions allows them to be more effective. Find out the secrets to their success including: Ways to use ...

    • Language: English

  • Trust No One & Suspect Everyone: Zero Trust Security Model

    Wednesday10:30 - 11:1505 Jun 2019
    Insight Stage

    Identity & Access Management A threat is a threat—whether intentional or not—and the human factor that lends itself to malicious behaviour or inadvertent error...

    • Language: English

  • Deep Dive: Using Artificial Intelligence to Impersonate a Human & Undertake Vishing Attacks

    Wednesday10:30 - 11:1505 Jun 2019
    Geek Street

    Hear no Evil see no Evil; How an AI system was developed that could disguise itself as a human and deceive people. How did this work, what could it achieve? In ...

    • Language: English

  • Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

    Wednesday10:40 - 11:0505 Jun 2019
    Technology Showcase

    Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuf...

    • Language: English

  • Short, Brutal & Nasty: New Domains & Their Life & Times

    Wednesday10:40 - 11:0505 Jun 2019
    Tech Talks

    Domain names are cheap, easy-to-get assets – the perfect tool for the perfect crime. In this presentation, internet pioneer and Farsight Security CEO Dr. Paul V...

    • Language: English

  • Modern Cyber Threats & Prioritising Security Controls to Combat Them

    Wednesday10:40 - 11:0505 Jun 2019
    Strategy Talks

    Another year, another security show, what silver bullets are you hunting for this go round? In reality the threats we face today may be more sophisticated than ...

    • Language: English

  • Human Risk Protection

    Wednesday10:55 - 11:1005 Jun 2019
    Cyber Innovation Showcase

    Academic studies have demonstrated and explained the ineffectiveness of security awareness and education (Bada, Sasse & Nurse, 2016) and CISOs are seeing it eve...

    • Language: English

  • Protecting Your Organisation's Very Attacked People

    Wednesday11:15 - 11:4505 Jun 2019
    Talking Tactics

    90% of all cyberattacks start with an email targeting your end-users. The human factor—the instincts of curiosity and trust that lead well-meaning people to cli...

    • Language: English

  • Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx

    Wednesday11:20 - 11:3505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation As we face an ever-larger number of increasingly more complex cyber threats in networks operating at ever greater speeds, the developers ...

    • Language: English

  • Anatomy of a Cyber Attack: DNSpionage

    Wednesday11:20 - 11:4505 Jun 2019
    Tech Talks

    Threat actors continuously search for new techniques to compromise their victims. Recently, Cisco Talos identified a new malicious campaign named “DNSpionage”. ...

    • Language: English

  • The Office 365 Dilemma: How Secure is Secure?

    Wednesday11:20 - 11:4505 Jun 2019
    Strategy Talks

    Office 365 has captured the imagination of many organisations, offering a wide range of productivity applications in a single platform. However, as organisation...

    • Language: English

  • Mobile Security Strategies in a Zero-Trust World

    Wednesday11:20 - 11:4505 Jun 2019
    Technology Showcase

    Mobile devices now generate more corporate traffic than laptops or PCs and an average mobile device connects to more than 100 WiFi networks each year. However t...

    • Language: English

  • View from the Board: Managing Organisational Complexity & Risk

    Wednesday11:25 - 12:0505 Jun 2019
    Keynote Stage

    Keynote Presentation During this presentation Dame Inga Beale, former CEO of Lloyds of London will share her perspective on how to change business and culture a...

    • Language: English

  • It’s Not a Legacy That Will Go Away: Securing Industrial Control Systems in the Future Business Model

    Wednesday11:30 - 12:1505 Jun 2019
    Insight Stage

    We cannot ignore vulnerabilities in Industrial Control Systems any longer; critical assets continue to be soft target for attackers with security gaps remaining...

    • Language: English

  • Building a Cybersecurity Talent Strategy to Future-Proof Your Business

    Wednesday11:45 - 12:0005 Jun 2019
    Cyber Innovation Showcase

    Download Presentation Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the government funding rout...

    • Language: English

  • Regulating the IoT. A Dream too far?

    Wednesday11:45 - 12:3005 Jun 2019
    Geek Street

    In this presentation you’ll get a potted history of the shambles that is IoT security. You’ll gain an understanding of systemic security issues, and how and why...

    • Language: English

  • Don’t Acquire Your Next Breach: Managing Vendor Risk Under the GDPR

    Wednesday11:45 - 12:4505 Jun 2019
    Information Security Exchange

    Managing vendor risk before, during and after onboarding is a continuous effort under the GDPR and impending data protection regulations. While outsourcing oper...

    • Language: English

  • The Battle to Protect Public Services Against Phishing Attacks

    Wednesday12:00 - 12:3005 Jun 2019
    Talking Tactics

    A growing priority for Nikola Howard, Data Centre Manager at the London Borough of Camden, has been the need to keep employee and residents’ inboxes safe from t...

    • Language: English

  • How to Succeed at Threat Hunting & IR: Think Differently About Data

    Wednesday12:00 - 12:2505 Jun 2019
    Technology Showcase

    Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in thes...

    • Language: English

  • It Might Get Loud! Exfiltrating Data Using Audio Interfaces

    Wednesday12:00 - 12:2505 Jun 2019
    Tech Talks

    Turning files into analogue signals is not a novel idea, modems did this many years ago... But how about using a USB soundcard to transfer files from a computer...

    • Language: English

  • Why do Software Flaws Persist so Long After Being Discovered?

    Wednesday12:00 - 12:2505 Jun 2019
    Strategy Talks

    It takes time to fix security flaws. But developers simply can’t wave a magic wand over the portfolio to fix the majority of flaws in an instant, or even a week...

    • Language: English

  • From Beyond the Wall to the Seven Kingdoms: Why Email Threat-Sharing Gives Us A Chance

    Wednesday12:10 - 12:2505 Jun 2019
    Cyber Innovation Showcase

    Download Presentation For business leaders and aspiring Iron Throne rulers.  As members of the security community suffering from the constant onslaught of cyb...

    • Language: English

  • Cracking the Complexity Conundrum: How to Secure, Patch & Protect Complex, Dynamic Organisations

    Wednesday12:25 - 13:2505 Jun 2019
    Keynote Stage

    Panel Discussion Enterprises are more dynamic and complex than ever before.  From working practices, agile development and the latest technologies, to multiple...

    • Language: English

  • AI in Security Operations Centres: What We’ve Learnt so Far

    Wednesday12:30 - 13:1505 Jun 2019
    Insight Stage

    Is it time for the traditional multi-tiered SOC to end? Get beyond the InfoSec buzzwords in this practitioner-lead session in which we'll we share our insights ...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.