Your Search

  • Topic Area

Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 10 of 10 results

|

Items per page:

Sort By
  • An Introduction to Exploitation

    Tuesday10:30 - 11:1505 Jun 2018
    Geek Street

    Exploits have been the core of how cyber criminals and nation state actors distribute malicious code for many years, from popping shells remotely to exploiting ...

    • Language: English

  • Crypto Currency Mining: How, Why, When & How to Prevent My Computer Power Being Stolen!

    Tuesday12:00 - 12:2505 Jun 2018
    Tech Talks

    Crypto coin mining is emerging as a new way to monetise visitor traffic. As users become savvier and increasingly use ad blockers, advertisers revenue is declin...

    • Language: English

  • Email Fraud Defence: Catch the Imposter and Authenticate Legitimate Communications

    Tuesday12:40 - 13:0505 Jun 2018
    Technology Showcase

    Highly targeted imposter emails are the biggest threat to organisations today, tricking users into divulging critical data and funds. Learn how Proofpoint can p...

    • Language: English

  • Taking Control of Ransomware & Other Malware Threats

    Tuesday13:00 - 13:3005 Jun 2018
    Talking Tactics

    Ransomware and malware attacks are nothing new. Many organisations have been on the receiving end of these types of attacks for years. Common advice is to ensur...

    • Language: English

  • War Stories on Powering Incident Response with Intelligence

    Wednesday12:40 - 13:0506 Jun 2018
    Strategy Talks

    This talk will demonstrate how to create and curate intelligence for faster decision-making and more effective incident response. The key to doing this is getti...

    • Language: English

  • Workshop 4: Live Interactive Protection Simulation: Building a Cyber Defence Strategy

    Wednesday14:00 - 16:0006 Jun 2018
    Security Workshops

    The Kaspersky Interactive Protection Simulation (KIPS) delivers a fresh and engaging approach to cybersecurity. Wondering how cyberthreats can affect your busin...

    • Language: English

  • Real-World Cyberwar: The Lessons Learned

    Wednesday14:40 - 15:0506 Jun 2018
    Strategy Talks

    Estonia is a small country in the Baltics, however it has been at the forefront of technology for many years. This keynote provides the story from Estonia's ind...

    • Language: English

  • Complex Event Processing & Situational Awareness in the Digital Age

    Wednesday16:40 - 17:0506 Jun 2018
    Tech Talks

    Today’s threat landscape has evolved, presenting security practitioners with greater challenges than ever before. When put together with the understanding that ...

    • Language: English

  • Serverless Infections - Malware Just Found a New Home

    Thursday13:20 - 13:4507 Jun 2018
    Tech Talks

    We challenged our Checkmarx Research Team to implement the first-ever RCE (Remote Code Execution) attack in a serverless environment that is both stored and vir...

    • Language: English

  • Workshop 1: Is This the Year of the Cyber Professional?

    Thursday13:30 - 15:3007 Jun 2018
    Security Workshops

    At the moment there are multiple views and initiatives on how to fill skills gaps and develop the profession. There is an increasing call for more formality fro...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.