Your Search

  • Topic Area

Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 32 results

|

Items per page:

Sort By
  • Workshop 4: Ways to Protect your web Infrastructure from the Ever-Growing Threat of DDoS

    Tuesday10:00 - 12:0005 Jun 2018
    Security Workshops

    Matthew Wilson, Director of engineering of Neustar's Siteprotect NG network, brings a wealth of experience from running DDoS mitigation networks at Nexusguard a...

    • Language: English

  • An Introduction to Exploitation

    Tuesday10:30 - 11:1505 Jun 2018
    Geek Street

    Exploits have been the core of how cyber criminals and nation state actors distribute malicious code for many years, from popping shells remotely to exploiting ...

    • Language: English

  • Don’t be a Victim: Defending the Borderless Enterprise

    Tuesday10:30 - 11:3005 Jun 2018
    Information Security Exchange

    In any adversarial scenario, your offensive and defensive tactics are dictated by two things: the capabilities and/or tactics of your adversary and the terrain....

    • Language: English

  • Crypto Currency Mining: How, Why, When & How to Prevent My Computer Power Being Stolen!

    Tuesday12:00 - 12:2505 Jun 2018
    Tech Talks

    Crypto coin mining is emerging as a new way to monetise visitor traffic. As users become savvier and increasingly use ad blockers, advertisers revenue is declin...

    • Language: English

  • Defence Magic: How Incident Response can Solve Defensive Problems

    Tuesday12:40 - 13:0505 Jun 2018
    Strategy Talks

    Many IT security organisations lack appropriate metrics to understand how effective defensive efforts are in their environments or to fully grasp where gaps exi...

    • Language: English

  • Taking Control of Ransomware & Other Malware Threats

    Tuesday13:00 - 13:3005 Jun 2018
    Talking Tactics

    Ransomware and malware attacks are nothing new. Many organisations have been on the receiving end of these types of attacks for years. Common advice is to ensur...

    • Language: English

  • The Apple of your EFI: An Updated Analysis of the State of Apple’s EFI Security Support

    Tuesday13:00 - 13:4505 Jun 2018
    Geek Street

    Duo Labs performed analysis over more than 73,000 realworld Apple Mac systems to see how the state of their running EFI compared to the expected state of their ...

    • Language: English

  • Using Light to Protect Your Business Against the Threat of Quantum Computers

    Tuesday13:20 - 13:3505 Jun 2018
    Cyber Innovation Showcase

    KETS Quantum Security designs, develops and deploys future-proof security hardware powered by our game-changing quantum technologies. Government security agenc...

    • Language: English

  • The Anatomy of a Multi-Layered Mobile Attack

    Tuesday14:40 - 15:0505 Jun 2018
    Tech Talks

    Do you think your mobile phone is secure? Think again. In this talk we will present several real-world attack examples as we deconstruct mobile threats and show...

    • Language: English

  • IoT Data Use – Clarity on Privacy & Security Management from a Regulatory & Technical Perspective

    Tuesday15:20 - 15:4505 Jun 2018
    Strategy Talks

    GDPR and other forthcoming data privacy regulation will serve to place control of data firmly in the hands of the end user and organisations need to embrace thi...

    • Language: English

  • Can you be just a Little bit Beyond?

    Tuesday16:40 - 17:0505 Jun 2018
    Technology Showcase

    Some organisations are afraid that going to a BeyondCorp model means all or nothing, and that they may face security risks in the middle of migrating. Even Goog...

    • Language: English

  • Network Intelligence to See, Control & Secure IT

    Wednesday10:00 - 10:2506 Jun 2018
    Technology Showcase

    Whether or not you like everything you see, you will be astonished by what is actually going on in your network. From our experience helping companies improve n...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.