Your Search

  • Topic Area

    • Business Continuity / Incident Response Remove
Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 50 results

|

Items per page:

Sort By
  • Combining Encryption & Machine Learning to Defeat the Insider Threat

    Tuesday10:40 - 11:0505 Jun 2018
    Tech Talks

    The data doesn’t lie. Organisations are failing to overcome the significant risks their own staff pose to sensitive information. In the first six months of 2017...

    • Language: English

  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    Tuesday11:15 - 11:4505 Jun 2018
    Talking Tactics

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with ...

    • Language: English

  • GDPR Breach Notification: Demystifying What the Regulators want

    Tuesday11:20 - 11:4505 Jun 2018
    Strategy Talks

    With GDPR here, organisations have endeavoured to change how they collect and use personal data with more accountable and compliant processes. However, the GDPR...

    • Language: English

  • Crypto Currency Mining: How, Why, When & How to Prevent My Computer Power Being Stolen!

    Tuesday12:00 - 12:2505 Jun 2018
    Tech Talks

    Crypto coin mining is emerging as a new way to monetise visitor traffic. As users become savvier and increasingly use ad blockers, advertisers revenue is declin...

    • Language: English

  • IT, OT & the Pursuit of Convergence

    Tuesday12:00 - 12:2505 Jun 2018
    Strategy Talks

    In this session, we’ll examine real-world scenarios of disruption caused by the collision between corporate IT and plant OT infrastructures. Speakers will discu...

    • Language: English

  • Why Security Analysts Remain the Differentiator for Intelligence in Anomaly Detection?

    Tuesday13:00 - 14:0005 Jun 2018
    Information Security Exchange

    Technologies such as Machine Learning, Deep Learning, Security Analytics, Artificial Intelligence, amongst others are being hailed as the answer to combatting a...

    • Language: English

  • Taking Control of Ransomware & Other Malware Threats

    Tuesday13:00 - 13:3005 Jun 2018
    Talking Tactics

    Ransomware and malware attacks are nothing new. Many organisations have been on the receiving end of these types of attacks for years. Common advice is to ensur...

    • Language: English

  • Securing the Future of Work

    Tuesday13:20 - 13:4505 Jun 2018
    Strategy Talks

    As people move out of traditional offices and increasingly into transient locations, computing platforms and networks – how will security and privacy be assured...

    • Language: English

  • Workshop 3: CISSP Preview: Business Continuity & Awareness Programmes Requirements

    Tuesday14:00 - 16:0005 Jun 2018
    Security Workshops

    Based on the (ISC)2 CISSP Certification – the Gold Standard in the Information Security Industry –  this workshop will cover the key principles every security p...

    • Language: English

  • Network Security Policy Management - Automation for Transformation

    Tuesday14:00 - 14:2505 Jun 2018
    Technology Showcase

    Making security policy changes manually is a slow, labourious process which is fraught with risks; it can take several days—sometimes weeks—to process a single ...

    • Language: English

  • Digital Transformation: Cure-all, Placebo or Poison Pill?

    Tuesday14:15 - 15:1505 Jun 2018
    Information Security Exchange

    Are you really ready for Digital Transformation? While the business benefits are clear, technology adoption, the escalating threat landscape and compliance to a...

    • Language: English

  • Keeping Your Guard Up With Machine-Based Penetration Testing

    Tuesday14:40 - 15:0505 Jun 2018
    Technology Showcase

    Hackers become more and more sophisticated, pressing enterprises’ need to constantly improve security validation methodologies. Realising that offense is the be...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.