Your Search

  • Topic Area

Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 5 of 5 results

|

Items per page:

Sort By
  • IT, OT & the Pursuit of Convergence

    Tuesday12:00 - 12:2505 Jun 2018
    Strategy Talks

    In this session, we’ll examine real-world scenarios of disruption caused by the collision between corporate IT and plant OT infrastructures. Speakers will discu...

    • Language: English

  • Using Light to Protect Your Business Against the Threat of Quantum Computers

    Tuesday13:20 - 13:3505 Jun 2018
    Cyber Innovation Showcase

    KETS Quantum Security designs, develops and deploys future-proof security hardware powered by our game-changing quantum technologies. Government security agenc...

    • Language: English

  • We Are All Equifax: Data Behind DevSecOps

    Tuesday15:20 - 15:4505 Jun 2018
    Tech Talks

    In March 2017, hackers took three days to identify and exploit a new vulnerability in Equifax’s web applications. In the post-Equifax world, moving new business...

    • Language: English

  • Using Light to Protect Your Business Against the Threat of Quantum Computers

    Wednesday11:15 - 11:3006 Jun 2018
    Cyber Innovation Showcase

    KETS Quantum Security designs, develops and deploys future-proof security hardware powered by our game-changing quantum technologies. Government security agenc...

    • Language: English

  • Every Cloud has a Privileged Lining

    Wednesday15:20 - 15:4506 Jun 2018
    Technology Showcase

    As organisations across the world look to adopt and leverage cloud platforms, a new-tier of privileged access is introduced. Privileged Access achieved through ...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.