Your Search

  • Topic Area

    • Identity Access Management Remove
Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 11 of 11 results

|

Items per page:

Sort By
  • Goodbye Passwords: A Discussion on the Future of Authentication

    Tuesday10:50 - 11:0505 Jun 2018
    Cyber Innovation Showcase

    The world of authentication is changing. Passwords are no longer reliable in protecting our data and identities. Their management, protection and memorisation a...

    • Language: English

  • A Day in the Life of a Breach

    Tuesday14:00 - 14:2505 Jun 2018
    Strategy Talks

    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on ...

    • Language: English

  • Walking the Fine Line Between Corporate Bull & Practitioner Pedantry

    Tuesday16:00 - 16:2505 Jun 2018
    Strategy Talks

    Security and risk are understood and deemed a priority by both management and practioners. While the end goal for both is the same, their drivers are different....

    • Language: English

  • Encryption Demystified – Stop the Breaches with a Better Encryption Strategy

    Tuesday16:40 - 17:0505 Jun 2018
    Strategy Talks

    Cryptography is arguably one of the most poorly understood areas of cybersecurity. And based on the number of data breaches that continue to happen, it’s clear ...

    • Language: English

  • “Fileless” Ransomware: How It Works & How To Stop It

    Wednesday10:40 - 11:0506 Jun 2018
    Tech Talks

    The rising use of super stealthy “fileless” ransomware to evade detection and complicate mitigation is a new and notable development in the ongoing game of cat-...

    • Language: English

  • Goodbye Passwords: A Discussion on the Future of Authentication

    Wednesday14:35 - 14:5006 Jun 2018
    Cyber Innovation Showcase

    The world of authentication is changing. Passwords are no longer reliable in protecting our data and identities. Their management, protection and memorisation a...

    • Language: English

  • How Attack Simulation Spotlights the Threats that Gets Through Your Defences

    Wednesday16:00 - 16:2506 Jun 2018
    Strategy Talks

    Cyberattacks are evolving constantly, hence it’s vital to stay one step ahead of the hackers. Continuous cyberattack simulation is the most effective way to ass...

    • Language: English

  • Complex Event Processing & Situational Awareness in the Digital Age

    Wednesday16:40 - 17:0506 Jun 2018
    Tech Talks

    Today’s threat landscape has evolved, presenting security practitioners with greater challenges than ever before. When put together with the understanding that ...

    • Language: English

  • Discovering Effective Security

    Thursday11:45 - 12:4507 Jun 2018
    Information Security Exchange

    Today, we can't say exactly what constitutes effective security. We don't know what to tell organisations to buy, how many people they need to run it, how much ...

    • Language: English

  • Data Security Made Simple: Share, Work, & Protect Enterprise Data

    Thursday11:45 - 12:1007 Jun 2018
    Cyber Innovation Showcase

    With numerous possibilities of data breach threats, security for your enterprise data is never an easy task. While blocking access to enterprise data can be a c...

    • Language: English

  • Pushing the Boundaries for Secure & Privacy Friendly Cloud Services

    Thursday12:55 - 13:2007 Jun 2018
    Cyber Innovation Showcase

    We present recent results and prototypes of two EU funded projects developing novel secure and privacy friendly cloud services and identity management solutions...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.