Your Search

  • Topic Area

Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 12 results

|

Items per page:

Sort By
  • Don’t be a Victim: Defending the Borderless Enterprise

    Tuesday10:30 - 11:3005 Jun 2018
    Information Security Exchange

    In any adversarial scenario, your offensive and defensive tactics are dictated by two things: the capabilities and/or tactics of your adversary and the terrain....

    • Language: English

  • GDPR Compliance Beyond Encryption

    Tuesday13:45 - 14:0005 Jun 2018
    Cyber Innovation Showcase

    The ICO has stated that encryption is NOT proof of compliance. Companies of all sizes will need to show a much more robust mobile data security implementation. ...

    • Language: English

  • The Anatomy of a Multi-Layered Mobile Attack

    Tuesday14:40 - 15:0505 Jun 2018
    Tech Talks

    Do you think your mobile phone is secure? Think again. In this talk we will present several real-world attack examples as we deconstruct mobile threats and show...

    • Language: English

  • Can you be just a Little bit Beyond?

    Tuesday16:40 - 17:0505 Jun 2018
    Technology Showcase

    Some organisations are afraid that going to a BeyondCorp model means all or nothing, and that they may face security risks in the middle of migrating. Even Goog...

    • Language: English

  • Encryption Demystified – Stop the Breaches with a Better Encryption Strategy

    Tuesday16:40 - 17:0505 Jun 2018
    Strategy Talks

    Cryptography is arguably one of the most poorly understood areas of cybersecurity. And based on the number of data breaches that continue to happen, it’s clear ...

    • Language: English

  • GDPR Compliance Beyond Encryption

    Wednesday10:25 - 10:4006 Jun 2018
    Cyber Innovation Showcase

    The ICO has stated that encryption is NOT proof of compliance. Companies of all sizes will need to show a much more robust mobile data security implementation. ...

    • Language: English

  • Workshop 4: Live Interactive Protection Simulation: Building a Cyber Defence Strategy

    Wednesday14:00 - 16:0006 Jun 2018
    Security Workshops

    The Kaspersky Interactive Protection Simulation (KIPS) delivers a fresh and engaging approach to cybersecurity. Wondering how cyberthreats can affect your busin...

    • Language: English

  • Complex Event Processing & Situational Awareness in the Digital Age

    Wednesday16:40 - 17:0506 Jun 2018
    Tech Talks

    Today’s threat landscape has evolved, presenting security practitioners with greater challenges than ever before. When put together with the understanding that ...

    • Language: English

  • Redemption: New Real-Time Endpoint Protection Against Ransomware

    Thursday10:40 - 11:0507 Jun 2018
    Tech Talks

    The growing number of people and companies falling victim to ransomware attacks highlights the need for an endpoint defence that can stop and recover from ranso...

    • Language: English

  • Cut Through the Current Fog & Achieve Cloud Visibility & Security

    Thursday10:40 - 11:0507 Jun 2018
    Strategy Talks

    The very benefits of cloud – real-time deployment, disbanding of compute infrastructure and rapid time to availability of application services is a double-edged...

    • Language: English

  • Discovering Effective Security

    Thursday11:45 - 12:4507 Jun 2018
    Information Security Exchange

    Today, we can't say exactly what constitutes effective security. We don't know what to tell organisations to buy, how many people they need to run it, how much ...

    • Language: English

  • Using Traffic Analysis to Deconstruct Global Malspam Campaigns

    Thursday14:40 - 15:0507 Jun 2018
    Tech Talks

    We present new statistical techniques to identify malspam campaigns en masse using DNS and IP network data without relying on traditional methods like spamtraps...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.