Your Search

  • Topic Area

Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 46 results

|

Items per page:

Sort By
  • Workshop 4: Ways to Protect your web Infrastructure from the Ever-Growing Threat of DDoS

    Tuesday10:00 - 12:0005 Jun 2018
    Security Workshops

    Matthew Wilson, Director of engineering of Neustar's Siteprotect NG network, brings a wealth of experience from running DDoS mitigation networks at Nexusguard a...

    • Language: English

  • Mine & Thine - Learning from Browser Cryptocurrency Mining Attacks

    Tuesday10:00 - 10:2505 Jun 2018
    Technology Showcase

    It isn't hard for an attacker to use your web browser to mine cryptocurrency, as we've seen from a recent spate of public incidents. This type of attack was pre...

    • Language: English

  • Don’t be a Victim: Defending the Borderless Enterprise

    Tuesday10:30 - 11:3005 Jun 2018
    Information Security Exchange

    In any adversarial scenario, your offensive and defensive tactics are dictated by two things: the capabilities and/or tactics of your adversary and the terrain....

    • Language: English

  • The Hidden Cyber-Crime Economy

    Tuesday10:40 - 11:0505 Jun 2018
    Technology Showcase

    Businesses are evolving and digitalisation is changing the shape of the business landscape. Pure-play retailers are taking the lead, bypassing high-street fashi...

    • Language: English

  • Combining Encryption & Machine Learning to Defeat the Insider Threat

    Tuesday10:40 - 11:0505 Jun 2018
    Tech Talks

    The data doesn’t lie. Organisations are failing to overcome the significant risks their own staff pose to sensitive information. In the first six months of 2017...

    • Language: English

  • Goodbye Passwords: A Discussion on the Future of Authentication

    Tuesday10:50 - 11:0505 Jun 2018
    Cyber Innovation Showcase

    The world of authentication is changing. Passwords are no longer reliable in protecting our data and identities. Their management, protection and memorisation a...

    • Language: English

  • Crypto Currency Mining: How, Why, When & How to Prevent My Computer Power Being Stolen!

    Tuesday12:00 - 12:2505 Jun 2018
    Tech Talks

    Crypto coin mining is emerging as a new way to monetise visitor traffic. As users become savvier and increasingly use ad blockers, advertisers revenue is declin...

    • Language: English

  • Using Light to Protect Your Business Against the Threat of Quantum Computers

    Tuesday13:20 - 13:3505 Jun 2018
    Cyber Innovation Showcase

    KETS Quantum Security designs, develops and deploys future-proof security hardware powered by our game-changing quantum technologies. Government security agenc...

    • Language: English

  • GDPR Compliance Beyond Encryption

    Tuesday13:45 - 14:0005 Jun 2018
    Cyber Innovation Showcase

    The ICO has stated that encryption is NOT proof of compliance. Companies of all sizes will need to show a much more robust mobile data security implementation. ...

    • Language: English

  • Network Security Policy Management - Automation for Transformation

    Tuesday14:00 - 14:2505 Jun 2018
    Technology Showcase

    Making security policy changes manually is a slow, labourious process which is fraught with risks; it can take several days—sometimes weeks—to process a single ...

    • Language: English

  • Infrastructure Blind Spots Continue to Fuel Personal Data Breaches

    Tuesday15:20 - 15:4505 Jun 2018
    Technology Showcase

    Despite a plethora of security tools, machine learning claims, advanced analytics and IoT and Cloud silver bullets, enterprises and governments are almost guara...

    • Language: English

  • IoT Data Use – Clarity on Privacy & Security Management from a Regulatory & Technical Perspective

    Tuesday15:20 - 15:4505 Jun 2018
    Strategy Talks

    GDPR and other forthcoming data privacy regulation will serve to place control of data firmly in the hands of the end user and organisations need to embrace thi...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.