Your Search

  • Topic Area

Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 24 results

|

Items per page:

Sort By
  • Workshop 1: Social Engineering - How Hard Can It Be?

    Tuesday10:00 - 12:0005 Jun 2018
    Security Workshops

    A social engineering expert will guide the audience through an interactive Open Source Intelligence gathering attack to highlight the risks posed by our Online ...

    • Language: English

  • How GP Bullhound Address the Security Challenges in the Financial Services Market

    Tuesday10:30 - 11:0005 Jun 2018
    Talking Tactics

    GP Bullhound is a leading technology advisory and investment firm, providing transaction advice and capital to entrepreneurs and founders. They help exceptional...

    • Language: English

  • The Hidden Cyber-Crime Economy

    Tuesday10:40 - 11:0505 Jun 2018
    Technology Showcase

    Businesses are evolving and digitalisation is changing the shape of the business landscape. Pure-play retailers are taking the lead, bypassing high-street fashi...

    • Language: English

  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    Tuesday11:15 - 11:4505 Jun 2018
    Talking Tactics

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with ...

    • Language: English

  • Data Breaches Under GDPR

    Tuesday11:40 - 11:5505 Jun 2018
    Cyber Innovation Showcase

    The average data breach costs businesses £2.7m and takes 191 days to detect. Most businesses cannot self-detect and end up finding out through third parties whe...

    • Language: English

  • Email Fraud Defence: Catch the Imposter and Authenticate Legitimate Communications

    Tuesday12:40 - 13:0505 Jun 2018
    Technology Showcase

    Highly targeted imposter emails are the biggest threat to organisations today, tricking users into divulging critical data and funds. Learn how Proofpoint can p...

    • Language: English

  • Why Security Analysts Remain the Differentiator for Intelligence in Anomaly Detection?

    Tuesday13:00 - 14:0005 Jun 2018
    Information Security Exchange

    Technologies such as Machine Learning, Deep Learning, Security Analytics, Artificial Intelligence, amongst others are being hailed as the answer to combatting a...

    • Language: English

  • Data Breach Class Actions - Morrisons Case Update

    Tuesday13:45 - 14:1505 Jun 2018
    Talking Tactics

    In 2017, WM Morrison Supermarkets Plc was found legally responsible for the leak of just under 100,000 employees' payroll data. The information was misused by a...

    • Language: English

  • A Day in the Life of a Breach

    Tuesday14:00 - 14:2505 Jun 2018
    Strategy Talks

    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on ...

    • Language: English

  • Kublai Khan, Blockchain & the Democratisation of Identity

    Tuesday14:40 - 15:0505 Jun 2018
    Strategy Talks

    Blockchain is already rife within the consumer world today. It has become the new independent federation of nations, not centralised but distributed. Given its ...

    • Language: English

  • Workshop 4: How Human Intelligence (the Security Analyst) Can Thrive in an Autonomous AI World

    Wednesday10:00 - 12:0006 Jun 2018
    Security Workshops

    There is a myth that effective intelligence using Deep Learning techniques will minimise the role of security analysts. The Forest Tree team will be providing i...

    • Language: English

  • Using Blockchain to Solve the Internet of Things Security Conundrum

    Wednesday10:00 - 10:2506 Jun 2018
    Strategy Talks

    Blockchain has changed our understanding of authentication models, moving from a centralized, information-based model, to a decentralised, trust-based model. As...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.