Your Search

  • Topic Area

Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 58 results

|

Items per page:

Sort By
  • Do You Have What it Takes to Build an In-House Incident Response Team?

    Tuesday10:00 - 10:2505 Jun 2018
    Tech Talks

    An in-house response team can be more effective in identifying and responding to incidents, with historical security data to perform the most effective and comp...

    • Language: English

  • Tackling Human Error: Beyond Security Awareness

    Tuesday10:25 - 10:4005 Jun 2018
    Cyber Innovation Showcase

    Human error is by far the most prevalent cause of security breaches – but what can we do against such a varied and evasive threat? By unpacking a series of case...

    • Language: English

  • The Hidden Cyber-Crime Economy

    Tuesday10:40 - 11:0505 Jun 2018
    Technology Showcase

    Businesses are evolving and digitalisation is changing the shape of the business landscape. Pure-play retailers are taking the lead, bypassing high-street fashi...

    • Language: English

  • Goodbye Passwords: A Discussion on the Future of Authentication

    Tuesday10:50 - 11:0505 Jun 2018
    Cyber Innovation Showcase

    The world of authentication is changing. Passwords are no longer reliable in protecting our data and identities. Their management, protection and memorisation a...

    • Language: English

  • Inside the Hacker's Bag of Tricks: 6 Full Breaches in 30 Minutes

    Tuesday11:20 - 11:4505 Jun 2018
    Technology Showcase

    Learning Outcomes: Understanding how hackers get access to the enterprise Learn more about securing your privileged accounts

    • Language: English

  • Data Breaches Under GDPR

    Tuesday11:40 - 11:5505 Jun 2018
    Cyber Innovation Showcase

    The average data breach costs businesses £2.7m and takes 191 days to detect. Most businesses cannot self-detect and end up finding out through third parties whe...

    • Language: English

  • Turtles, Trust & the Future of Cybersecurity

    Tuesday12:00 - 12:2505 Jun 2018
    Technology Showcase

    Faith in our institutions is collapsing, and GDPR is at the door. What would cybersecurity look like if we started from scratch, right now, in our hybrid, inter...

    • Language: English

  • Crypto Currency Mining: How, Why, When & How to Prevent My Computer Power Being Stolen!

    Tuesday12:00 - 12:2505 Jun 2018
    Tech Talks

    Crypto coin mining is emerging as a new way to monetise visitor traffic. As users become savvier and increasingly use ad blockers, advertisers revenue is declin...

    • Language: English

  • Surviving Ransom Driven DDoS Extortion Campaigns

    Tuesday12:40 - 13:0505 Jun 2018
    Tech Talks

    This session offers a practical guide for dealing with DDoS ransom campaigns and the link between ransomware and DDoS attacks. Learning Outcomes: Understandi...

    • Language: English

  • Securing the Future of Work

    Tuesday13:20 - 13:4505 Jun 2018
    Strategy Talks

    As people move out of traditional offices and increasingly into transient locations, computing platforms and networks – how will security and privacy be assured...

    • Language: English

  • Data Breach Class Actions - Morrisons Case Update

    Tuesday13:45 - 14:1505 Jun 2018
    Talking Tactics

    In 2017, WM Morrison Supermarkets Plc was found legally responsible for the leak of just under 100,000 employees' payroll data. The information was misused by a...

    • Language: English

  • GDPR Compliance Beyond Encryption

    Tuesday13:45 - 14:0005 Jun 2018
    Cyber Innovation Showcase

    The ICO has stated that encryption is NOT proof of compliance. Companies of all sizes will need to show a much more robust mobile data security implementation. ...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.