Your Search

  • Theatre

Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 30 results

|

Items per page:

Sort By
  • Mine & Thine - Learning from Browser Cryptocurrency Mining Attacks

    Tuesday10:00 - 10:2505 Jun 2018
    Technology Showcase

    It isn't hard for an attacker to use your web browser to mine cryptocurrency, as we've seen from a recent spate of public incidents. This type of attack was pre...

    • Language: English

  • The Hidden Cyber-Crime Economy

    Tuesday10:40 - 11:0505 Jun 2018
    Technology Showcase

    Businesses are evolving and digitalisation is changing the shape of the business landscape. Pure-play retailers are taking the lead, bypassing high-street fashi...

    • Language: English

  • Inside the Hacker's Bag of Tricks: 6 Full Breaches in 30 Minutes

    Tuesday11:20 - 11:4505 Jun 2018
    Technology Showcase

    Learning Outcomes: Understanding how hackers get access to the enterprise Learn more about securing your privileged accounts

    • Language: English

  • Turtles, Trust & the Future of Cybersecurity

    Tuesday12:00 - 12:2505 Jun 2018
    Technology Showcase

    Faith in our institutions is collapsing, and GDPR is at the door. What would cybersecurity look like if we started from scratch, right now, in our hybrid, inter...

    • Language: English

  • Email Fraud Defence: Catch the Imposter and Authenticate Legitimate Communications

    Tuesday12:40 - 13:0505 Jun 2018
    Technology Showcase

    Highly targeted imposter emails are the biggest threat to organisations today, tricking users into divulging critical data and funds. Learn how Proofpoint can p...

    • Language: English

  • Tackling Identity Today, Tomorrow, & Its Vision for the Future

    Tuesday13:20 - 13:4505 Jun 2018
    Technology Showcase

    Is Identity core to modernising your enterprise IT strategy? Okta is built from the ground-up to provide the most secure, trusted and reliable Identity Cloud f...

    • Language: English

  • Network Security Policy Management - Automation for Transformation

    Tuesday14:00 - 14:2505 Jun 2018
    Technology Showcase

    Making security policy changes manually is a slow, labourious process which is fraught with risks; it can take several days—sometimes weeks—to process a single ...

    • Language: English

  • Keeping Your Guard Up With Machine-Based Penetration Testing

    Tuesday14:40 - 15:0505 Jun 2018
    Technology Showcase

    Hackers become more and more sophisticated, pressing enterprises’ need to constantly improve security validation methodologies. Realising that offense is the be...

    • Language: English

  • Infrastructure Blind Spots Continue to Fuel Personal Data Breaches

    Tuesday15:20 - 15:4505 Jun 2018
    Technology Showcase

    Despite a plethora of security tools, machine learning claims, advanced analytics and IoT and Cloud silver bullets, enterprises and governments are almost guara...

    • Language: English

  • How to Spotlight the Threats That Get Through Your Defences

    Tuesday16:00 - 16:2505 Jun 2018
    Technology Showcase

    Cyberattacks are evolving constantly, hence it’s vital to stay one step ahead of the hackers. Continuous cyberattack simulation is the most effective way to ass...

    • Language: English

  • Can you be just a Little bit Beyond?

    Tuesday16:40 - 17:0505 Jun 2018
    Technology Showcase

    Some organisations are afraid that going to a BeyondCorp model means all or nothing, and that they may face security risks in the middle of migrating. Even Goog...

    • Language: English

  • Network Intelligence to See, Control & Secure IT

    Wednesday10:00 - 10:2506 Jun 2018
    Technology Showcase

    Whether or not you like everything you see, you will be astonished by what is actually going on in your network. From our experience helping companies improve n...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.