Your Search

  • Date

    • 6th June 2018 (Wednesday) Remove
Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 69 results

|

Items per page:

Sort By
  • Microsoft Breakfast Briefing: Building Security into the User Experience (PRE-REGISTRATION REQUIRED)

    Wednesday08:00 - 09:1506 Jun 2018
    Keynote Stage

    Join Microsoft as we discuss some of the challenges with digital transformation and the impact that has on the traditional security model. The traditional secur...

    • Language: English

  • Workshop 4: How Human Intelligence (the Security Analyst) Can Thrive in an Autonomous AI World

    Wednesday10:00 - 12:0006 Jun 2018
    Security Workshops

    There is a myth that effective intelligence using Deep Learning techniques will minimise the role of security analysts. The Forest Tree team will be providing i...

    • Language: English

  • Dystopia or Utopia? Privacy & Cybersecurity in the Digital Age

    Wednesday10:00 - 10:5006 Jun 2018
    Keynote Stage

    As users share more and more personal information with digital platforms, from search engines like Google and social networks like Facebook, to retailers like A...

    • Language: English

  • Network Intelligence to See, Control & Secure IT

    Wednesday10:00 - 10:2506 Jun 2018
    Technology Showcase

    Whether or not you like everything you see, you will be astonished by what is actually going on in your network. From our experience helping companies improve n...

    • Language: English

  • Workshop 2: Threat Hunting: Going Into Hand-to-Hand Combat with an Advanced Attacker

    Wednesday10:00 - 12:0006 Jun 2018
    Security Workshops

    Ever wonder how the hackers get in, or what they do once they have infiltrated a network? Learn about the latest attack techniques that have been uncovered by ...

    • Language: English

  • The Evolving Architecture of the Web & its Impact on Security, Privacy & Latency

    Wednesday10:00 - 10:2506 Jun 2018
    Tech Talks

    The encrypted web is built on a few protocols which were written with fundamental assumptions about the architecture of the internet in mind. But the popularity...

    • Language: English

  • Using Blockchain to Solve the Internet of Things Security Conundrum

    Wednesday10:00 - 10:2506 Jun 2018
    Strategy Talks

    Blockchain has changed our understanding of authentication models, moving from a centralized, information-based model, to a decentralised, trust-based model. As...

    • Language: English

  • Workshop 1: Protecting Your Business & Data from New DNS-Based Attacks

    Wednesday10:00 - 12:0006 Jun 2018
    Security Workshops

    In the wake of GDPR regulation commencement, protecting company and customer data is more important than ever. DNS servers are not only a favourite target for h...

    • Language: English

  • GDPR Compliance Beyond Encryption

    Wednesday10:25 - 10:4006 Jun 2018
    Cyber Innovation Showcase

    The ICO has stated that encryption is NOT proof of compliance. Companies of all sizes will need to show a much more robust mobile data security implementation. ...

    • Language: English

  • How Citrix Helped Beazley Create a Secure Digital Workspace for the Enterprise

    Wednesday10:30 - 11:0006 Jun 2018
    Talking Tactics

    Beazley is an A-rated specialist global insurer. They have simplified the delivery of apps, desktops and data into a unified, fully-integrated digital workspace...

    • Language: English

  • Cybersecurity for Critical National Infrastructure (CNI)

    Wednesday10:30 - 13:0006 Jun 2018
    CNI Symposium

    Register today! AGENDA: 10:30 - 10:35: Welcome from the Chair Talal Rajab, Head of Programme - Cyber and National Security, techUK   10:35 - 11:05: Keynote...

    • Language: English

  • Roundtable 3: T-72 Hours: How to Respond in the first 72 hours after a Breach?

    Wednesday10:30 - 11:3006 Jun 2018
    Leaders Programme

    What are the key regulatory requirements for breach reporting in the first 72 hours after a breach? What are the key elements of a response plan for the firs...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.