Your Search

  • Date

    • 7th June 2018 (Thursday) Remove
Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 52 results

|

Items per page:

Sort By
  • Inside the Hacker's Bag of Tricks: 6 Full Breaches in 30 Minutes

    Tuesday11:20 - 11:4505 Jun 2018
    Technology Showcase

    Learning Outcomes: Understanding how hackers get access to the enterprise Learn more about securing your privileged accounts

    • Language: English

  • Inside the Hacker's Bag of Tricks: 6 Full Breaches in 30 Minutes

    Wednesday11:20 - 11:4506 Jun 2018
    Technology Showcase

    Learning Outcomes: Understanding how hackers get access to the enterprise Learn more about securing your privileged accounts

    • Language: English

  • Workshop 3: Achieving GDPR Compliance with the CSA Code of Conduct

    Thursday10:00 - 13:0007 Jun 2018
    Security Workshops

    The Cloud Security Alliance (CSA), in collaboration with national data protection authorities have developed and published a “Code of Conduct for GDPR Complianc...

    • Language: English

  • Protecting from the Inside Out: The Unpatchable Vulnerability

    Thursday10:00 - 10:2507 Jun 2018
    Technology Showcase

    In a world of moving threats, changing landscapes and different generations in the workspace, how do you secure against the unpatchable vulnerability – people? ...

    • Language: English

  • Workshop 2: Tracking Down the Cyber Criminals and Revealing Malicious Infrastructures

    Thursday10:00 - 12:0007 Jun 2018
    Security Workshops

    Cyber criminals are increasingly exploiting the  Internet services to build agile and resilient infrastructures, and consequently to protect themselves from bei...

    • Language: English

  • Weaponising the Web: Nation-State Hacking & What it Means for Enterprise Cybersecurity

    Thursday10:00 - 10:5007 Jun 2018
    Keynote Stage

    Opening Keynote Presentation From allegations that Russia hacked the US election to claims by the USA that North Korea was responsible for the WannaCry attack,...

    • Language: English

  • Workshop 1: Technical Versatility in Cybersecurity

    Thursday10:00 - 12:0007 Jun 2018
    Security Workshops

    Gain an insight into the vast array of technical knowledge required by a technical Cybersecurity practitioner. Attendees will be led through four interactive on...

    • Language: English

  • Workshop 4: Top Privacy Issues Encountered by Infosecurity Professionals

    Thursday10:00 - 12:0007 Jun 2018
    Security Workshops

    For decades, information security functions have fought for the responsibility to monitor the flow of information through the organisation, in all formats, thro...

    • Language: English

  • Sneak in & Rule the Cloud Kingdom

    Thursday10:00 - 10:2507 Jun 2018
    Tech Talks

    To combat initial efforts from attackers, we researched new stealthy ways that could be used to escalate privileges in public cloud platforms. CyberArk Labs wil...

    • Language: English

  • Thwarting a Cyberphysical Attack in the IoT Era

    Thursday10:00 - 10:2507 Jun 2018
    Strategy Talks

    While businesses and consumers see opportunity and efficiency in the billions of devices now connected to the Internet of Things and Industrial Internet of Thin...

    • Language: English

  • Advances in Web Application Firewalls with Analytics & Visibility

    Thursday10:00 - 10:2507 Jun 2018
    Cyber Innovation Showcase

    Verizon Data Breach Incident Report (DBIR) ranks web application attacks #1 as the cause of data breaches. While Web Application Firewalls have been around for ...

    • Language: English

  • Roundtable 4: What Behavioural Indicators Should CISOs be Looking for to Mitigate the Insider Threat?

    Thursday10:30 - 11:3007 Jun 2018
    Leaders Programme

    More information coming soon.

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.