Your Search

  • Vertical Sectors

    • Cyber Innovation Showcase Remove
Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 37 results

|

Items per page:

Sort By
  • Tackling Human Error: Beyond Security Awareness

    Tuesday10:25 - 10:4005 Jun 2018
    Cyber Innovation Showcase

    Human error is by far the most prevalent cause of security breaches – but what can we do against such a varied and evasive threat? By unpacking a series of case...

    • Language: English

  • Goodbye Passwords: A Discussion on the Future of Authentication

    Tuesday10:50 - 11:0505 Jun 2018
    Cyber Innovation Showcase

    The world of authentication is changing. Passwords are no longer reliable in protecting our data and identities. Their management, protection and memorisation a...

    • Language: English

  • Data Breaches Under GDPR

    Tuesday11:40 - 11:5505 Jun 2018
    Cyber Innovation Showcase

    The average data breach costs businesses £2.7m and takes 191 days to detect. Most businesses cannot self-detect and end up finding out through third parties whe...

    • Language: English

  • 10,000 Keys for 10,000 Castles: An Innovative Solution to Mass Data Loss

    Tuesday12:05 - 12:2005 Jun 2018
    Cyber Innovation Showcase

    GBR14 discusses the existing issues and ways of managing data access to eliminate bulk data loss?  Bulk data loss is a huge risk. Traditional approaches to dat...

    • Language: English

  • Using Artificial Intelligence to Secure Rolling Stock in the UK Rail Industry

    Tuesday12:30 - 12:4505 Jun 2018
    Cyber Innovation Showcase

    During this session RazorSecure will discuss some of the work they have been doing with leading UK train operators to secure their onboard infrastructure using ...

    • Language: English

  • Early Warning System for Cyber-Physical Systems

    Tuesday12:55 - 13:1005 Jun 2018
    Cyber Innovation Showcase

    Cyber-physical systems (CPS) serve on convergence of information and operational technology, and are the fundamental building blocks of an increasing smart worl...

    • Language: English

  • Using Light to Protect Your Business Against the Threat of Quantum Computers

    Tuesday13:20 - 13:3505 Jun 2018
    Cyber Innovation Showcase

    KETS Quantum Security designs, develops and deploys future-proof security hardware powered by our game-changing quantum technologies. Government security agenc...

    • Language: English

  • GDPR Compliance Beyond Encryption

    Tuesday13:45 - 14:0005 Jun 2018
    Cyber Innovation Showcase

    The ICO has stated that encryption is NOT proof of compliance. Companies of all sizes will need to show a much more robust mobile data security implementation. ...

    • Language: English

  • Informer – Continuous Security Testing That Automatically Adapts to Evolving Online Environments

    Tuesday14:10 - 14:2505 Jun 2018
    Cyber Innovation Showcase

    Traditional penetration testing takes place annually and provides a snapshot of risks, but risks can be introduced to an online environment at any time. Online ...

    • Language: English

  • Cyber Risk Management: Addressing the Challenge

    Tuesday14:35 - 14:5005 Jun 2018
    Cyber Innovation Showcase

    Over the last decade, a huge spike in fear, uncertainty and doubt around the term ‘cyber’ has caused organisations to become caught in a cycle of annual technol...

    • Language: English

  • Searching for a Million Bad Guys in Parallel: Hardware Accelerated Network Forensics

    Tuesday15:00 - 15:1505 Jun 2018
    Cyber Innovation Showcase

    Threat intelligence is born old - it takes an average of 6 months for new threats to appear on threat lists, by then you may have already been compromised. This...

    • Language: English

  • Humans vs Machines

    Tuesday15:25 - 15:4005 Jun 2018
    Cyber Innovation Showcase

    Why are people considered the weakest link in our cybersecurity systems? Because the system does not work for them. This talk looks at how users are attacked th...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.