Your Search

  • Vertical Sectors

Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 31 results

|

Items per page:

Sort By
  • Do You Have What it Takes to Build an In-House Incident Response Team?

    Tuesday10:00 - 10:2505 Jun 2018
    Tech Talks

    An in-house response team can be more effective in identifying and responding to incidents, with historical security data to perform the most effective and comp...

    • Language: English

  • Combining Encryption & Machine Learning to Defeat the Insider Threat

    Tuesday10:40 - 11:0505 Jun 2018
    Tech Talks

    The data doesn’t lie. Organisations are failing to overcome the significant risks their own staff pose to sensitive information. In the first six months of 2017...

    • Language: English

  • The Rise of Wiper Malware

    Tuesday11:20 - 11:4505 Jun 2018
    Tech Talks

    Behind every attack is an individual trying to achieve objectives. In some cases, the objective of the attack is simply to destroy systems and cause as much dam...

    • Language: English

  • Crypto Currency Mining: How, Why, When & How to Prevent My Computer Power Being Stolen!

    Tuesday12:00 - 12:2505 Jun 2018
    Tech Talks

    Crypto coin mining is emerging as a new way to monetise visitor traffic. As users become savvier and increasingly use ad blockers, advertisers revenue is declin...

    • Language: English

  • Surviving Ransom Driven DDoS Extortion Campaigns

    Tuesday12:40 - 13:0505 Jun 2018
    Tech Talks

    This session offers a practical guide for dealing with DDoS ransom campaigns and the link between ransomware and DDoS attacks. Learning Outcomes: Understandi...

    • Language: English

  • Piecing Together the Global Threat Jigsaw & Identifying What Really Matters to You

    Tuesday13:20 - 13:4505 Jun 2018
    Tech Talks

    In an environment filled with endless security alerts, threat intelligence feeds and news reports about the latest threats, it can be difficult for security pra...

    • Language: English

  • Shining a Light on the Dark Web

    Tuesday14:00 - 14:2505 Jun 2018
    Tech Talks

    Based on years of researching the Dark Web, Christian Lees will provide an intriguing, illuminating “behind the curtain” look at threat actor attribution and th...

    • Language: English

  • The Anatomy of a Multi-Layered Mobile Attack

    Tuesday14:40 - 15:0505 Jun 2018
    Tech Talks

    Do you think your mobile phone is secure? Think again. In this talk we will present several real-world attack examples as we deconstruct mobile threats and show...

    • Language: English

  • We Are All Equifax: Data Behind DevSecOps

    Tuesday15:20 - 15:4505 Jun 2018
    Tech Talks

    In March 2017, hackers took three days to identify and exploit a new vulnerability in Equifax’s web applications. In the post-Equifax world, moving new business...

    • Language: English

  • Detecting Insider Threats Using Data Science

    Tuesday16:00 - 16:2505 Jun 2018
    Tech Talks

    Identifying anomalous user behaviour for insider threat detection is multifaceted. Without requiring the machine learning knowledge, this talk will explain how ...

    • Language: English

  • Defending the Cloud: How Enumerating Enterprise Cloud Services Makes Organisations Ripe for Targeted Phishing Attacks

    Tuesday16:40 - 17:0505 Jun 2018
    Tech Talks

    With cloud services coming of age, the ability to understand the tools and services in use by an enterprise can enable an attacker to create highly-relevant phi...

    • Language: English

  • The Evolving Architecture of the Web & its Impact on Security, Privacy & Latency

    Wednesday10:00 - 10:2506 Jun 2018
    Tech Talks

    The encrypted web is built on a few protocols which were written with fundamental assumptions about the architecture of the internet in mind. But the popularity...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.