Your Search

Reset Search
 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 14 results

|

Items per page:

Sort By
  • Do You Have What it Takes to Build an In-House Incident Response Team?

    Tuesday10:00 - 10:2505 Jun 2018
    Tech Talks

    An in-house response team can be more effective in identifying and responding to incidents, with historical security data to perform the most effective and comp...

    • Language: English

  • Mine & Thine - Learning from Browser Cryptocurrency Mining Attacks

    Tuesday10:00 - 10:2505 Jun 2018
    Technology Showcase

    It isn't hard for an attacker to use your web browser to mine cryptocurrency, as we've seen from a recent spate of public incidents. This type of attack was pre...

    • Language: English

  • Roundtable 1: Operational Risk and the Role of the CISO

    Tuesday10:30 - 11:3005 Jun 2018
    Leaders Programme

    As high-profile breaches continue to fill news headlines and swipe at the reputation of well – known companies and brands, the debate around accountability is g...

    • Language: English

  • Data Breaches Under GDPR

    Tuesday11:40 - 11:5505 Jun 2018
    Cyber Innovation Showcase

    The average data breach costs businesses £2.7m and takes 191 days to detect. Most businesses cannot self-detect and end up finding out through third parties whe...

    • Language: English

  • Surviving Ransom Driven DDoS Extortion Campaigns

    Tuesday12:40 - 13:0505 Jun 2018
    Tech Talks

    This session offers a practical guide for dealing with DDoS ransom campaigns and the link between ransomware and DDoS attacks. Learning Outcomes: Understandi...

    • Language: English

  • The Apple of your EFI: An Updated Analysis of the State of Apple’s EFI Security Support

    Tuesday13:00 - 13:4505 Jun 2018
    Geek Street

    Duo Labs performed analysis over more than 73,000 realworld Apple Mac systems to see how the state of their running EFI compared to the expected state of their ...

    • Language: English

  • Roundtable 2: How Do I Manage Risk?

    Tuesday14:30 - 15:3005 Jun 2018
    Leaders Programme

    The cyber threat landscape has changed. Attackers are now targeting more and different types of data to extort or otherwise harm your business. Business leaders...

    • Language: English

  • Workshop 2: Threat Hunting: Going Into Hand-to-Hand Combat with an Advanced Attacker

    Wednesday10:00 - 12:0006 Jun 2018
    Security Workshops

    Ever wonder how the hackers get in, or what they do once they have infiltrated a network? Learn about the latest attack techniques that have been uncovered by ...

    • Language: English

  • Workshop 2: Threat Hunting: Going Into Hand-to-Hand Combat with an Advanced Attacker

    Wednesday14:00 - 16:0006 Jun 2018
    Security Workshops

    Ever wonder how the hackers get in, or what they do once they have infiltrated a network? Learn about the latest attack techniques that have been uncovered by ...

    • Language: English

  • The Ultimate Guide to New ePrivacy Regulations: Cookie Consent, DNT, & Online Tracking Technologies

    Wednesday14:00 - 14:2506 Jun 2018
    Tech Talks

    Organisations are now faced with increased regulatory requirements for their use of cookies, electronic communications, and other online tracking technologies. ...

    • Language: English

  • Data Breaches Under GDPR

    Wednesday15:00 - 15:1506 Jun 2018
    Cyber Innovation Showcase

    The average data breach costs businesses £2.7m and takes 191 days to detect. Most businesses cannot self-detect and end up finding out through third parties whe...

    • Language: English

  • Method for Improved Detection of Malware C&C Traffic Using a Multidimensional Model & Network Timeline Analysis

    Wednesday16:00 - 16:2506 Jun 2018
    Tech Talks

    Many organisations utilise their own security teams or external managed security service providers (MSSPs) to detect malicious traffic and infections on their n...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.