Your Search

 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 9 of 9 results

|

Items per page:

Sort By
  • An Introduction to Exploitation

    Tuesday10:30 - 11:1505 Jun 2018
    Geek Street

    Exploits have been the core of how cyber criminals and nation state actors distribute malicious code for many years, from popping shells remotely to exploiting ...

    • Language: English

  • A Day in the Life of a Breach

    Tuesday14:00 - 14:2505 Jun 2018
    Strategy Talks

    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on ...

    • Language: English

  • Anatomy of VPN Hacks: Is 2FA Enough?

    Wednesday13:20 - 13:4506 Jun 2018
    Tech Talks

    2FA is hailed as the Holy Grail when it comes to protecting from the most pervasive attack of all: account hijacking. This presentation describes a comprehensiv...

    • Language: English

  • A Data-Driven Approach to Risk-Based Cyber-Physical Security

    Wednesday15:25 - 15:4006 Jun 2018
    Cyber Innovation Showcase

    Cyber-physical risk is just another business risk. The appropriate response is to manage it with an appropriate amount of resources. Total prevention is ideal, ...

    • Language: English

  • Advances in Web Application Firewalls with Analytics & Visibility

    Thursday10:00 - 10:2507 Jun 2018
    Cyber Innovation Showcase

    Verizon Data Breach Incident Report (DBIR) ranks web application attacks #1 as the cause of data breaches. While Web Application Firewalls have been around for ...

    • Language: English

  • Are Users Really Your Best Defense Against Advanced Email-Borne Threats?

    Thursday10:30 - 11:3007 Jun 2018
    Information Security Exchange

    Email is at the core of business communications, no question about it. It is relied upon for communications, as a file transfer medium and as a business record....

    • Language: English

  • A Proactive Methodology for Detecting Threats Using Machine Learning & Threat-Hunting

    Thursday10:35 - 11:0007 Jun 2018
    Cyber Innovation Showcase

    Interested in staying ahead of the adversary in a shifting security landscape? Learn how to create a centralised security analytics platform with the speed and ...

    • Language: English

  • AI & Cybersecurity: What Does & Does Not Work

    Thursday12:00 - 12:2507 Jun 2018
    Technology Showcase

    With the rise of automation and artificial intelligence, you may be wondering how much of an impact this has on IT security. The question is, where will the fut...

    • Language: English

  • Applying a Data-Driven Approach to Machine Learning

    Thursday12:00 - 12:2507 Jun 2018
    Tech Talks

    In this session, Andrew Hollister, Sr. Technical Director EMEA, will explain how machine learning can help enterprises be better, smarter, and faster in the fig...

    • Language: English (United Kingdom)

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.