Your Search

 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 16 results

|

Items per page:

Sort By
  • Do You Have What it Takes to Build an In-House Incident Response Team?

    Tuesday10:00 - 10:2505 Jun 2018
    Tech Talks

    An in-house response team can be more effective in identifying and responding to incidents, with historical security data to perform the most effective and comp...

    • Language: English

  • Don’t be a Victim: Defending the Borderless Enterprise

    Tuesday10:30 - 11:3005 Jun 2018
    Information Security Exchange

    In any adversarial scenario, your offensive and defensive tactics are dictated by two things: the capabilities and/or tactics of your adversary and the terrain....

    • Language: English

  • Data Breaches Under GDPR

    Tuesday11:40 - 11:5505 Jun 2018
    Cyber Innovation Showcase

    The average data breach costs businesses £2.7m and takes 191 days to detect. Most businesses cannot self-detect and end up finding out through third parties whe...

    • Language: English

  • DNS as a First Line of Defence

    Tuesday11:45 - 12:4505 Jun 2018
    Information Security Exchange

    Whenever a device interacts with another, the first thing that occurs is a DNS request. The object of this session is to discuss ways to sort the good requests ...

    • Language: English

  • Defence Magic: How Incident Response can Solve Defensive Problems

    Tuesday12:40 - 13:0505 Jun 2018
    Strategy Talks

    Many IT security organisations lack appropriate metrics to understand how effective defensive efforts are in their environments or to fully grasp where gaps exi...

    • Language: English

  • Data Breach Class Actions - Morrisons Case Update

    Tuesday13:45 - 14:1505 Jun 2018
    Talking Tactics

    In 2017, WM Morrison Supermarkets Plc was found legally responsible for the leak of just under 100,000 employees' payroll data. The information was misused by a...

    • Language: English

  • Digital Transformation: Cure-all, Placebo or Poison Pill?

    Tuesday14:15 - 15:1505 Jun 2018
    Information Security Exchange

    Are you really ready for Digital Transformation? While the business benefits are clear, technology adoption, the escalating threat landscape and compliance to a...

    • Language: English

  • Detecting Insider Threats Using Data Science

    Tuesday16:00 - 16:2505 Jun 2018
    Tech Talks

    Identifying anomalous user behaviour for insider threat detection is multifaceted. Without requiring the machine learning knowledge, this talk will explain how ...

    • Language: English

  • Defending the Cloud: How Enumerating Enterprise Cloud Services Makes Organisations Ripe for Targeted Phishing Attacks

    Tuesday16:40 - 17:0505 Jun 2018
    Tech Talks

    With cloud services coming of age, the ability to understand the tools and services in use by an enterprise can enable an attacker to create highly-relevant phi...

    • Language: English

  • Dystopia or Utopia? Privacy & Cybersecurity in the Digital Age

    Wednesday10:00 - 10:5006 Jun 2018
    Keynote Stage

    As users share more and more personal information with digital platforms, from search engines like Google and social networks like Facebook, to retailers like A...

    • Language: English

  • Digital Transformation: Cure-all, Placebo or Poison Pill?

    Wednesday14:15 - 15:1506 Jun 2018
    Information Security Exchange

    Are you really ready for Digital Transformation? While the business benefits are clear, technology adoption, the escalating threat landscape and compliance to a...

    • Language: English

  • Data Breaches Under GDPR

    Wednesday15:00 - 15:1506 Jun 2018
    Cyber Innovation Showcase

    The average data breach costs businesses £2.7m and takes 191 days to detect. Most businesses cannot self-detect and end up finding out through third parties whe...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.