Your Search

 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 8 of 8 results

|

Items per page:

Sort By
  • Email Fraud Defence: Catch the Imposter and Authenticate Legitimate Communications

    Tuesday12:40 - 13:0505 Jun 2018
    Technology Showcase

    Highly targeted imposter emails are the biggest threat to organisations today, tricking users into divulging critical data and funds. Learn how Proofpoint can p...

    • Language: English

  • Early Warning System for Cyber-Physical Systems

    Tuesday12:55 - 13:1005 Jun 2018
    Cyber Innovation Showcase

    Cyber-physical systems (CPS) serve on convergence of information and operational technology, and are the fundamental building blocks of an increasing smart worl...

    • Language: English

  • Encryption Demystified – Stop the Breaches with a Better Encryption Strategy

    Tuesday16:40 - 17:0505 Jun 2018
    Strategy Talks

    Cryptography is arguably one of the most poorly understood areas of cybersecurity. And based on the number of data breaches that continue to happen, it’s clear ...

    • Language: English

  • Eliminating Blind Spots in the Cloud to Prevent Data Exfiltration

    Wednesday14:00 - 14:2506 Jun 2018
    Technology Showcase

    Cloud environments can be a black box to enterprise security teams leaving attackers to focus their energies on targeting these systems to gain access to sensit...

    • Language: English

  • Every Cloud has a Privileged Lining

    Wednesday15:20 - 15:4506 Jun 2018
    Technology Showcase

    As organisations across the world look to adopt and leverage cloud platforms, a new-tier of privileged access is introduced. Privileged Access achieved through ...

    • Language: English

  • EU GDPR is Here – Now What? Smart Security Measures to Protect Personal Data & Privacy

    Wednesday16:30 - 17:3006 Jun 2018
    Keynote Stage

    Focus on Regulation Meeting the EU GDPR implementation deadline is only the beginning of the story. SinceEU GDPR was first proposed in January 2012, organisati...

    • Language: English

  • Enhancing Secure Cross-Boundary Collaboration - A Strategic Guide for 2018 & Beyond

    Wednesday16:40 - 17:0506 Jun 2018
    Technology Showcase

    The aim of the presentation is to educate and make the audience aware of the cybersecurity landscape in today’s world. The journey will be structured through a ...

    • Language: English

  • Establishing Technology Trust in a Containerised World

    Thursday14:00 - 14:2507 Jun 2018
    Tech Talks

    When deploying containerised applications at scale, a trust model is a key component of secure deployments. Defining that trust model requires an understanding ...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.