Your Search

 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 5 of 5 results

|

Items per page:

Sort By
  • From Cyber-Threat to Cyber-Ally: Changing Behaviour to Drive a Risk-Aware Culture

    Tuesday14:35 - 15:5005 Jun 2018
    Keynote Stage

    Solving the People Problem: Part 1 Mitigating human risk is at the heart of any information security strategy and yet users continue to be one of the weakest p...

    • Language: English

  • Friend or Foe? Can (and Will) AI & Machine Learning Stop Hackers? Or Will AI be the Hacker?

    Wednesday13:30 - 14:1006 Jun 2018
    Keynote Stage

    Keynote Special: Focus on Disruptive Technologies AI has been lauded for its potential to transform cybersecurity, but also has the potential to be used by cyb...

    • Language: English

  • Fake News – More Than Just a Catchy Headline & why Businesses Should be Concerned

    Wednesday14:00 - 14:2506 Jun 2018
    Strategy Talks

    Disinformation campaigns, or “fake news” stories, are not limited to the geopolitical realm – its use is far more pervasive. This talk provides original finding...

    • Language: English

  • From Next Generation to Cloud Generation Security

    Wednesday15:20 - 15:4506 Jun 2018
    Strategy Talks

    The rapid adoption of public cloud platforms like AWS and Azure to host workloads and applications is challenging traditional firewall-based security architectu...

    • Language: English

  • For AppSec Teams, Small Can Be Beautiful

    Wednesday15:55 - 16:2006 Jun 2018
    Cyber Innovation Showcase

    Is your AppSec program stalled? Is it failing to meet your expectations? You may be victim of some common anti-patterns that are keeping you from reaching your ...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.