Your Search

 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 9 of 9 results

|

Items per page:

Sort By
  • Goodbye Passwords: A Discussion on the Future of Authentication

    Tuesday10:50 - 11:0505 Jun 2018
    Cyber Innovation Showcase

    The world of authentication is changing. Passwords are no longer reliable in protecting our data and identities. Their management, protection and memorisation a...

    • Language: English

  • GDPR Breach Notification: Demystifying What the Regulators want

    Tuesday11:20 - 11:4505 Jun 2018
    Strategy Talks

    With GDPR here, organisations have endeavoured to change how they collect and use personal data with more accountable and compliant processes. However, the GDPR...

    • Language: English

  • GDPR Compliance Beyond Encryption

    Tuesday13:45 - 14:0005 Jun 2018
    Cyber Innovation Showcase

    The ICO has stated that encryption is NOT proof of compliance. Companies of all sizes will need to show a much more robust mobile data security implementation. ...

    • Language: English

  • GDPR Compliance Beyond Encryption

    Wednesday10:25 - 10:4006 Jun 2018
    Cyber Innovation Showcase

    The ICO has stated that encryption is NOT proof of compliance. Companies of all sizes will need to show a much more robust mobile data security implementation. ...

    • Language: English

  • GDPR Compliance is a Moving Target – Managing Internal Security, Data Breach Processes & Third Party Providers

    Wednesday11:45 - 12:4506 Jun 2018
    Information Security Exchange

    With the EU General Data Protection Regulation now in effect, IT security professionals must ensure that their companies follow the guidance on data privacy, in...

    • Language: English

  • Goodbye Passwords: A Discussion on the Future of Authentication

    Wednesday14:35 - 14:5006 Jun 2018
    Cyber Innovation Showcase

    The world of authentication is changing. Passwords are no longer reliable in protecting our data and identities. Their management, protection and memorisation a...

    • Language: English

  • GDPR Article 28: Operationalising 3rd & 4th Party Vendor Risk Management

    Thursday11:15 - 11:4507 Jun 2018
    Talking Tactics

    Managing vendor risk is a continuous effort under GDPR. As organisations continue to improve their privacy programs, streamlining third and fourth-party vendor ...

    • Language: English

  • GDPR Compliance Requires Cultural Change

    Thursday12:00 - 12:3007 Jun 2018
    Talking Tactics

    The GDPR requirements are extensive and, beyond deploying technical controls, an effective GDPR readiness programme needs to consider related people and process...

    • Language: English

  • GDPR: Using Network Analytics to Automatically Discover, Map and Track Personal Data Flow

    Thursday14:00 - 14:2507 Jun 2018
    Technology Showcase

    GDPR told us what we need to do to protect the personal Data rights of the EU Citizen, it's up to technology to make it happen accurately, simply and efficientl...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.