Your Search

 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 16 results

|

Items per page:

Sort By
  • How GP Bullhound Address the Security Challenges in the Financial Services Market

    Tuesday10:30 - 11:0005 Jun 2018
    Talking Tactics

    GP Bullhound is a leading technology advisory and investment firm, providing transaction advice and capital to entrepreneurs and founders. They help exceptional...

    • Language: English

  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    Tuesday11:00 - 11:3005 Jun 2018
    CSA Summit

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with ...

    • Language: English

  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    Tuesday11:15 - 11:4505 Jun 2018
    Talking Tactics

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with ...

    • Language: English

  • How Zero Trust is Creating a Game-Changing Security Experience

    Tuesday14:45 - 15:1505 Jun 2018
    CSA Summit

    Details coming soon.

    • Language: English

  • How Stealthier Attacks are Blurring the lines between Cybercrime and Statecraft

    Tuesday15:00 - 15:2505 Jun 2018
    Talking Tactics

    Presented by Zeki Turedi.

    • Language: English

  • Humans vs Machines

    Tuesday15:25 - 15:4005 Jun 2018
    Cyber Innovation Showcase

    Why are people considered the weakest link in our cybersecurity systems? Because the system does not work for them. This talk looks at how users are attacked th...

    • Language: English

  • How to Spotlight the Threats That Get Through Your Defences

    Tuesday16:00 - 16:2505 Jun 2018
    Technology Showcase

    Cyberattacks are evolving constantly, hence it’s vital to stay one step ahead of the hackers. Continuous cyberattack simulation is the most effective way to ass...

    • Language: English

  • How Cognitive Computing is Shaping the Future of Cybersecurity

    Tuesday16:30 - 16:5505 Jun 2018
    Cyber Innovation Showcase

    In the near future, as artificial intelligence (AI) systems become more capable, we will begin to see more automated and increasingly sophisticated social engin...

    • Language: English

  • How Citrix Helped Beazley Create a Secure Digital Workspace for the Enterprise

    Wednesday10:30 - 11:0006 Jun 2018
    Talking Tactics

    Beazley is an A-rated specialist global insurer. They have simplified the delivery of apps, desktops and data into a unified, fully-integrated digital workspace...

    • Language: English

  • Hacking the World’s Most Secure Communications Protocol

    Wednesday11:45 - 12:3006 Jun 2018
    Geek Street

    We’re living in the age of cybersecurity where every month we see an announcement for the newest and coolest ‘next generation’ thing. Whilst we are making some ...

    • Language: English

  • Humans vs Machines

    Wednesday12:30 - 12:4506 Jun 2018
    Cyber Innovation Showcase

    Why are people considered the weakest link in our cybersecurity systems? Because the system does not work for them. This talk looks at how users are attacked th...

    • Language: English

  • Hardware Hacking: What Can Adult Toys Tell Us About the State of the IoT?

    Wednesday13:00 - 13:4506 Jun 2018
    Geek Street

    Hacking adult toys is headline grabbing stuff, but their flawed hardware security shares much with the rest of the IoT. In this hardware hacking session you’ll ...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.