Your Search

 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 6 of 6 results

|

Items per page:

Sort By
  • Mine & Thine - Learning from Browser Cryptocurrency Mining Attacks

    Tuesday10:00 - 10:2505 Jun 2018
    Technology Showcase

    It isn't hard for an attacker to use your web browser to mine cryptocurrency, as we've seen from a recent spate of public incidents. This type of attack was pre...

    • Language: English

  • Managing Data Breaches in the Cloud

    Tuesday16:40 - 17:0005 Jun 2018
    CSA Summit

    With more data being stored in the cloud companies are facing major changes in how they respond to security breaches. Privacy laws, such as the GDPR, which requ...

    • Language: English

  • Microsoft Breakfast Briefing: Building Security into the User Experience (PRE-REGISTRATION REQUIRED)

    Wednesday08:00 - 09:1506 Jun 2018
    Keynote Stage

    Join Microsoft as we discuss some of the challenges with digital transformation and the impact that has on the traditional security model. The traditional secur...

    • Language: English

  • Managing Security While Driving Digital Transformation

    Wednesday12:00 - 12:2506 Jun 2018
    Technology Showcase

    In the era of digital transformation enterprises are struggling to effectively monitor and manage their security policy across hybrid environments of on-premise...

    • Language: English

  • Managing the Modern Attack Surface

    Wednesday13:00 - 14:0006 Jun 2018
    Information Security Exchange

    The network is unrecognisable as cloud, containers, custom web apps, IoT, and OT all warp the perimeter. Against this, 2017 saw the number of discovered vulnera...

    • Language: English

  • Method for Improved Detection of Malware C&C Traffic Using a Multidimensional Model & Network Timeline Analysis

    Wednesday16:00 - 16:2506 Jun 2018
    Tech Talks

    Many organisations utilise their own security teams or external managed security service providers (MSSPs) to detect malicious traffic and infections on their n...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.