Your Search

 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 15 results

|

Items per page:

Sort By
  • Security as a Service: Work where You Engineers Live

    Tuesday11:00 - 12:0005 Jun 2018
    CSA Summit

    Product Engineers and Managers live in tools like git, JIRA, and wikis to develop and release software, so why do security engineers use a fully different set o...

    • Language: English

  • Security at the Speed of Business: Supporting Digital Transformation with Cybersecurity

    Tuesday12:00 - 12:4005 Jun 2018
    Keynote Stage

    CISO Best Practice Panel Discussion Businesses are rapidly innovating, embracing new technologies and working practices to drive growth and competitive advanta...

    • Language: English

  • Surviving Ransom Driven DDoS Extortion Campaigns

    Tuesday12:40 - 13:0505 Jun 2018
    Tech Talks

    This session offers a practical guide for dealing with DDoS ransom campaigns and the link between ransomware and DDoS attacks. Learning Outcomes: Understandi...

    • Language: English

  • Securing the Future of Work

    Tuesday13:20 - 13:4505 Jun 2018
    Strategy Talks

    As people move out of traditional offices and increasingly into transient locations, computing platforms and networks – how will security and privacy be assured...

    • Language: English

  • Shining a Light on the Dark Web

    Tuesday14:00 - 14:2505 Jun 2018
    Tech Talks

    Based on years of researching the Dark Web, Christian Lees will provide an intriguing, illuminating “behind the curtain” look at threat actor attribution and th...

    • Language: English

  • Security is an Illusion: How I Rob Banks

    Tuesday14:15 - 15:0005 Jun 2018
    Geek Street

    A light-hearted trip through security failures both physical and electronic that have enabled me over the years to circumvent security of most of the world's la...

    • Language: English

  • Searching for a Million Bad Guys in Parallel: Hardware Accelerated Network Forensics

    Tuesday15:00 - 15:1505 Jun 2018
    Cyber Innovation Showcase

    Threat intelligence is born old - it takes an average of 6 months for new threats to appear on threat lists, by then you may have already been compromised. This...

    • Language: English

  • Secure by Design IoT

    Tuesday16:10 - 16:4005 Jun 2018
    CSA Summit

    A typical "insecure by design" IoT device has a large attack surface with high residual risks that must be mitigated by customer organizations.  This session wi...

    • Language: English

  • Searching for a Million Bad Guys in Parallel: Hardware Accelerated Network Forensics

    Wednesday12:55 - 13:1006 Jun 2018
    Cyber Innovation Showcase

    Threat intelligence is born old - it takes an average of 6 months for new threats to appear on threat lists, by then you may have already been compromised. This...

    • Language: English

  • Software Protection in the ASPIRE Project

    Wednesday14:15 - 15:0006 Jun 2018
    Geek Street

    Software Protection techniques aim to defend the confidentiality and integrity of software applications running on untrusted hosts (PC, smartphone, cloud) which...

    • Language: English

  • Sending a Human to do a Machine's Job: Addressing Threats with Analytics

    Wednesday15:30 - 16:3006 Jun 2018
    Information Security Exchange

    As the threat landscape continues to evolve, organisations must alter their approach from trying to prevent every threat to acknowledging that perfect protectio...

    • Language: English

  • Sneak in & Rule the Cloud Kingdom

    Thursday10:00 - 10:2507 Jun 2018
    Tech Talks

    To combat initial efforts from attackers, we researched new stealthy ways that could be used to escalate privileges in public cloud platforms. CyberArk Labs wil...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.