Your Search

 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 32 results

|

Items per page:

Sort By
  • The State of Cyber: How Stealthier Attacks are Blurring the Lines Between Cybercrime & Statecraft

    Tuesday10:00 - 10:2505 Jun 2018
    Strategy Talks

    Don't miss internationally recognised security expert, author, entrepreneur, speaker and CEO and co-founder of CrowdStrike, George Kurtz reveal some of the most...

    • Language: English

  • Tackling Human Error: Beyond Security Awareness

    Tuesday10:25 - 10:4005 Jun 2018
    Cyber Innovation Showcase

    Human error is by far the most prevalent cause of security breaches – but what can we do against such a varied and evasive threat? By unpacking a series of case...

    • Language: English

  • The Hidden Cyber-Crime Economy

    Tuesday10:40 - 11:0505 Jun 2018
    Technology Showcase

    Businesses are evolving and digitalisation is changing the shape of the business landscape. Pure-play retailers are taking the lead, bypassing high-street fashi...

    • Language: English

  • The Rise of Wiper Malware

    Tuesday11:20 - 11:4505 Jun 2018
    Tech Talks

    Behind every attack is an individual trying to achieve objectives. In some cases, the objective of the attack is simply to destroy systems and cause as much dam...

    • Language: English

  • Turtles, Trust & the Future of Cybersecurity

    Tuesday12:00 - 12:2505 Jun 2018
    Technology Showcase

    Faith in our institutions is collapsing, and GDPR is at the door. What would cybersecurity look like if we started from scratch, right now, in our hybrid, inter...

    • Language: English

  • Taking Control of Ransomware & Other Malware Threats

    Tuesday13:00 - 13:3005 Jun 2018
    Talking Tactics

    Ransomware and malware attacks are nothing new. Many organisations have been on the receiving end of these types of attacks for years. Common advice is to ensur...

    • Language: English

  • The Apple of your EFI: An Updated Analysis of the State of Apple’s EFI Security Support

    Tuesday13:00 - 13:4505 Jun 2018
    Geek Street

    Duo Labs performed analysis over more than 73,000 realworld Apple Mac systems to see how the state of their running EFI compared to the expected state of their ...

    • Language: English

  • Tackling Identity Today, Tomorrow, & Its Vision for the Future

    Tuesday13:20 - 13:4505 Jun 2018
    Technology Showcase

    Is Identity core to modernising your enterprise IT strategy? Okta is built from the ground-up to provide the most secure, trusted and reliable Identity Cloud f...

    • Language: English

  • The Anatomy of a Multi-Layered Mobile Attack

    Tuesday14:40 - 15:0505 Jun 2018
    Tech Talks

    Do you think your mobile phone is secure? Think again. In this talk we will present several real-world attack examples as we deconstruct mobile threats and show...

    • Language: English

  • Threat Modeling: The Ultimate DevSecOps

    Tuesday15:50 - 16:1005 Jun 2018
    CSA Summit

    Software is eating the world, and hackers are eating the software. Cloud and DevOps are allowing organisations to deploy software with ever increasing velocity ...

    • Language: English

  • True Cybercriminals are Only After Your Data; Why Are We Not Defending Against It?

    Tuesday15:55 - 16:2005 Jun 2018
    Cyber Innovation Showcase

    In this informative session, we will address the following facts: - Cybercriminals ONLY monetise on data - The threats are not just from the outside - DataB...

    • Language: English

  • The Evolving Architecture of the Web & its Impact on Security, Privacy & Latency

    Wednesday10:00 - 10:2506 Jun 2018
    Tech Talks

    The encrypted web is built on a few protocols which were written with fundamental assumptions about the architecture of the internet in mind. But the popularity...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.