Your Search

 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 28 results

|

Items per page:

Sort By
  • Workshop 1: Social Engineering - How Hard Can It Be?

    Tuesday10:00 - 12:0005 Jun 2018
    Security Workshops

    A social engineering expert will guide the audience through an interactive Open Source Intelligence gathering attack to highlight the risks posed by our Online ...

    • Language: English

  • Workshop 3: CISSP Preview: Security & Risk Management

    Tuesday10:00 - 12:0005 Jun 2018
    Security Workshops

    Based on the (ISC)2 CISSP Certification – the Gold Standard in the Information Security Industry –  this workshop will cover the key principles every security p...

    • Language: English

  • Workshop 4: Ways to Protect your web Infrastructure from the Ever-Growing Threat of DDoS

    Tuesday10:00 - 12:0005 Jun 2018
    Security Workshops

    Matthew Wilson, Director of engineering of Neustar's Siteprotect NG network, brings a wealth of experience from running DDoS mitigation networks at Nexusguard a...

    • Language: English

  • Why Security Analysts Remain the Differentiator for Intelligence in Anomaly Detection?

    Tuesday13:00 - 14:0005 Jun 2018
    Information Security Exchange

    Technologies such as Machine Learning, Deep Learning, Security Analytics, Artificial Intelligence, amongst others are being hailed as the answer to combatting a...

    • Language: English

  • Workshop 2: The Biggest Threats in 2018 and Beyond

    Tuesday14:00 - 16:0005 Jun 2018
    Security Workshops

    As our use of technology develops, so do the actions of threat actors. In this session we will consider how technology is evolving, the opportunities this prese...

    • Language: English

  • Workshop 1: Protecting your Endpoint Infrastructure Against the most Elusive Threats

    Tuesday14:00 - 16:0005 Jun 2018
    Security Workshops

    Attend Bitdefender’s workshop to understand how to secure your infrastructure against the most elusive threats with GravityZone Ultra. Discover how industry lea...

    • Language: English

  • Workshop 3: CISSP Preview: Business Continuity & Awareness Programmes Requirements

    Tuesday14:00 - 16:0005 Jun 2018
    Security Workshops

    Based on the (ISC)2 CISSP Certification – the Gold Standard in the Information Security Industry –  this workshop will cover the key principles every security p...

    • Language: English

  • Workshop 4: Implementing an Effective Security Awareness Training Programme: Leaping Tall Buildings in Many, Many, Many Small Bounds

    Tuesday14:00 - 16:0005 Jun 2018
    Security Workshops

    Ever feel like you need super-human strength to build an effective security awareness training programme? This session will give clear, actionable guidance abou...

    • Language: English

  • We Are All Equifax: Data Behind DevSecOps

    Tuesday15:20 - 15:4505 Jun 2018
    Tech Talks

    In March 2017, hackers took three days to identify and exploit a new vulnerability in Equifax’s web applications. In the post-Equifax world, moving new business...

    • Language: English

  • Walking the Fine Line Between Corporate Bull & Practitioner Pedantry

    Tuesday16:00 - 16:2505 Jun 2018
    Strategy Talks

    Security and risk are understood and deemed a priority by both management and practioners. While the end goal for both is the same, their drivers are different....

    • Language: English

  • Workshop 4: How Human Intelligence (the Security Analyst) Can Thrive in an Autonomous AI World

    Wednesday10:00 - 12:0006 Jun 2018
    Security Workshops

    There is a myth that effective intelligence using Deep Learning techniques will minimise the role of security analysts. The Forest Tree team will be providing i...

    • Language: English

  • Workshop 2: Threat Hunting: Going Into Hand-to-Hand Combat with an Advanced Attacker

    Wednesday10:00 - 12:0006 Jun 2018
    Security Workshops

    Ever wonder how the hackers get in, or what they do once they have infiltrated a network? Learn about the latest attack techniques that have been uncovered by ...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.