Your Search

 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 24 of 228 results

|

Items per page:

Sort By
  • Workshop 1: Social Engineering - How Hard Can It Be?

    Tuesday10:00 - 12:0005 Jun 2018
    Security Workshops

    A social engineering expert will guide the audience through an interactive Open Source Intelligence gathering attack to highlight the risks posed by our Online ...

    • Language: English

  • View from the Board: A CEO's Perspective on Cybersecurity

    Tuesday10:00 - 10:5005 Jun 2018
    Keynote Stage

    Opening Keynote Presentation Cybersecurity is undoubtedly high on the board’s agenda as a key business risk, not least because when an organisation is breached,...

    • Language: English

  • Workshop 3: CISSP Preview: Security & Risk Management

    Tuesday10:00 - 12:0005 Jun 2018
    Security Workshops

    Based on the (ISC)2 CISSP Certification – the Gold Standard in the Information Security Industry –  this workshop will cover the key principles every security p...

    • Language: English

  • Workshop 4: Ways to Protect your web Infrastructure from the Ever-Growing Threat of DDoS

    Tuesday10:00 - 12:0005 Jun 2018
    Security Workshops

    Matthew Wilson, Director of engineering of Neustar's Siteprotect NG network, brings a wealth of experience from running DDoS mitigation networks at Nexusguard a...

    • Language: English

  • Do You Have What it Takes to Build an In-House Incident Response Team?

    Tuesday10:00 - 10:2505 Jun 2018
    Tech Talks

    An in-house response team can be more effective in identifying and responding to incidents, with historical security data to perform the most effective and comp...

    • Language: English

  • The State of Cyber: How Stealthier Attacks are Blurring the Lines Between Cybercrime & Statecraft

    Tuesday10:00 - 10:2505 Jun 2018
    Strategy Talks

    Don't miss internationally recognised security expert, author, entrepreneur, speaker and CEO and co-founder of CrowdStrike, George Kurtz reveal some of the most...

    • Language: English

  • Mine & Thine - Learning from Browser Cryptocurrency Mining Attacks

    Tuesday10:00 - 10:2505 Jun 2018
    Technology Showcase

    It isn't hard for an attacker to use your web browser to mine cryptocurrency, as we've seen from a recent spate of public incidents. This type of attack was pre...

    • Language: English

  • Tackling Human Error: Beyond Security Awareness

    Tuesday10:25 - 10:4005 Jun 2018
    Cyber Innovation Showcase

    Human error is by far the most prevalent cause of security breaches – but what can we do against such a varied and evasive threat? By unpacking a series of case...

    • Language: English

  • How GP Bullhound Address the Security Challenges in the Financial Services Market

    Tuesday10:30 - 11:0005 Jun 2018
    Talking Tactics

    GP Bullhound is a leading technology advisory and investment firm, providing transaction advice and capital to entrepreneurs and founders. They help exceptional...

    • Language: English

  • Roundtable 1: Operational Risk and the Role of the CISO

    Tuesday10:30 - 11:3005 Jun 2018
    Leaders Programme

    As high-profile breaches continue to fill news headlines and swipe at the reputation of well – known companies and brands, the debate around accountability is g...

    • Language: English

  • An Introduction to Exploitation

    Tuesday10:30 - 11:1505 Jun 2018
    Geek Street

    Exploits have been the core of how cyber criminals and nation state actors distribute malicious code for many years, from popping shells remotely to exploiting ...

    • Language: English

  • Don’t be a Victim: Defending the Borderless Enterprise

    Tuesday10:30 - 11:3005 Jun 2018
    Information Security Exchange

    In any adversarial scenario, your offensive and defensive tactics are dictated by two things: the capabilities and/or tactics of your adversary and the terrain....

    • Language: English

  • Into the Cloud & Other Horror Stories…

    Tuesday10:40 - 11:0005 Jun 2018
    CSA Summit

    Over the past decade, many industries have embraced the cloud. After it was embraced, they discovered multiple issues in implementation and deployment strategie...

    • Language: English

  • The Hidden Cyber-Crime Economy

    Tuesday10:40 - 11:0505 Jun 2018
    Technology Showcase

    Businesses are evolving and digitalisation is changing the shape of the business landscape. Pure-play retailers are taking the lead, bypassing high-street fashi...

    • Language: English

  • Combining Encryption & Machine Learning to Defeat the Insider Threat

    Tuesday10:40 - 11:0505 Jun 2018
    Tech Talks

    The data doesn’t lie. Organisations are failing to overcome the significant risks their own staff pose to sensitive information. In the first six months of 2017...

    • Language: English

  • Leveraging AI for Dynamic & Surgical Autonomous Response for Cyber Defence

    Tuesday10:40 - 11:0505 Jun 2018
    Strategy Talks

    Proposing a new approach to cyber defence, which uses dynamic AI systems that can counter the activity of malicious threats. This new advanced AI technology can...

    • Language: English

  • Goodbye Passwords: A Discussion on the Future of Authentication

    Tuesday10:50 - 11:0505 Jun 2018
    Cyber Innovation Showcase

    The world of authentication is changing. Passwords are no longer reliable in protecting our data and identities. Their management, protection and memorisation a...

    • Language: English

  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    Tuesday11:00 - 11:3005 Jun 2018
    CSA Summit

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with ...

    • Language: English

  • Security as a Service: Work where You Engineers Live

    Tuesday11:00 - 12:0005 Jun 2018
    CSA Summit

    Product Engineers and Managers live in tools like git, JIRA, and wikis to develop and release software, so why do security engineers use a fully different set o...

    • Language: English

  • Quantum Computing: How Should Cybersecurity Professionals Prepare?

    Tuesday11:05 - 11:4005 Jun 2018
    Keynote Stage

    Keynote Presentation The Keynote Stage is located on Level 3 of the Olympia Conference Centre. To access the conference centre, please use the signposted entran...

    • Language: English

  • CIAO Compliance: Why Traditional InfoSec Compliance is Dead

    Tuesday11:15 - 11:3005 Jun 2018
    Cyber Innovation Showcase

    The future of InfoSec compliance is bright. By utilising smart technology, compliance will be automated, seamless and continuous. Learning Outcomes:  Be one ...

    • Language: English

  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    Tuesday11:15 - 11:4505 Jun 2018
    Talking Tactics

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with ...

    • Language: English

  • Inside the Hacker's Bag of Tricks: 6 Full Breaches in 30 Minutes

    Tuesday11:20 - 11:4505 Jun 2018
    Technology Showcase

    Learning Outcomes: Understanding how hackers get access to the enterprise Learn more about securing your privileged accounts

    • Language: English

  • The Rise of Wiper Malware

    Tuesday11:20 - 11:4505 Jun 2018
    Tech Talks

    Behind every attack is an individual trying to achieve objectives. In some cases, the objective of the attack is simply to destroy systems and cause as much dam...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.