Your Search

 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 64 of 228 results

|

Items per page:

Sort By
  • Workshop 1: Social Engineering - How Hard Can It Be?

    Tuesday10:00 - 12:0005 Jun 2018
    Security Workshops

    A social engineering expert will guide the audience through an interactive Open Source Intelligence gathering attack to highlight the risks posed by our Online ...

    • Language: English

  • View from the Board: A CEO's Perspective on Cybersecurity

    Tuesday10:00 - 10:5005 Jun 2018
    Keynote Stage

    Opening Keynote Presentation Cybersecurity is undoubtedly high on the board’s agenda as a key business risk, not least because when an organisation is breached,...

    • Language: English

  • Workshop 3: CISSP Preview: Security & Risk Management

    Tuesday10:00 - 12:0005 Jun 2018
    Security Workshops

    Based on the (ISC)2 CISSP Certification – the Gold Standard in the Information Security Industry –  this workshop will cover the key principles every security p...

    • Language: English

  • Workshop 4: Ways to Protect your web Infrastructure from the Ever-Growing Threat of DDoS

    Tuesday10:00 - 12:0005 Jun 2018
    Security Workshops

    Matthew Wilson, Director of engineering of Neustar's Siteprotect NG network, brings a wealth of experience from running DDoS mitigation networks at Nexusguard a...

    • Language: English

  • Do You Have What it Takes to Build an In-House Incident Response Team?

    Tuesday10:00 - 10:2505 Jun 2018
    Tech Talks

    An in-house response team can be more effective in identifying and responding to incidents, with historical security data to perform the most effective and comp...

    • Language: English

  • The State of Cyber: How Stealthier Attacks are Blurring the Lines Between Cybercrime & Statecraft

    Tuesday10:00 - 10:2505 Jun 2018
    Strategy Talks

    Don't miss internationally recognised security expert, author, entrepreneur, speaker and CEO and co-founder of CrowdStrike, George Kurtz reveal some of the most...

    • Language: English

  • Mine & Thine - Learning from Browser Cryptocurrency Mining Attacks

    Tuesday10:00 - 10:2505 Jun 2018
    Technology Showcase

    It isn't hard for an attacker to use your web browser to mine cryptocurrency, as we've seen from a recent spate of public incidents. This type of attack was pre...

    • Language: English

  • Tackling Human Error: Beyond Security Awareness

    Tuesday10:25 - 10:4005 Jun 2018
    Cyber Innovation Showcase

    Human error is by far the most prevalent cause of security breaches – but what can we do against such a varied and evasive threat? By unpacking a series of case...

    • Language: English

  • How GP Bullhound Address the Security Challenges in the Financial Services Market

    Tuesday10:30 - 11:0005 Jun 2018
    Talking Tactics

    GP Bullhound is a leading technology advisory and investment firm, providing transaction advice and capital to entrepreneurs and founders. They help exceptional...

    • Language: English

  • Roundtable 1: Operational Risk and the Role of the CISO

    Tuesday10:30 - 11:3005 Jun 2018
    Leaders Programme

    As high-profile breaches continue to fill news headlines and swipe at the reputation of well – known companies and brands, the debate around accountability is g...

    • Language: English

  • An Introduction to Exploitation

    Tuesday10:30 - 11:1505 Jun 2018
    Geek Street

    Exploits have been the core of how cyber criminals and nation state actors distribute malicious code for many years, from popping shells remotely to exploiting ...

    • Language: English

  • Don’t be a Victim: Defending the Borderless Enterprise

    Tuesday10:30 - 11:3005 Jun 2018
    Information Security Exchange

    In any adversarial scenario, your offensive and defensive tactics are dictated by two things: the capabilities and/or tactics of your adversary and the terrain....

    • Language: English

  • Into the Cloud & Other Horror Stories…

    Tuesday10:40 - 11:0005 Jun 2018
    CSA Summit

    Over the past decade, many industries have embraced the cloud. After it was embraced, they discovered multiple issues in implementation and deployment strategie...

    • Language: English

  • The Hidden Cyber-Crime Economy

    Tuesday10:40 - 11:0505 Jun 2018
    Technology Showcase

    Businesses are evolving and digitalisation is changing the shape of the business landscape. Pure-play retailers are taking the lead, bypassing high-street fashi...

    • Language: English

  • Combining Encryption & Machine Learning to Defeat the Insider Threat

    Tuesday10:40 - 11:0505 Jun 2018
    Tech Talks

    The data doesn’t lie. Organisations are failing to overcome the significant risks their own staff pose to sensitive information. In the first six months of 2017...

    • Language: English

  • Leveraging AI for Dynamic & Surgical Autonomous Response for Cyber Defence

    Tuesday10:40 - 11:0505 Jun 2018
    Strategy Talks

    Proposing a new approach to cyber defence, which uses dynamic AI systems that can counter the activity of malicious threats. This new advanced AI technology can...

    • Language: English

  • Goodbye Passwords: A Discussion on the Future of Authentication

    Tuesday10:50 - 11:0505 Jun 2018
    Cyber Innovation Showcase

    The world of authentication is changing. Passwords are no longer reliable in protecting our data and identities. Their management, protection and memorisation a...

    • Language: English

  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    Tuesday11:00 - 11:3005 Jun 2018
    CSA Summit

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with ...

    • Language: English

  • Security as a Service: Work where You Engineers Live

    Tuesday11:00 - 12:0005 Jun 2018
    CSA Summit

    Product Engineers and Managers live in tools like git, JIRA, and wikis to develop and release software, so why do security engineers use a fully different set o...

    • Language: English

  • Quantum Computing: How Should Cybersecurity Professionals Prepare?

    Tuesday11:05 - 11:4005 Jun 2018
    Keynote Stage

    Keynote Presentation The Keynote Stage is located on Level 3 of the Olympia Conference Centre. To access the conference centre, please use the signposted entran...

    • Language: English

  • CIAO Compliance: Why Traditional InfoSec Compliance is Dead

    Tuesday11:15 - 11:3005 Jun 2018
    Cyber Innovation Showcase

    The future of InfoSec compliance is bright. By utilising smart technology, compliance will be automated, seamless and continuous. Learning Outcomes:  Be one ...

    • Language: English

  • How to Tackle the GDPR: A Typical Privacy & Security Roadmap

    Tuesday11:15 - 11:4505 Jun 2018
    Talking Tactics

    As a new era of privacy regulations approaches, security and compliance professionals need to make GDPR a top priority. It is essential to build a roadmap with ...

    • Language: English

  • Inside the Hacker's Bag of Tricks: 6 Full Breaches in 30 Minutes

    Tuesday11:20 - 11:4505 Jun 2018
    Technology Showcase

    Learning Outcomes: Understanding how hackers get access to the enterprise Learn more about securing your privileged accounts

    • Language: English

  • The Rise of Wiper Malware

    Tuesday11:20 - 11:4505 Jun 2018
    Tech Talks

    Behind every attack is an individual trying to achieve objectives. In some cases, the objective of the attack is simply to destroy systems and cause as much dam...

    • Language: English

  • GDPR Breach Notification: Demystifying What the Regulators want

    Tuesday11:20 - 11:4505 Jun 2018
    Strategy Talks

    With GDPR here, organisations have endeavoured to change how they collect and use personal data with more accountable and compliant processes. However, the GDPR...

    • Language: English

  • Data Breaches Under GDPR

    Tuesday11:40 - 11:5505 Jun 2018
    Cyber Innovation Showcase

    The average data breach costs businesses £2.7m and takes 191 days to detect. Most businesses cannot self-detect and end up finding out through third parties whe...

    • Language: English

  • Unleashing the Automated Memory Forensics Playbook to Hunt for Evasive Malware

    Tuesday11:45 - 12:3005 Jun 2018
    Geek Street

    Fileless attacks and evasive malware are realities that blue teams must deal with on an ongoing basis. Memory forensics are useful in this fight, but it can be ...

    • Language: English

  • DNS as a First Line of Defence

    Tuesday11:45 - 12:4505 Jun 2018
    Information Security Exchange

    Whenever a device interacts with another, the first thing that occurs is a DNS request. The object of this session is to discuss ways to sort the good requests ...

    • Language: English

  • Reject Everything: TransferWise’s Journey to Full DMARC Protection

    Tuesday12:00 - 12:3005 Jun 2018
    Talking Tactics

    In just seven years, TransferWise has revolutionised the way people and businesses transfer money around the world. As a digital-first business TransferWise rel...

    • Language: English

  • Security at the Speed of Business: Supporting Digital Transformation with Cybersecurity

    Tuesday12:00 - 12:4005 Jun 2018
    Keynote Stage

    CISO Best Practice Panel Discussion Businesses are rapidly innovating, embracing new technologies and working practices to drive growth and competitive advanta...

    • Language: English

  • Turtles, Trust & the Future of Cybersecurity

    Tuesday12:00 - 12:2505 Jun 2018
    Technology Showcase

    Faith in our institutions is collapsing, and GDPR is at the door. What would cybersecurity look like if we started from scratch, right now, in our hybrid, inter...

    • Language: English

  • Crypto Currency Mining: How, Why, When & How to Prevent My Computer Power Being Stolen!

    Tuesday12:00 - 12:2505 Jun 2018
    Tech Talks

    Crypto coin mining is emerging as a new way to monetise visitor traffic. As users become savvier and increasingly use ad blockers, advertisers revenue is declin...

    • Language: English

  • IT, OT & the Pursuit of Convergence

    Tuesday12:00 - 12:2505 Jun 2018
    Strategy Talks

    In this session, we’ll examine real-world scenarios of disruption caused by the collision between corporate IT and plant OT infrastructures. Speakers will discu...

    • Language: English

  • 10,000 Keys for 10,000 Castles: An Innovative Solution to Mass Data Loss

    Tuesday12:05 - 12:2005 Jun 2018
    Cyber Innovation Showcase

    GBR14 discusses the existing issues and ways of managing data access to eliminate bulk data loss?  Bulk data loss is a huge risk. Traditional approaches to dat...

    • Language: English

  • Using Artificial Intelligence to Secure Rolling Stock in the UK Rail Industry

    Tuesday12:30 - 12:4505 Jun 2018
    Cyber Innovation Showcase

    During this session RazorSecure will discuss some of the work they have been doing with leading UK train operators to secure their onboard infrastructure using ...

    • Language: English

  • Email Fraud Defence: Catch the Imposter and Authenticate Legitimate Communications

    Tuesday12:40 - 13:0505 Jun 2018
    Technology Showcase

    Highly targeted imposter emails are the biggest threat to organisations today, tricking users into divulging critical data and funds. Learn how Proofpoint can p...

    • Language: English

  • Surviving Ransom Driven DDoS Extortion Campaigns

    Tuesday12:40 - 13:0505 Jun 2018
    Tech Talks

    This session offers a practical guide for dealing with DDoS ransom campaigns and the link between ransomware and DDoS attacks. Learning Outcomes: Understandi...

    • Language: English

  • Defence Magic: How Incident Response can Solve Defensive Problems

    Tuesday12:40 - 13:0505 Jun 2018
    Strategy Talks

    Many IT security organisations lack appropriate metrics to understand how effective defensive efforts are in their environments or to fully grasp where gaps exi...

    • Language: English

  • Early Warning System for Cyber-Physical Systems

    Tuesday12:55 - 13:1005 Jun 2018
    Cyber Innovation Showcase

    Cyber-physical systems (CPS) serve on convergence of information and operational technology, and are the fundamental building blocks of an increasing smart worl...

    • Language: English

  • Why Security Analysts Remain the Differentiator for Intelligence in Anomaly Detection?

    Tuesday13:00 - 14:0005 Jun 2018
    Information Security Exchange

    Technologies such as Machine Learning, Deep Learning, Security Analytics, Artificial Intelligence, amongst others are being hailed as the answer to combatting a...

    • Language: English

  • Confessions of a Cloud Security Convert

    Tuesday13:00 - 13:3005 Jun 2018
    CSA Summit

    Michael Farnum had been a network and application security person for many years. He switched roles in the industry right about the same time cloud networking s...

    • Language: English

  • Taking Control of Ransomware & Other Malware Threats

    Tuesday13:00 - 13:3005 Jun 2018
    Talking Tactics

    Ransomware and malware attacks are nothing new. Many organisations have been on the receiving end of these types of attacks for years. Common advice is to ensur...

    • Language: English

  • The Apple of your EFI: An Updated Analysis of the State of Apple’s EFI Security Support

    Tuesday13:00 - 13:4505 Jun 2018
    Geek Street

    Duo Labs performed analysis over more than 73,000 realworld Apple Mac systems to see how the state of their running EFI compared to the expected state of their ...

    • Language: English

  • Patch or Perish: Strengthening Cybersecurity Controls to Reduce Risk & Mitigate Threats

    Tuesday13:00 - 14:1505 Jun 2018
    Keynote Stage

    CISO Panel Discussion If the high-profile breaches of 2017 showed one thing, it’s that without good cyber hygiene practices, organisations are wide-open to att...

    • Language: English

  • Using Light to Protect Your Business Against the Threat of Quantum Computers

    Tuesday13:20 - 13:3505 Jun 2018
    Cyber Innovation Showcase

    KETS Quantum Security designs, develops and deploys future-proof security hardware powered by our game-changing quantum technologies. Government security agenc...

    • Language: English

  • Tackling Identity Today, Tomorrow, & Its Vision for the Future

    Tuesday13:20 - 13:4505 Jun 2018
    Technology Showcase

    Is Identity core to modernising your enterprise IT strategy? Okta is built from the ground-up to provide the most secure, trusted and reliable Identity Cloud f...

    • Language: English

  • Piecing Together the Global Threat Jigsaw & Identifying What Really Matters to You

    Tuesday13:20 - 13:4505 Jun 2018
    Tech Talks

    In an environment filled with endless security alerts, threat intelligence feeds and news reports about the latest threats, it can be difficult for security pra...

    • Language: English

  • Securing the Future of Work

    Tuesday13:20 - 13:4505 Jun 2018
    Strategy Talks

    As people move out of traditional offices and increasingly into transient locations, computing platforms and networks – how will security and privacy be assured...

    • Language: English

  • CSA EMEA Chapter Updates: From Global to Local Cloud Security Research

    Tuesday13:30 - 14:1505 Jun 2018
    CSA Summit

    Regional chapters are essential to the CSA mission to promote the secure adoption of cloud computing. CSA chapter members are composed primarily of individual m...

    • Language: English

  • Data Breach Class Actions - Morrisons Case Update

    Tuesday13:45 - 14:1505 Jun 2018
    Talking Tactics

    In 2017, WM Morrison Supermarkets Plc was found legally responsible for the leak of just under 100,000 employees' payroll data. The information was misused by a...

    • Language: English

  • GDPR Compliance Beyond Encryption

    Tuesday13:45 - 14:0005 Jun 2018
    Cyber Innovation Showcase

    The ICO has stated that encryption is NOT proof of compliance. Companies of all sizes will need to show a much more robust mobile data security implementation. ...

    • Language: English

  • Workshop 2: The Biggest Threats in 2018 and Beyond

    Tuesday14:00 - 16:0005 Jun 2018
    Security Workshops

    As our use of technology develops, so do the actions of threat actors. In this session we will consider how technology is evolving, the opportunities this prese...

    • Language: English

  • Workshop 1: Protecting your Endpoint Infrastructure Against the most Elusive Threats

    Tuesday14:00 - 16:0005 Jun 2018
    Security Workshops

    Attend Bitdefender’s workshop to understand how to secure your infrastructure against the most elusive threats with GravityZone Ultra. Discover how industry lea...

    • Language: English

  • Workshop 3: CISSP Preview: Business Continuity & Awareness Programmes Requirements

    Tuesday14:00 - 16:0005 Jun 2018
    Security Workshops

    Based on the (ISC)2 CISSP Certification – the Gold Standard in the Information Security Industry –  this workshop will cover the key principles every security p...

    • Language: English

  • Network Security Policy Management - Automation for Transformation

    Tuesday14:00 - 14:2505 Jun 2018
    Technology Showcase

    Making security policy changes manually is a slow, labourious process which is fraught with risks; it can take several days—sometimes weeks—to process a single ...

    • Language: English

  • Shining a Light on the Dark Web

    Tuesday14:00 - 14:2505 Jun 2018
    Tech Talks

    Based on years of researching the Dark Web, Christian Lees will provide an intriguing, illuminating “behind the curtain” look at threat actor attribution and th...

    • Language: English

  • A Day in the Life of a Breach

    Tuesday14:00 - 14:2505 Jun 2018
    Strategy Talks

    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on ...

    • Language: English

  • Workshop 4: Implementing an Effective Security Awareness Training Programme: Leaping Tall Buildings in Many, Many, Many Small Bounds

    Tuesday14:00 - 16:0005 Jun 2018
    Security Workshops

    Ever feel like you need super-human strength to build an effective security awareness training programme? This session will give clear, actionable guidance abou...

    • Language: English

  • Informer – Continuous Security Testing That Automatically Adapts to Evolving Online Environments

    Tuesday14:10 - 14:2505 Jun 2018
    Cyber Innovation Showcase

    Traditional penetration testing takes place annually and provides a snapshot of risks, but risks can be introduced to an online environment at any time. Online ...

    • Language: English

  • Cloud Security from an Orchestration Perspective: Shifting Left

    Tuesday14:15 - 14:4505 Jun 2018
    CSA Summit

    ABN AMRO began adopting Amazon Web Services two years ago. Adoption of public cloud in itself can be a challenge for heavily regulated financial institutions. B...

    • Language: English

  • Security is an Illusion: How I Rob Banks

    Tuesday14:15 - 15:0005 Jun 2018
    Geek Street

    A light-hearted trip through security failures both physical and electronic that have enabled me over the years to circumvent security of most of the world's la...

    • Language: English

  • Digital Transformation: Cure-all, Placebo or Poison Pill?

    Tuesday14:15 - 15:1505 Jun 2018
    Information Security Exchange

    Are you really ready for Digital Transformation? While the business benefits are clear, technology adoption, the escalating threat landscape and compliance to a...

    • Language: English

  • Roundtable 2: How Do I Manage Risk?

    Tuesday14:30 - 15:3005 Jun 2018
    Leaders Programme

    The cyber threat landscape has changed. Attackers are now targeting more and different types of data to extort or otherwise harm your business. Business leaders...

    • Language: English

  • Cyber Risk Management: Addressing the Challenge

    Tuesday14:35 - 14:5005 Jun 2018
    Cyber Innovation Showcase

    Over the last decade, a huge spike in fear, uncertainty and doubt around the term ‘cyber’ has caused organisations to become caught in a cycle of annual technol...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.