Conference Program

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 57 results

|

Items per page:

Sort By
  • Key Insights Derived from Correlating NetFlow with Threat Intel Feeds

    Wednesday10:15 - 10:4014 Nov 2018
    Tech Talks

    Organizations in the most lucrative industries are seeking to quickly fortify their defenses by reducing the time required to identify and remediate threats. Is...

    • Language: English

  • Lord Admiral Nelson and the Dawn of Identity

    Wednesday10:30 - 10:5514 Nov 2018
    Technology Showcase

    Admiral Nelson's innovative use of identity in his strategy at the Battle of Trafalgar provides the foundation for identity to play the key role in any security...

    • Language: English

  • How to Fight Back Against Hacker Attacks

    Wednesday10:30 - 11:4514 Nov 2018
    Keynote Stage

    Featuring live hacking demos of the threats to your organization and how to defend against them. It takes one to know one. People are the weakest link. They c...

    • Language: English

  • AI & the Integration of Physical & Cybersecurity

    Wednesday10:50 - 11:1514 Nov 2018
    Tech Talks

    Rick Grinnell, Managing Partner of Glasswing Ventures, an early-stage venture capital firm investing in AI-powered technology companies that connect consumers a...

    • Language: English

  • Supply Chain Risk Management Workshop

    Wednesday11:00 - 12:0014 Nov 2018
    Workshops

    This session will describe and demonstrate passive and active analysis. Location: C102/3You can register your interest via the online event registration form.

    • Language: English

  • Genetic Malware Analyis: The Zero-Trust Approach for Your Alert Haystack

    Wednesday11:05 - 11:3014 Nov 2018
    Technology Showcase

    Security teams are often overwhelmed by the volume of flagged incidents and unknown files that need to be investigated. Meanwhile, customers’ sensitive informa...

    • Language: English

  • The Industrialization of Red & Blue Teaming

    Wednesday11:25 - 11:5014 Nov 2018
    Tech Talks

    The industrial revolution was brought on by purpose-built machinery and automation. A similar revolution has occurred in security, leading to the industrializat...

    • Language: English

  • Securing the Workforce: Building, Maintaining & Measuring an Effective Security Awareness Program to Drive a Company-Wide Responsibility for Security

    Wednesday11:55 - 12:3514 Nov 2018
    Keynote Stage

    Determining the key features of an effective awareness program Educating the workforce to prevent social engineering attack Evaluating different strategies ...

    • Language: English

  • Quantifying Technology Risk in Dollars & Cents

    Wednesday12:00 - 12:2514 Nov 2018
    Tech Talks

    Talking to our business partners about cybersecurity and technology risk is an ongoing challenge. The cost of security and Return on Investment (ROI) are always...

    • Language: English

  • A Victims Story - Case Study

    Wednesday12:00 - 13:0014 Nov 2018
    Workshops

    This session will describe the journey of a cybersecurity professional who lost everything including a multimillion dollar company. Location: C102/3 You can r...

    • Language: English

  • Dispelling the Myth of the Cybersecurity Skills Shortage

    Wednesday12:00 - 12:2514 Nov 2018
    Tech Talks

    While people like to claim there is a cybersecurity skills shortage, it is self-inflicted due to a lack of foresight to proactively identify people with related...

    • Language: English

  • Security Challenges & Innovative Solutions for Securing a Complex World

    Wednesday12:15 - 12:4014 Nov 2018
    Technology Showcase

    Instead of isolated, company controlled networks we have a connected world of clouds and things;Boundaries of the corporate network being redefined;Surface area...

    • Language: English

Media Partners 2018

EC-Council Infosecurity Magazine Cyber Defense Magazine Cloud Security Alliance CyberTech ISC2 MassTech The Register Crest Crest infosec conferences infosec conferences infosec conferences infosec conferences infosec conferences infosec conferences infosec conferences

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.