Your Search

  • Date

    • 20 Nov 2019 - Wednesday Remove
  • Theatre

    • Track 2: Cyber threat intelligence & technologies Remove
Reset Search
 

Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 5 of 5 results

|

Items per page:

Sort By
  • Code Signing: A Security Control That Isn’t Secured

    Wednesday10:00 - 10:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Enterprises use code-signing but overlook securing the infrastructure that supports the signing process. Learn poor practices that result in operational ineffic...

    • Language: English

  • Automating Secure Development: Practical DevSecOps in a Scaled Agile Framework (SAFe) Culture

    Wednesday11:00 - 11:5020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    Advanced DevSecOps implementations facilitate agility, early fixes, open source visibility, and developer-centric tooling.  The Scaled Agile Framework (SAFe) pr...

    • Language: English

  • Cyber Terrorism: Real Threats Exist

    Wednesday13:20 - 14:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    State supported teams of “bad actors” have developed cyber threats and cyber weapons to successfully challenge the defenses of any nation’s critical infrastruct...

    • Language: English

  • Cyber-Attacks on Industrial Technology & SCADA Systems

    Wednesday14:20 - 15:1020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    A presentation on actual attacks that have happened, the basic weaknesses that can be exploited and the key controls people need to deploy to defend against cyb...

    • Language: English

  • Don't Lose Your Crypto: Scams, Hacks, & Pitfalls of Blockchain Assets

    Wednesday15:40 - 16:3020 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    In-depth analysis of: Social media scams, ICO exit scams, exchange scams and hacks, 51% attacks, Cryptomining malware, private key malware, fake wallets, DNS po...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.