Conference Program 2019


  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all


1 - 11 of 11 results


Items per page:

Sort By
  • Hype or Reality? Your Workplace and Blockchain, Cryptocurrency, Artificial Intelligence, Machine Learning, & the Internet of Things

    Wednesday08:30 - 09:3020 Nov 2019

    New technologies are in the news every day but is it all just hype or a true workplace reality? Are you leveraging Blockchain, Cryptocurrency, Artificial Intell...

    • Language: English

  • How to Avoid a Data Breach

    Wednesday09:35 - 09:5520 Nov 2019
    Innovation Stage

    Innovation Session This session will take a look at the general state of cybersecurity and discuss the results of Ponemon State of Cybersecurity Research result...

    • Language: English

  • How Global Expansion Affects Cybersecurity Risk

    Wednesday10:00 - 10:5020 Nov 2019
    Track 4: Security risk & compliance

    The tremendous pressure for a business to grow as fast as the market can bear can create operational hardships on a security team. Learn about how to look at th...

    • Language: English

  • Hacking to Teach Cyber Awareness in an Organization

    Wednesday10:00 - 10:5020 Nov 2019
    Track 3: Cybersecurity leadership & development

    Using hacking tools and tactics to make an impact on your organizations culture about security awareness. How real life examples and hacking use cases of cowork...

    • Language: English

  • Hacker-Powered Data: The Most Common Security Weaknesses & How to Avoid Them

    Wednesday15:40 - 16:3020 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    In this session, HackerOne’s CTO and Co-founder will present never before seen data on the most common critical vulnerabilities, based on more than 1,200 bug bo...

    • Language: English

  • How Artificial Intelligence Used for Fraud Investigation Can Prevent Insider Threat

    Wednesday15:55 - 16:4020 Nov 2019
    Geek Street

    Based on research from Goldsmith University we shall discuss how Artificial Intelligence used for fraud investigation can be the preventative answer to reducing...

    • Language: English

  • How Weakness in DNS & Email Superpowers BEC Attacks

    Thursday08:40 - 09:3021 Nov 2019
    Track 2: Cyber threat intelligence & technologies

    BEC attacks continuously impact organizations large and small, despite community efforts to investigate and impede operations. The attacks are costly and consta...

    • Language: English

  • How to Communicate Your Risk & Security Program Value to Executives

    Thursday09:35 - 09:5521 Nov 2019
    Innovation Stage

    Innovation Session Many departments struggle with building a business case to create an effective, ethics-based risk management program. Plenty of executives to...

    • Language: English

  • How to Use Your CAAT to Prevent Ghosting with One Snap

    Thursday10:00 - 10:5021 Nov 2019
    Track 5: Data analytics enhancing cybersecurity

    Work smarter, not harder. With Robotic Process Automation (RPA) on the rise in the Audit industry, learn how Ally Financial has identified opportunities to auto...

    • Language: English

  • How to Train Your Robot: Security Governance for RPA Solutions

    Thursday10:00 - 10:5021 Nov 2019
    Track 4: Security risk & compliance

    This session will address the basic concepts and benefits of Robotic Process Automation Solutions and how security governance can be effectively applied. After ...

    • Language: English

  • How to Articulate the Value of Information Security to Senior Management?

    Thursday15:40 - 16:3021 Nov 2019
    Track 3: Cybersecurity leadership & development

    One of the major challenges is presenting IS value or the return on security investment (ROSI). This session aims to provide elements allowing CISOs to design a...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.