Your Search

  • Streams

  • Topic Areas

    • Threats, exploits and vulnerabilities Remove
Reset Search
 

Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 8 of 8 results

|

Items per page:

Sort By
  • Identities, Icebergs, and Headlines

    Wednesday12:10 - 12:3020 Nov 2019
    Innovation Stage

    Innovation Session Like the visible part of an iceberg, it’s machine identities, rather than human identities, that make up the vast majority of authentication...

    • Language: English

  • With Friends Like These, Who Needs Enemies?

    Wednesday12:15 - 13:0020 Nov 2019
    Geek Street

    As we continue to see the threat landscape evolve, with attackers learning lessons along the way, the latest threat vectors are arising where we least expect th...

    • Language: English

  • See Every Asset. Secure What Matters.

    Wednesday14:45 - 15:0520 Nov 2019
    Innovation Stage

    When it comes to reducing cyber exposure, an effective vulnerability management approach can help eliminate blind spots that are often the root of security issu...

    • Language: English

  • How Artificial Intelligence Used for Fraud Investigation Can Prevent Insider Threat

    Wednesday15:55 - 16:4020 Nov 2019
    Geek Street

    Based on research from Goldsmith University we shall discuss how Artificial Intelligence used for fraud investigation can be the preventative answer to reducing...

    • Language: English

  • How to Communicate Your Risk & Security Program Value to Executives

    Thursday09:35 - 09:5521 Nov 2019
    Innovation Stage

    Innovation Session Many departments struggle with building a business case to create an effective, ethics-based risk management program. Plenty of executives to...

    • Language: English

  • Overcoming Today’s Most Pressing Third-Party Risk Management Challenges

    Thursday12:40 - 13:0021 Nov 2019
    Innovation Stage

    Innovation Session Managing third-party vendor risk before, during and after onboarding is a continuous effort under global privacy laws and security regulation...

    • Language: English

  • Cyber Hunt

    Thursday13:10 - 13:5521 Nov 2019
    Geek Street

    Please bring a laptop with you to this session The Cybersecurity Nexus Cyber Hunt is a live competition which pits participants against each other in a race aga...

    • Language: English

  • Cyber Hunt

    Thursday14:05 - 14:5021 Nov 2019
    Geek Street

    Please bring a laptop with you to this session The Cybersecurity Nexus Cyber Hunt is a live competition which pits participants against each other in a race aga...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.