Your Search

  • Streams

  • Type of Content

Reset Search
 

Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 5 of 5 results

|

Items per page:

Sort By
  • Machines, Icebergs, and Headlines: Machine Identities and Their Need for Protection

    Wednesday12:10 - 12:3020 Nov 2019
    Innovation Stage

    Like the visible part of an iceberg, it’s machine identities, rather than human identities, that make up the vast majority of authentication and encryption even...

    • Language: English

  • With Friends Like These, Who Needs Enemies?

    Wednesday12:15 - 13:0020 Nov 2019
    Geek Street

    As we continue to see the threat landscape evolve, with attackers learning lessons along the way, the latest threat vectors are arising where we least expect th...

    • Language: English

  • Employees are Taking Data When They Quit

    Wednesday12:40 - 13:0020 Nov 2019
    Innovation Stage

    Recent studies report that 90% of insider data loss, leak and theft goes undetected internally. Even worse, 60% of departing employees admit to taking data when...

    • Language: English

  • University and Education Partnerships

    Wednesday15:15 - 15:3520 Nov 2019
    Innovation Stage

    In this session, we will discuss the role of universities to support industry by providing flexible outcome focused curriculum designed to overcome the cybersec...

    • Language: English

  • The Building Blocks of Risk Management: Be Visible or Stay In the Dark

    Thursday09:35 - 09:5521 Nov 2019
    Innovation Stage

    The need for risk management has grown dramatically over the past couple of decades.  Companies are embracing technology like they never have before.  Digital p...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.