Your Search

  • Streams

  • Topic Areas

    • Threats, exploits and vulnerabilities Remove
Reset Search
 

Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 6 of 6 results

|

Items per page:

Sort By
  • Machines, Icebergs, and Headlines: Machine Identities and Their Need for Protection

    Wednesday12:10 - 12:3020 Nov 2019
    Innovation Stage

    Like the visible part of an iceberg, it’s machine identities, rather than human identities, that make up the vast majority of authentication and encryption even...

    • Language: English

  • With Friends Like These, Who Needs Enemies?

    Wednesday12:15 - 13:0020 Nov 2019
    Geek Street

    As we continue to see the threat landscape evolve, with attackers learning lessons along the way, the latest threat vectors are arising where we least expect th...

    • Language: English

  • How Artificial Intelligence Used for Fraud Investigation Can Prevent Insider Threat

    Wednesday15:55 - 16:4020 Nov 2019
    Geek Street

    Based on research from Goldsmith University we shall discuss how Artificial Intelligence used for fraud investigation can be the preventative answer to reducing...

    • Language: English

  • Forensics as a Service

    Thursday09:30 - 10:1521 Nov 2019
    Geek Street

    The cloud platforms present new and unique challenges to the Security Professionals and Digital Forensics Investigators in their efforts to assist organizations...

    • Language: English

  • The Building Blocks of Risk Management: Be Visible or Stay In the Dark

    Thursday09:35 - 09:5521 Nov 2019
    Innovation Stage

    The need for risk management has grown dramatically over the past couple of decades.  Companies are embracing technology like they never have before.  Digital p...

    • Language: English

  • Vendor Risk Management: Overcoming Today’s Most Common Security & Privacy Challenges

    Thursday12:40 - 13:0021 Nov 2019
    Innovation Stage

    Managing third-party vendor risk before, during and after onboarding is a continuous effort under global privacy laws and security regulations. While outsourcin...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.