Conference Program 2019

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 18 results

|

Items per page:

Sort By
  • Practical Approach to Application Security Assessment

    Wednesday09:30 - 10:1520 Nov 2019
    Geek Street

    Cross Site Scripting (XSS) has always been one of the Top 10 application vulnerabilities according to OWASP. This is a security vulnerability in web application...

    • Language: English

  • How to Avoid a Data Breach

    Wednesday09:35 - 09:5520 Nov 2019
    Innovation Stage

    Innovation Session This session will take a look at the general state of cybersecurity and discuss the results of Ponemon State of Cybersecurity Research result...

    • Language: English

  • Planning Complex Cyber Audits. The Case of Galileo Ground Segment (1,500 MEuros)

    Wednesday10:25 - 11:1020 Nov 2019
    Geek Street

    The Galileo program represents the biggest program in Europe related to the Navigation Systems. The session will highlight the main challenges to plan cyber-aud...

    • Language: English

  • Do You Know If Your IT Infrastructure Is Secure? Explore How to Answer This Question & Hear True Tales from the Cybersecurity Trenches

    Wednesday11:00 - 11:2020 Nov 2019
    Innovation Stage

    Technology Showcase Session

    • Language: English

  • Systemic Flaws in the Internet of Things

    Wednesday11:20 - 12:0520 Nov 2019
    Geek Street

    Using live demonstrations, we'll show how systemic issues can lead to IoT devices being hacked and exploited, and examine why authorities still fail to deal wit...

    • Language: English

  • Magecart & Beyond. Massive Client-Side Website Vulnerability

    Wednesday11:25 - 11:4520 Nov 2019
    Innovation Stage

    Technology Showcase Session This session will discuss how modern website architecture has presented an expansive and lucrative attack surface for hackers. Inci...

    • Language: English

  • Identities, Icebergs, and Headlines

    Wednesday12:10 - 12:3020 Nov 2019
    Innovation Stage

    Innovation Session Like the visible part of an iceberg, it’s machine identities, rather than human identities, that make up the vast majority of authentication...

    • Language: English

  • With Friends Like These, Who Needs Enemies?

    Wednesday12:15 - 13:0020 Nov 2019
    Geek Street

    As we continue to see the threat landscape evolve, with attackers learning lessons along the way, the latest threat vectors are arising where we least expect th...

    • Language: English

  • Employees are Taking Data When They Quit

    Wednesday12:40 - 13:0020 Nov 2019
    Innovation Stage

    Innovation Session Recent studies report that 90% of insider data loss, leak and theft goes undetected internally. Even worse, 60% of departing employees admit...

    • Language: English

  • Using Chaos Engineering for Resilient Cloud Infrastructure Security

    Wednesday13:10 - 13:5520 Nov 2019
    Geek Street

    Chaos engineering can be used to test the resiliency of cloud security and compliance. This session will include a primer on cloud security chaos engineering, a...

    • Language: English

  • Inserting Code Analysis into CI w/o Slowing Builds Down

    Wednesday13:25 - 13:4520 Nov 2019
    Innovation Stage

    This session will cover a demonstration of static application security testing (SAST) can be inserted into CI tools to analysis each build w/o out slowing down ...

    • Language: English

  • The Road to Continuous IT Controls: Bringing a DevOps Discipline to the IT Audit Ecosystem

    Wednesday13:50 - 14:1020 Nov 2019
    Innovation Stage

    Technology Showcase The error-prone, manual nature of SOC and other IT security audits can kill business velocity and team morale for at least 2-3 months every...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.