Skip to main content
1 - 10 of 10 results
Items per page:
IoT devices are available for every corner of our homes and workplaces. Numerous articles, studies, and exploits have been published on the security (or lack of...
Innovation Session Many departments struggle with building a business case to create an effective, ethics-based risk management program. Plenty of executives to...
Compliance, best practices, and regulation all drive a security program. These programs pass audit and compliance checks, have robust patch management, and cond...
The explosion of APIs is creating incremental security risks that must be addressed, considering that over half of the internet traffic is bot or API based. Aft...
The advent of the cloud has intensified the threat landscape requiring security professionals to not just explain, but to prove their organizations’ level of co...
While a great deal of emphasis is given on securing different components of a device ecosystem, one often misses that the time of an attack, and the time of thr...
Innovation Session Managing third-party vendor risk before, during and after onboarding is a continuous effort under global privacy laws and security regulation...
Please bring a laptop with you to this session The Cybersecurity Nexus Cyber Hunt is a live competition which pits participants against each other in a race aga...
Manage up your cybersecurity resilience, readiness and board confidence with the world’s first cyber capability maturity management platform, which provides a h...
The session provides the attendees an in-depth understanding of common attacks on blockchain components, the underlying mechanisms and techniques, how to assess...
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.