Conference Program

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 18 results

|

Items per page:

Sort By
  • Lord Admiral Nelson and the Dawn of Identity

    Wednesday10:30 - 10:5514 Nov 2018
    Technology Showcase

    Admiral Nelson's innovative use of identity in his strategy at the Battle of Trafalgar provides the foundation for identity to play the key role in any security...

    • Language: English

  • Genetic Malware Analyis: The Zero-Trust Approach for Your Alert Haystack

    Wednesday11:05 - 11:3014 Nov 2018
    Technology Showcase

    Security teams are often overwhelmed by the volume of flagged incidents and unknown files that need to be investigated. Meanwhile, customers’ sensitive informa...

    • Language: English

  • Next-Gen Approach to Security Monitoring with Machine Learning on Hadoop

    Wednesday11:40 - 12:0514 Nov 2018
    Technology Showcase

    We live in a digital world where the volume, variety, and velocity of data continue to grow exponentially. Collecting and analyzing this data for actionable thr...

    • Language: English

  • Security Challenges & Innovative Solutions for Securing a Complex World

    Wednesday12:15 - 12:4014 Nov 2018
    Technology Showcase

    Instead of isolated, company controlled networks we have a connected world of clouds and things;Boundaries of the corporate network being redefined;Surface area...

    • Language: English

  • The Human Firewall is on Fire: What do you do When the Smoke Clears?

    Wednesday12:50 - 13:1514 Nov 2018
    Technology Showcase

    Many enterprises are focused on prevention and are too busy with day-to-day firefights to look beyond the flames and think about how to recover. Beyond preventi...

    • Language: English

  • The Importance of Threat Intelligence Management

    Wednesday13:25 - 13:5014 Nov 2018
    Technology Showcase

    The Importance of threat intelligence management will help attendees understand what it means to fully manage threat intelligence. The session will include how ...

    • Language: English

  • Protecting Sensitive Information From Insider & Outsider Threats

    Wednesday14:00 - 14:2514 Nov 2018
    Technology Showcase

    Would you know if an attacker breached your infrastructure and sent out sensitive data? Would you know if a trusted insider (BAAs, sales representatives or othe...

    • Language: English

  • New Regulations on the Block: Mitigating Today’s Complex Global Privacy Landscape

    Wednesday14:35 - 15:0014 Nov 2018
    Technology Showcase

    The EU’s General Data Protection Regulation (GDPR) changed the way people and businesses think about privacy with its extraterritorial scope and high fines. Sin...

    • Language: English

  • Is DNS Part of Your Security Strategy?

    Wednesday15:10 - 15:3514 Nov 2018
    Technology Showcase

    DNS is everywhere. It has a front row seat to most malware activity and is increasingly abused as an attack vector by adversaries. DNS platforms are also a gold...

    • Language: English

  • The Secure Internet Gateway: Security Reimagined in the Cloud

    Wednesday15:45 - 16:1014 Nov 2018
    Technology Showcase

    As your applications and data move to the cloud, you need to ensure your security stack extends there, too. Attend this session to learn how Cisco is challengin...

    • Language: English

  • Cyber Attacks Are Real: Protect Your Endpoints

    Wednesday16:20 - 16:4514 Nov 2018
    Technology Showcase

    Endpoint updates are more complex and challenging with the proliferation of devices. Each device increases the number of threats from malware and viruses. Consi...

    • Language: English

  • Empower Your Workforce: Securing Social & Digital Platforms

    Thursday10:30 - 10:5515 Nov 2018
    Technology Showcase

    Every high profile cyber attack has a direct impact on an organization’s brand and reputation, in addition to other collateral damage. Attacks via social and di...

    • Language: English

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.