SCcongress 2017 Feb. 23, 2017 to Feb. 23, 2017, london,uk

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Turning cyber-awareness into good defensive practice N/a For our opening keynote, a senior level cyber-security professional from the NCSC will address the ...
The law is of no use in cyber-space Troels Oerting , Melissa E. Hathaway , Renate Samson , Ed Tucker Cyber-criminals are getting away with millions, across borders, using the latest technologies, while law enforcement ...
Why businesses should care about cyber-warfare Gianluca Stringhini , Ewan Lawson , Liina Areng , Vince Warrington In the future, companies can expect to be impacted by cyber-warfare just as they are ...
Varonis Matt Lock For many organisations ransomware is a canary in the coalmine. It can be a leading ...
Centrify - Stepwise Security – A Planned Path to Reducing Risk Barry Scott Attackers are making major headway into our businesses with simple tactics that exploit our weakest ...
Distil Networks - Know Your Automated Threat Abbas Rehemtulla , Tudor James N/A
High-Tech Bridge | Role of insecure web applications in modern cyber-crime Chris Neely Gartner’s Hype Cycle for Application Security 2016 states that applications, not infrastructure, represent the main ...
Cloud security, compliance and data protection - Skyhigh Networks Charlie Howe The average UK organisation is using 1,000 different cloud services, some approved (such as Office ...
Part 1 - Ignoring it won't make it go away. What you need to do now to prepare for EU GDPR. Mac Macmillan , Jenny Radcliffe Companies in the UK have come around to the idea that Brexit will not alleviate ...
Ransomware - how do we protect ourselves? Bob Tarzey , Sarb Sembhi , Beverley Allen Beyond backups, how can we avoid getting our data locked down? And, if it does ...
DDoS protection in the age of IOT attacks Adam Peckman , Tiago Rosado 1.1 TB in Oct. 2016, and continuing to grow, via armies of cctv cameras and ...
Positive Technologies Roy Duckles Today’s enterprise environment is increasingly software hungry. Business units across the board are demanding an ...
EU GDPR compliance - Zonefox Jamie Graves EU GDPR compliance - what you need to know, the technology you need to have ...
Enabling Trust, Security, and Resiliency through Micro-Segmentation - Unisys Salvatore Sinno The historical approach to network security was one built on strong perimeter defenses and a ...
Extending transport safety models into the cyber-sphere Kevin Jones , Cevn Vibert , David Higgins , Margrete Raaum From Stuxnet to Ukraine's power stations, we now know our critical infrastructure is either under ...