eCrime 2017 Nov. 29, 2017 to Nov. 29, 2017, stockhol,sweden

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
When Security Becomes Part of the Business Josefine Östfeldt , It Manager , Polismyndigheten Reasons why we need to be more agile Actions taken to integrate information security into ...
Is Your Security Management Solution Keeping Up? Threat Hunting - Beyond Alerts and IOCs Pablo Ridgeway Security playbook A new perspective – assumed compromise How security fails A Hunting Paradigm Primer ...
How is Artificial Intelligence changing the way we can combat threats on clients & servers? Henrik Akerstrand Get an introduction into why criminals have an easy time circumventing traditional endpoint defenses Learn ...
Threat Modelling: the Challenge in Managing Risk of Both Structural and Technical Vulnerabilities Jacob Henricson N/A
GDPR: Regulation, Myths and Encryption Marcel Derksen N/A
Password Reuse Attack: A Simple Attack Raising Some Challenging Questions Brendan Dowell How another company's misfortune (leaked customer credentials) will become your problem Why human nature makes ...
The 2017 Phishing Threat Landscape David Janson High profile leaks and mature malware tools in phishing emails and how this has led ...
The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense Suzette Loubser How new machine learning and mathematics are automating advanced cyber defense Why 100% network visibility ...
GDPR - A Business Enabler Urmas Aamisepp GDPR doesn't have to be a complete nightmare Increasing customer trust in handling their data ...
Architecting Enterprise Security to Deliver Business Value John J. Czaplewski N/A
Is an Attacker Hidden in Your Networks? Tomas Sarocky N/A
Application Security in an Agile Development World Dimitrios Stergiou Why secure application development is important Four approaches to secure application development that don't seem ...
Identity is the new Security Lars Nikamo What is the role of identity within security Where to start? Don't try to eat ...
Using AI and machine learning to close the protection deficit Staffan Truve To properly protect themselves against cyber threats, organizations must use threat intelligence The volume and ...
50 shades of nasty: past, present and future Eward Driehuis N/A
Threat Landscape Evolution & Automation Techniques Richard Cassidy N/A
Artificial Intelligence: the New Solution for IAG and the Cloud Göran Melvås How Artifical Intelligence in Identity and Access Governance and Identity and Access Management can mitigate ...
So, Do You Really Need a CISO? Urmas Aamisepp , Dimitrios Stergiou , Brian O'toole , Bjørn R. Watne N/A
Thales eSecurity- GDPR - Regulation, myths and encryption Marcel Derksen The GDPR comes into force on 25th May 2018. A lot of information is available ...
foreseeti- Threat modeling: The challenge in managing risk of both structural and technical vulnerabilities Jacob Henricson Companies today are experiencing and ever-increasing connectivity and complexity of infrastructure risk management. The underlying ...
SABSA Courses- Architecting Enterprise Security to Deliver Business Value John J. Czaplewski The modern enterprise requires enterprise security that demonstrably delivers true business value by enabling business ...
Synack- Threat Landscape Evolution & Automation Techniques Richard Cassidy In today’s cyber-criminal world, the perception of attacker capability is vastly different from the reality ...