E-Crime&CyberSecurityLondon 2018 March 6, 2018 to March 7, 2018, London, United Kingdom

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Law enforcement and industry: partnership to protect Mike Hulett The changing face of the enemy: why cyber-attacks are becoming more frequent and more sophisticatedSuccess ...
Ransomware: its past, present and future Michael Colao The fundamental truth about ransomware: the evolution of nation state tools and the need for ...
State of the Phish 2018: – What Your Peers are Doing to Reduce Successful Phishing Attacks Paul Down Aggregation and analysis of data from tens of millions of simulated phishing attacks sent through ...
Security as a Service (SECaaS): Cybersecurity in the Cloud Age Stuart Reed Mobile, IoT, and Cloud-based workloads are increasing leading to complex digital environments that need securing.Stretched ...
Turning End User Security Into a Game You Can Win Paul Down N/A
Predict where cyber attackers will strike next Jeff Lenton N/A
Strategies for securing three classes of IoT William J. Malik N/A
Please delete my previous email Kelly Mccann , Sudeep Venkatesh N/A
How to Protect Your Business against Credential Stuffing Attacks Daniel Söderberg , Thom Thavenius N/A
Threat modelling: the challenge in managing risk of both structural and technical vulnerabilities Jacob Henricson N/A
Building an Effective Threat Intelligence Program Niall Macleod N/A
Your third parties may be placing bets you're not willing to make! Simon Wilkes N/A
The Growing Cost of Behaviour enabled Cyber crime Paula Kershaw Learn from one of the largest global financial institutions who should take responsibility for cybersecurity ...
A New Era of Cyber Threats: The Shift to Self Learning, Self Defending Networks Sam Martin Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threatsHow new immune system ...
Overcome on-premise restrictions, seamlessly and consistently securing your cloud workloads when migrating to hybrid IT Anna Russell Focus on how businesses are consistently looking to migrate to hybrid IT architectures to respond ...
Zero Trust Security - Never Trust, Always Verify Barry Scott Organizations spent a combined $170 billion on cybersecurity in 2016 and 2017 . During the ...
The future impact of AI in cybercrime Sam Martin N/A
How to combat email attacks & identity fraud Jonathan Morgan N/A
Battlefield Earth 2018: It used to be security was a network thing Charl van der Walt N/A
Exploits in the cryptocurrency craze: what you must know to protect your organisation Helge Husemann N/A
Oversharing and the cloud generation. What will data protection look like in the future? Nils Krumrey N/A
Failing to Plan is Planning to Fail: A perspective on cyber security training Tony Rowan N/A
Analysis of Cobalt attacks on Financial Institutions: SWIFT, Processing, ATMs Dmitry Volkov N/A
Cybersecurity: the investor’s priority Henk Grootveld Truths from one of the larget global investors and asset managersCybersecurity as a risk indicator ...
A New Era of Cybersecurity Laurentiu Popescu Evolution of the security threats landscapeSecurity counter defense to elusive attacksA shift in paradigm: the ...
Cybersecurity in 2018: The impact of compliance regulation, threat intelligence and machine learning Sam Hampton-smith What caught the headlines in 2017 - and what we can learn from themHow AI ...
Disrupt the attack kill chain Liam Puleo N/A
What does the marriage of machine learning and cybersecurity look like in 2018? Sam Hampton-smith N/A
Zero Trust Security in Practice Barry Scott , Kev Smith N/A
Hacking exposed: Stories from the battlefield: lessons learnt in responding to the most advanced cyber-attacks Zeki Turedi N/A
Executive Panel Discussion: There's no such thing as cyber-risk...or is there? Laurentiu Popescu , David Doherty , Imran Sheiakh , Helen Rabe Cybersecurity is now a recognised business issue. Good news, right? Or is it? In this ...
Lions and Sheep on the Darkweb Etienne Greeff Things that go bump in the night, what we fear, what we should fear, and ...
Cybersecurity - winning the great game Simon Jenner CISO's are now major players in the 'great game': how do you avoid the common ...
The Cyber-attacked Hack Back Michael Stawasz Hack Back - the new idea everyone's talking about to secure your business. But is ...
The State of Cyber: How Stealthier Attacks are blurring the lines between Cybercrime and Statecraft Michael Sentonas This session will shed light on alarming new trends CrowdStrike has observed in the global ...
5 Ways to Strengthen Your Phishing Defence Programme for 2018 David Janson Learn the best ways to introduce and communicate a programme, based on results of over ...
Taking the UD out of FUD: Battling the Fear, Uncertainty and Doubt in Cybersecurity Emma Leith Case study of a success story from one of the largest FTSE 100 multinationalsThe success ...
2018 Phishing Trends: New year. New threats. Same dark intentions Mollie Holleman N/A
What were the causes behind the biggest data breaches in 2017? Abhirukt Sapru N/A
Exploring Preferential Risk Strategies for Cybersecurity Investments Mischa Danaceau N/A
How to manage cyber risk on a daily basis for your company and the affiliates, your suppliers and peers Philip East , Ben Dickinson N/A
With cloud, BYOD and remote working – How do you control your data? Nigel Hawthorn N/A
Zero Trust Access: Five Steps to Securing the Perimeter-less Enterprise Michael Moshiri N/A
Paranoid and Prudent: Questions and answers from your investors on cybersecurity risk David Sneyd How does the cybersecurity of a company affect its investment value?What are investors looking for ...
Managing Unquantifiable Risk Simon Wiseman Appreciate that Malware detection leaves you with unquantifiable risk because it isn’t fully effectiveUnderstand why ...
True Cybercriminals are only after your data – Why are we not defending against it? Morgan Jay Cybercriminals ONLY Monetise on DataThe threats are not just from the outsideDataBase and Applications are ...
Attackers are better at evasion than we are at detection … how do we break this cycle? Nathan Gilks N/A
Alert and Data Overload! Using Analytics and Machine Learning to Simplify Security in Data Protection Peter Lee N/A
How to Protect Your Business against Credential Stuffing Attacks, Eyeonid Group Daniel Thavenius N/A
Executive Panel Discussion: Let's not get cryptic about Crypto Marcella Atzori , Nic Miller , Anthony Eskander In this high-level, informal panel discussion, we will be uncovering the truths behind cryptocurrency, blockchain ...
Misaddressed emails were the biggest form of data loss in 2017 Henry Trevelyan Thomas The risk that data loss poses to enterprisesThe important role that reporting plays in understanding ...
Isolation - Your Next Best Friend Brett Raybould Spear-phishing is a top 3 security risk but detection & training do not stop successful ...
Blockchain governance for highly sensitive data: mitigating risks and e-crimes Marcella Atzori Marcella Atzori, Blockchain Advisor & GovTech Expert, will be sharing exclusive insights on blockchain technology, ...
Executive Panel Discussion: Laying down the (cyber) - law Scott Mellis , Nigel Brown , Kevin Davis , Gary Miles Industry and Law enforcement need collaboration and compromise. We have brought together leaders in law ...
Kenna Security- Predict Where Cyber-Attackers Will Strike Next Jeff Lenton The latest exploit prediction capabilities are taking cyber threat forecasting to a new level of ...
Trend Micro- Strategies for Securing the Three Classes of IOT William J. Malik What attendees will learn:Plotting the evolution of OT (Operational Technology) and ICS (Industrial Control Systems) ...
Eyeonid Group – How to Protect Your Business against Credential Stuffing Attacks Daniel Söderberg , Thom Thavenius Massive data breaches continue to make the news on a seemingly daily basis. But after ...
foreseeti AB- Threat modeling: The challenge in managing risk of both structural and technical vulnerabilities Jacob Henricson Companies today are experiencing and ever-increasing connectivity and complexity of infrastructure risk management. The underlying ...
SAI Global- Your third-parties may be placing bets you're not willing to make! Simon Wilkes With GDPR impacting global companies which hold data on European Union (EU) citizens, businesses are ...
Wombat Security Technologies- Turning End User Security Into a Game You Can Win Paul Down Gamification, as a concept, is nothing new. We’ll provide ideas for “friendly competition” which can ...
Anomali- Building an Effective Threat Intelligence Program Niall Macleod This seminar will cover what goes into a good threat intelligence program: where do I ...
Egress Software Technologies- Please delete my previous email Kelly Mccann , Sudeep Venkatesh Whether or not we’ll admit to having sent an Outlook recall or similar message, most ...
Darktrace- The future impact of AI in cybercrime Sam Martin What attendees will learn:How AI has a profound impact on our future internet, and the ...
Agari- How to Combat Email Attacks & Identity Fraud Jonathan Morgan Email is the primary infiltration mechanism for the majority of cyber-attacks. To effectively combat these ...
SecureData- Battlefield Earth 2018: It used to be security was a network thing Charl van der Walt Firewalls, proxies, IDS/IPS, VPNs, Network Vulnerability Scanners. THOSE were the tools of any pureblood security ...
Malwarebytes- Exploits in the Cryptocurrency Craze: What You Must Know to Protect Your Organization Helge Husemann As long as cybercriminals can make a profit, businesses and their data will always be ...
TITUS- Oversharing and the cloud generation. What will data protection look like in the future? Nils Krumrey When speed and availability are valued over data security, what impact does that have on ...
Cyberbit- Failing to Plan is Planning to Fail: A perspective on cyber security training Tony Rowan In a world where the defender is often at a technical disadvantage and the personnel ...
Group IB- Analysis of Cobalt attacks on Financial Institutions: SWIFT, Processing, ATMs Dmitry Volkov What attendees will learn:Evolution of Cobalt group TTPs – strategic & technical analysisWhat systems Cobalt ...
Bitdefender- Disrupt the Attack Kill Chain Liam Puleo Using a layered approach to reduce the overall Attack Surface is standard practise but how ...
ZoneFox- What does the marriage of machine learning & cybersecurity look like in 2018? Sam Hampton-smith Cybersecurity trends come and go, but Machine Learning looks to be here to stay. Analysts ...
Centrify- Zero Trust Security in Practice Barry Scott Practical examples of how your organization can begin to adopt Zero Trust Security.What attendees will ...
CrowdStrike- Hacking Exposed: Stories from the battlefield: lessons learnt in responding to the most advanced cyber attacks Zeki Turedi CrowdStrike continues to expose unprecedented efforts by highly sophisticated adversaries targeting -- and in some ...
Cofense- 2018 Phishing Trends: New year. New threats. Same dark intentions Mollie Holleman Join Cofense for a look back at 2017’s threats and a look ahead. We’ll provide ...
Tessian- What were the causes behind the biggest data breaches in 2017? Abhirukt Sapru What attendees will learn:Rules-Based Vs Machine Intelligence - The big shift in technology Misaddresed emails ...
InteliSecure- Exploring Preferential Risk Strategies for Cybersecurity Investments Mischa Danaceau Join InteliSecure Chief Information Security Officer, Mischa Danaceau for a hands-on workshop to explore the ...
BitSight Technologies- How to manage cyber risk on a daily basis for your company and the affiliates, your suppliers and peers (Live view in the BitSight Portal) Philip East Participants will see a live view into the BitSight Portal. We will demonstrate how continuous ...
Skyhigh Networks / McAfee- With Cloud, BYOD and remote working – How do you control your data? Nigel Hawthorn Computing is being hit by more changes today than ever before. Mobility, Cloud and BYOD ...
Duo Security- Zero Trust Access: Five Steps to Securing the Perimeter-less Enterprise Michael Moshiri The perimeter-based security approach of the last century is no longer adequate for securing the ...
Deep Secure- Attackers are better at evasion than we are at detection … how do we break this cycle ? Nathan Gilks Join Deep Secure’s Solutions Director, Nathan Gilks in a session on why detecting cyber threats ...
Imperva- Alert and Data Overload! Using Analytics and Machine Learning to Simplify Security in Data Protection Peter Lee Every day a new story about data loss is in the news. The primary security ...