EuroCAS 2014 Sept. 29, 2014 to Sept. 1, 2014, barcelona,spain
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
111 Small Data is Big Enough—Leveraging SIM | Sandeep Godbole | After completing this session, you will be able to: • Understand Basics of SIM Technology ... | |
121 How to Adapt to the “Internet of Things” | Ole Svenningsen | After completing this session, you will be able to: • Understand how the “Internet of ... | |
131 Database Technologies for Real-Time Analytics | Thomas Baumann | After completing this session, you will be able to: • Identify additional threats and vulnerabilities ... | |
141 Assurance for Banking Application Development | Cem Ergül | After completing this session, you will be able to: • List and understand the critical ... | |
221 What We Missed at the Data Centre Audit | Robert Findlay | After completing this session, you will be able to: • Know the real risks and ... | |
231 IA in the Cloud: Eat the Elephant Bite by Bite | Robert Cachia | After completing this session, you will be able to: Recognise that initiatives may have several ... | |
241 Assurance of Cloud Providers or Is It... | Jacqueline Johnson | After completing this session, you will be able to: • Be aware of what assurance ... | |
311 Big Data Assurance | Kaya Kazmirci | After completing this session, you will be able to: • Comprehend the distinctions between “Big” ... | |
112 Robust Business Security with ISO27001:2013 & COBIT 5 | Vernon Poole | After completing this session, you will be able to: • Comprehend how business security—IS must ... | |
122 Cyberintelligence from Open Web Sources | Tim Sattler | After completing this session, you will be able to: • Explain why open-source cyberintelligence should ... | |
132 Industrial Cybersecurity | Samuel Linares | After completing this session, you will be able to: • Identify and define the concepts ... | |
222 Cybersecurity for Important SMEs | Bruno Soares | After completing this session, you will be able to: • Recognise that SME’s work toward ... | |
232 Infosec Management for the Generation Z-ers | Biljana Cerin | After completing this session, you will be able to: • Understand how to address the ... | |
242 Web Application Hacking in Action | Cian Scott , Shane Ryan | After completing this session, you will be able to: • Understand Web Application Security Risks ... | |
312 SIEM—Making the White Elephant Dance | Vinayak Ram | After completing this session, you will be able to: • Understand and develop the broader ... | |
113 Responding to Cyberattacks | Rolf von Roessing | After completing this session, you will be able to: • Understand what the cybersecurity threat ... | |
123 EU CyberData | Christos Dimitriadis | Please check the program tab of the Euro CACS website where session updates will be ... | |
133 CyberAttacks: Prepared? | John Tannahill | After completing this session, you will be able to: • Understand how cyberattacks are being ... | |
213 Why Don’t People do as They’re Told? | Wendy Goucher | After completing this session, you will be able to: • Comprehend more about basic motivation ... | |
223 Fighting Cybercrime in the Real World | Kim Sørensen | After completing this session, you will be able to: • Recognise and avoid certain types ... | |
233 Battling Cyberattacks with ISO 2700x | Luc Pelfini | After completing this session, you will be able to: • Explain the differences/equality of information ... | |
313 Labeling Security of ICT Services | Antonio ramos Garcia | After completing this session, you will be able to: • Use a labeling system to ... | |
114 Big Data and Advanced Data Visualization | Rosemary Amato | After completing this session, you will be able to: • Understand how Big Data can ... | |
124 Make your Risk Management Process Lean | Jakub Bryl | After completing this session, you will be able to: • Apply the basic principles of ... | |
134 Redefine Risk Analysis in the Internet of Things | Alessandro Festa | After completing this session, you will be able to: • Learn how to use Information ... | |
144 ICT Risks: Evaluation & Management Case Study | Nenad Jelovac | After completing this session, you will be able to: • Understand the pitfalls of relying ... | |
214 SAP HANA Security—Stay in control | Jan Stölting | After completing this session, you will be able to: • Understand the new scenarios available ... | |
224 Beyond IT: Third Party Risk | Richard Hollis | Please check the program tab of the Euro CACS website where session updates will be ... | |
234 Turning a Risk into an Opportunity | Christopher Sullivan | After completing this session, you will be able to: • Develop a structured approach for ... | |
244 Implement COBIT 5 @ Belgian Ministry of Finance | Johan Van Grieken , Thomas Clijsner , Frank Baelus | After completing this session, you will be able to: • Plan and execute a COBIT ... | |
115 ENISA Cybersecurity Framework | Lionel Dupre | Please check the program tab of the EuroCACS/ISRM website where session updates will be made ... | |
125 The EU Data Protection Package “Odyssey” | Yves le Roux | After completing this session, you will be able to: • Understand the legislative path of ... | |
135 Security Metrics | Lisa Young | After completing this session, you will be able to: • Determine which measures are most ... | |
145 GRC Tool Implementation | Raef Meeuwisse | After completing this session, you will be able to: • Understand where GRC activity overlaps ... | |
225 EU Privacy: Past, Present and Future | Rita Di Antonio , Nicola Mckilligan | After completing this session, you will be able to: • Understand the status quo of ... | |
235 Government Cloud Adoption | Thomas Mcandrew | After completing this session, you will be able to: • Explain the difference between compliance ... | |
245 Surrendering our Privacy to Mobility | Andreas Athanasoulias | After completing this session, you will be able to: • Understand the changing environment of ... |