EuroCAS 2014 Sept. 29, 2014 to Sept. 1, 2014, barcelona,spain

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
111 Small Data is Big Enough—Leveraging SIM Sandeep Godbole After completing this session, you will be able to: • Understand Basics of SIM Technology ...
121 How to Adapt to the “Internet of Things” Ole Svenningsen After completing this session, you will be able to: • Understand how the “Internet of ...
131 Database Technologies for Real-Time Analytics Thomas Baumann After completing this session, you will be able to: • Identify additional threats and vulnerabilities ...
141 Assurance for Banking Application Development Cem Ergül After completing this session, you will be able to: • List and understand the critical ...
221 What We Missed at the Data Centre Audit Robert Findlay After completing this session, you will be able to: • Know the real risks and ...
231 IA in the Cloud: Eat the Elephant Bite by Bite Robert Cachia After completing this session, you will be able to: Recognise that initiatives may have several ...
241 Assurance of Cloud Providers or Is It... Jacqueline Johnson After completing this session, you will be able to: • Be aware of what assurance ...
311 Big Data Assurance Kaya Kazmirci After completing this session, you will be able to: • Comprehend the distinctions between “Big” ...
112 Robust Business Security with ISO27001:2013 & COBIT 5 Vernon Poole After completing this session, you will be able to: • Comprehend how business security—IS must ...
122 Cyberintelligence from Open Web Sources Tim Sattler After completing this session, you will be able to: • Explain why open-source cyberintelligence should ...
132 Industrial Cybersecurity Samuel Linares After completing this session, you will be able to: • Identify and define the concepts ...
222 Cybersecurity for Important SMEs Bruno Soares After completing this session, you will be able to: • Recognise that SME’s work toward ...
232 Infosec Management for the Generation Z-ers Biljana Cerin After completing this session, you will be able to: • Understand how to address the ...
242 Web Application Hacking in Action Cian Scott , Shane Ryan After completing this session, you will be able to: • Understand Web Application Security Risks ...
312 SIEM—Making the White Elephant Dance Vinayak Ram After completing this session, you will be able to: • Understand and develop the broader ...
113 Responding to Cyberattacks Rolf von Roessing After completing this session, you will be able to: • Understand what the cybersecurity threat ...
123 EU CyberData Christos Dimitriadis Please check the program tab of the Euro CACS website where session updates will be ...
133 CyberAttacks: Prepared? John Tannahill After completing this session, you will be able to: • Understand how cyberattacks are being ...
213 Why Don’t People do as They’re Told? Wendy Goucher After completing this session, you will be able to: • Comprehend more about basic motivation ...
223 Fighting Cybercrime in the Real World Kim Sørensen After completing this session, you will be able to: • Recognise and avoid certain types ...
233 Battling Cyberattacks with ISO 2700x Luc Pelfini After completing this session, you will be able to: • Explain the differences/equality of information ...
313 Labeling Security of ICT Services Antonio ramos Garcia After completing this session, you will be able to: • Use a labeling system to ...
114 Big Data and Advanced Data Visualization Rosemary Amato After completing this session, you will be able to: • Understand how Big Data can ...
124 Make your Risk Management Process Lean Jakub Bryl After completing this session, you will be able to: • Apply the basic principles of ...
134 Redefine Risk Analysis in the Internet of Things Alessandro Festa After completing this session, you will be able to: • Learn how to use Information ...
144 ICT Risks: Evaluation & Management Case Study Nenad Jelovac After completing this session, you will be able to: • Understand the pitfalls of relying ...
214 SAP HANA Security—Stay in control Jan Stölting After completing this session, you will be able to: • Understand the new scenarios available ...
224 Beyond IT: Third Party Risk Richard Hollis Please check the program tab of the Euro CACS website where session updates will be ...
234 Turning a Risk into an Opportunity Christopher Sullivan After completing this session, you will be able to: • Develop a structured approach for ...
244 Implement COBIT 5 @ Belgian Ministry of Finance Johan Van Grieken , Thomas Clijsner , Frank Baelus After completing this session, you will be able to: • Plan and execute a COBIT ...
115 ENISA Cybersecurity Framework Lionel Dupre Please check the program tab of the EuroCACS/ISRM website where session updates will be made ...
125 The EU Data Protection Package “Odyssey” Yves le Roux After completing this session, you will be able to: • Understand the legislative path of ...
135 Security Metrics Lisa Young After completing this session, you will be able to: • Determine which measures are most ...
145 GRC Tool Implementation Raef Meeuwisse After completing this session, you will be able to: • Understand where GRC activity overlaps ...
225 EU Privacy: Past, Present and Future Rita Di Antonio , Nicola Mckilligan After completing this session, you will be able to: • Understand the status quo of ...
235 Government Cloud Adoption Thomas Mcandrew After completing this session, you will be able to: • Explain the difference between compliance ...
245 Surrendering our Privacy to Mobility Andreas Athanasoulias After completing this session, you will be able to: • Understand the changing environment of ...