SCcongress 2015 March 3, 2015 to March 3, 2015, London,UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Dissecting APT's John A. Colley , Becky Pinkard , David Prince Everyone is a target now – identifying advanced intruders and their methods – and reacting ...
Keynote: Can I trust cloud security? Thom Langford , Matthew Tyler , Nick Ioannou How to benefit from the cloud securely. What to outsource, when to do it, and ...
Network Defences will be Breached – Defence in Depth Steven Ringelberg Malicious insiders are in your network, and malicious outsiders will breach your network defences. Can ...
Can Cloud Providers Guarantee Data Privacy? Andrew Bartlam While global cloud adoption continues to accelerate, organisations in many regions have been hesitant to ...
Data Classification: A Practical Approach Danny Maher Danny Maher of Boldon James’ Elite Partner, HANDD Business Solutions, takes a practical look at ...
Internet of Things demo Ken Munro Why attack - or defend - a fridge?
Big Data is a threat to privacy Jeremy King , Andrew Rose , Bob Tarzey , Carolyn Williams , Emma Carr Discussion: How to secure data while meeting compliance, privacy regulations and expectations. Are new EU ...
6 Things to Consider with and Identity-as-a-Service (IDaaS) Solution Ian Berry The number and variety of apps that are being adopted by organisations – from on ...
Innovate and Integrate – Modernising API Security Jason Macy Today, organisations are challenged with the increasingly difficult task of improving interoperability and expanding accessibility ...
Data protection – own your asset before your adversary Neil Thacker With cyber threat now a top concern for most CEOs, this session will focus on ...
Is your BYOD policy working? John Mark Walker , Mark Brown , Bryan Littlefair , Sarb Sembhi Staff have their own devices. Do they connect to your network? Are you in control ...
How to Think About Security: Cyber Attack or Inside Job? Charles Milton The biggest threat to an organisation's cyber security isn't malware, phishing scams or even hackers ...
From "fences" to "bodyguards"- How data-centric security works Rui Melo Biscaia Today’s info protection environment is evolving rapidly, with paradigm shifts including BYOD devices, cloud environments, ...
Endpoint Security for the Modern Enterprise Andy Hardy Endpoint protection. Secure file sync and share. Both are massive opportunities for today’s enterprise thanks ...