SCcongress 2016 Feb. 10, 2016 to Feb. 10, 2016, london,uk
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
What you really need to do about the EU General Data Protection Regulation - and what you don’t need to worry about. | Jeremy King , Emily Taylor , Emma Philpot , Renate Samson | Regulation: Understanding the difference between compliance and security – while achieving both. | |
Cyber-Crime - the new normal. | Troels Oerting , Bob Tarzey , Jamie Saunders , Tim Lansdale | With theft at scale, from well organised international entities, hacktivists or 15-year olds delivering DDoS ... | |
How do you spot the insider threat? | Dietrich Benjes | Insiders are the new malware. Executives and IT professionals are becoming as afraid of their ... | |
Securing Enterprise Identities Against Cyberthreats | Nick Colin | Description: Identity is at the centre of most cyber attacks making headlines today as traditional ... | |
Monitor and Audit Your 3rd-party / vendor access. | Kalle Jääskeläinen | Encryption is the cornerstone of security but also hides potential misuse of privileged access – ... | |
Demystifying threat intelligence. What should you share, and with whom – and what’s in it for you? | Ken Munro | Is Big Data just more data, and how does it become intelligence? Where does machine ... | |
Armageddon on the Horizon? How to stop hackers switching off the power, crashing your plane and bankrupting your country? | Dai Davis , Chris Hankin , Tony Collings | Critical Infrastructure in the connected world. Transport, Finance, Power, Water, Communications, Sewerage, Cars, SCADA. | |
Mobility, Security and Trusted Identities: It’s Right In The Palm of Your Hands | Ian Wells | Mobility AND security - can this really be possible? Can the right solution dramatically improve ... | |
API Security Management - Cyber Protection for Modern Enterprise Architecture | Jason Macy | The era of mobile and cloud computing and the rise of cyber attacks have upended ... | |
Keeping Up with the Revolution in IT Security | Rami Essaid | For many of today’s businesses, web applications are their lifeline. The growing complexity involved in ... | |
Reacting to a breach. Getting your incident response up to scratch and ensuring business continuity. | Sarb Sembhi , Matt Holland , Thomas Naylor , Thomas Whipp | Pre-planning and playbooks for remediation, simulation and real-world practice exercises, plus the role of cyber-insurance. | |
Breach Containment: Fixing The Data Breach Blindspot | Paul German | It’s an unfortunate reality of the modern enterprise: data breaches are inevitable. The compromise of ... | |
From "fences" to "bodyguards"- How data-centric security works | Rui Melo Biscaia | Today’s info protection environment is evolving rapidly, with paradigm shifts including BYOD devices, cloud environments, ... | |
Gaining visibility to Indicators of Exposure to shrink the attack surface and more effectively contain incidents. | Justin Coker | The layers of the attack surface and associated Indicators of Exposure The use of network ... |