SCcongress 2016 Feb. 10, 2016 to Feb. 10, 2016, london,uk

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
What you really need to do about the EU General Data Protection Regulation - and what you don’t need to worry about. Jeremy King , Emily Taylor , Emma Philpot , Renate Samson Regulation: Understanding the difference between compliance and security – while achieving both.
Cyber-Crime - the new normal. Troels Oerting , Bob Tarzey , Jamie Saunders , Tim Lansdale With theft at scale, from well organised international entities, hacktivists or 15-year olds delivering DDoS ...
How do you spot the insider threat? Dietrich Benjes Insiders are the new malware. Executives and IT professionals are becoming as afraid of their ...
Securing Enterprise Identities Against Cyberthreats Nick Colin Description: Identity is at the centre of most cyber attacks making headlines today as traditional ...
Monitor and Audit Your 3rd-party / vendor access. Kalle Jääskeläinen Encryption is the cornerstone of security but also hides potential misuse of privileged access – ...
Demystifying threat intelligence. What should you share, and with whom – and what’s in it for you? Ken Munro Is Big Data just more data, and how does it become intelligence? Where does machine ...
Armageddon on the Horizon? How to stop hackers switching off the power, crashing your plane and bankrupting your country? Dai Davis , Chris Hankin , Tony Collings Critical Infrastructure in the connected world. Transport, Finance, Power, Water, Communications, Sewerage, Cars, SCADA.
Mobility, Security and Trusted Identities: It’s Right In The Palm of Your Hands Ian Wells Mobility AND security - can this really be possible? Can the right solution dramatically improve ...
API Security Management - Cyber Protection for Modern Enterprise Architecture Jason Macy The era of mobile and cloud computing and the rise of cyber attacks have upended ...
Keeping Up with the Revolution in IT Security Rami Essaid For many of today’s businesses, web applications are their lifeline. The growing complexity involved in ...
Reacting to a breach. Getting your incident response up to scratch and ensuring business continuity. Sarb Sembhi , Matt Holland , Thomas Naylor , Thomas Whipp Pre-planning and playbooks for remediation, simulation and real-world practice exercises, plus the role of cyber-insurance.
Breach Containment: Fixing The Data Breach Blindspot Paul German It’s an unfortunate reality of the modern enterprise: data breaches are inevitable. The compromise of ...
From "fences" to "bodyguards"- How data-centric security works Rui Melo Biscaia Today’s info protection environment is evolving rapidly, with paradigm shifts including BYOD devices, cloud environments, ...
Gaining visibility to Indicators of Exposure to shrink the attack surface and more effectively contain incidents. Justin Coker The layers of the attack surface and associated Indicators of Exposure The use of network ...