InfoSecurityEurope 2019 June 4, 2019 to June 6, 2019, London, UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cryptojacking: What You Need to Know Chris Marrison In his talk, Chris Marrison, Consulting Solutions Architect at Infoblox, will provide a brief yet ...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions Dr. Margaret Cunningham Wishful thinking won’t protect your data and systems. Without understanding two key psychological constructs, motivated ...
Bridging the Gap Between IT & OT Raj Samani During this presentation, Raj will discuss the risks associated with connectivity between OT &IT networks, ...
Managing Supply Chain Risk for CNI/II Mo Ahddoud Complex supply chains are a key vulnerability for critical and industrial infrastructure, with attackers increasingly ...
Overcoming Complexity to Strengthen Resilience for CNI & II Raj Samani , Elisa Costante , Robert Orr , Nigel Stanley The challenges facing CNI and II are undoubtedly complex as operational technology is increasingly connected ...
Keynote: Perspectives from the Frontline: Managing Risk & Building Resilience Kate Adie As one BBC Chief News Reporter Kate Adie reported from most of the world’s hotspots ...
Your Security Awareness Training Isn't Working Holly Grace Williams A look at common security awareness tips and how penetration testers might use those against ...
State of Security Pedro Martins During this session we will focus on topics that will help you define & lead ...
The World’s Most Sought-After Security Researchers...Working For You Tom Shelton , Dimitrie Sandu Cisco’s Talos organisation is an elite team of 250 of the world’s most sought-after security ...
The "S" in "IoT" stands for "Security" Viktor Petterson Along with the proliferation of IoT devices in our homes and lives has come string ...
Establishing Cyber Risk Appetite to Enable the Business Wallace Sann Balancing personal risk tolerance with organisational risk toleranceIdentifying methodologies and quantitative and qualitative metrics to ...
Embracing Zero Trust James Plouffe In 2014, Google published “BeyondCorp: A New Approach to Enterprise Security” detailing their implementation of ...
Digitalisation & the Cyber INsecurity Gap Jason Hill 79% of executives report their organisation is adopting new technologies faster than they can address ...
Cyber Threat Intelligence & Criminal Innovation Max Vetter In this talk Max Vetter will explore the innovative nature of cyber criminals and demonstrate ...
AI: Past Failures, Current Capability & the Future of "Nation State" Defence Nicola Whiting With an increasing skills gap and wave of autonomous attacks, military, governments and global enterprises ...
A Journey of Self Driven Security Training James Hooker This talk details a course of progression from engineer to security advocate, highlighting the importance ...
What’s New with the ePrivacy Regulation? Key Considerations for Tomorrow’s Electronic Communications Kevin Kiley The ePrivacy Regulation will have a profound effect on marketing activities moving forward. Faced with ...
Addressing One of the Largest Risks in Cybersecurity: Humans! Edward Tucker Your employees today struggle to identify real cyber attacks, whilst traditional awareness campaigns has failed ...
Is That Really You? The Importance of Identity in Breach Readiness & Response Richard Dean Monitoring your users’ access and privileges, and securing them as they interact with the internet ...
Radical Innovation in Security: A Game-Changing Review of Security Techniques & Outcomes Darren Thomson Self driving cars, artificial intelligence, smart speakers, Internet of Things, the “race to digitise” and ...
The Key to Securing Your Hybrid Cloud Starts with "ABC" Elisa Lippincott Many enterprises are adopting a cloud-first strategy to drive their business. As cloud deployments increase, ...
Building Brand Infosec: Engaging Employees to Drive Secure Behaviour Paula Kershaw , Linda Mccormack , Flavius Plesu , Killian Faughnan High profile breaches over the last 12 months have demonstrated that no matter how much ...
Securing Telecommunications: Safely Enabling Digital Customer Experiences Dan Woods Fraudsters and thieves are weaponising each new data breach with credential stuffing attacks. Their automation ...
How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks Tom Moran , Tim Moran There are five technical information security controls that if implemented correctly are known to eliminate ...
Lessons from Nearly a Billion Passwords Freaky Clown Join FC in a discussion of cracking and analysis of nearly a billion passwords: Why ...
API Security: What you Absolutely Need to Know Now, with Real World Examples of API Attacks Laurent Gil In 2018, at least 85% of organisations consider web APIs and API-based integration fundamental to ...
In Plain Sight: The App Vulnerability Epidemic Aaron Schweizer The world runs on mobile, hybrid and web apps. With millions in use, they are ...
Malware, Security Analytics & Cybersecurity in 2019 Matt Lock Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, ...
Yes We Can Get In. Now What? Tom Wiele The results of a red-team test (or breach) can be a thunderclap under a clear ...
Neither Phish nor Flash: How Cyber-Criminals Target Business Email Inboxes Without Phishing James Chappell Well-resourced actors typically access business email accounts through targeted phishing campaigns or using information-stealing malware. ...
Bin Alphanumeric Passwords! Shehrezade Davidson Tricerion’s mission is to ‘Bin Alphanumeric Passwords’, by replacing them with Picture Passwords. We are ...
Zero Trust Privilege for DevOps & App Developers Tony Goulding DevOps has emerged as a new attack surface being targeted by threat actors. In this ...
Get the Benefit You Deserve from Threat Intel Syra Marshall As Cyber Threat Intelligence moves from the sharing of indicators to the sharing of TTPs ...
Devil in the Details: A Reverse Engineering Campaign Across 30 Financial Services Mobile Apps Alissa Knight Following a six-week research study I performed into reverse engineering financial services mobile apps, I ...
Protecting Your People & Securing the Cloud with CASB Richard Davis Driven by Microsoft Office 365, digital transformation is remaking every aspect of modern business. And ...
The Digital Risk Dilemma: How to Protect What You Don’t Control Nick Hayes Everyday more of your attack surface moves to web infrastructure that you neither own nor ...
Incident & Breach Management for Privacy & Security Teams Kevin Kiley Privacy and security professionals often approach incident and breach response from two different outlooks. Whereas ...
Keynote: It’s all About Peanut Butter: Building a Multi-Disciplinary Infosec Team to Manage Cyber Risk Florence Mottay Ever been told that security always says NO? Or asked why we need information security ...
From Beyond the Wall to the Seven Kingdoms: Why Email Threat-Sharing Gives Us A Chance James Baker , James Ucar For business leaders and aspiring Iron Throne rulers. As members of the security community suffering ...
The Inside Story Behind VTech Storio Max Vulnerability - CVE-2018-16618 Elliott Thompson SureCloud's Senior Security Consultant will be discussing a critical disclosure discovered on the children's VTech ...
DNS: Cybersecurity’s Best Kept Secret for Eliminating Network Threats Stuart Reed Growing numbers of cyber threats and volumes of data are creating significant problems. Stretched security ...
Using Shipbuilders Wisdom to Protect Data Centres & Clouds Ofer Wolf In today’s modern, hyper-connected and threat-laden enterprise landscape, the time has come to shift from ...
Your Smart Scale Leaks More Than Just Your Weight Erez Yalon Smart devices are a big part of our lives. Bluetooth Smart (BLE), which was introduced ...
SSH Keys: Security Asset or Liability? Mike Dodson All enterprises rely on SSH for routine administrative tasks by systems administrators, as well as ...
Application Security Automation & Orchestration Gary Robinson Uleska are leading the way in the automation and orchestration of application security testing, and ...
Be the Hunter, Not the Hunted: What the Latest Cyber Attacks Mean to the Defenders Assaf Dahan Threats & AttacksThroughout the past year we’ve seen quite a lot - from organisations being ...
Building or Modernising Own CSIRT/SOC: Practical Tips Dr. Vilius Benetis The presentation will centre around cybersecurity capability build-out via the establishment of governmental, sectorial and ...
Human Risk Protection Flavius Plesu Academic studies have demonstrated and explained the ineffectiveness of security awareness and education (Bada, Sasse ...
Panel Discussion: CyberThreat: Rethinking Cyber Defence to Combat Complex Risks, Threats & Vulnerabilities Sian John , Jenny Radcliffe , Dr. Keyun Ruan , Burim Bivolaku As the attack landscape becomes ever more complex as organisations digitise and transform, and cybercriminals ...
Taming the Storm Clouds: Managing Network Security Across the Hybrid & Multi-Cloud Estate Avivi Siman-tov Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies ...
The SME Threat Landscape - Top Cyber Threats Affecting SMEs & How to Mitigate Them Marc Laliberte Just because your business is not a large multi-national enterprise doesn’t mean that you are ...
Developing a Cybersecurity Programme to Protect Your SME Business Nick Ioannou , Neil Sinclair , Neil Sharpley Evaluating the risk landscape to identify threats to SME businessesIdentifying the key elements of an ...
Building a Roadmap to Regulatory Compliance Dai Davis Analysing the key requirements of GDPR and what they mean for SMEs
Troll Hunting Using Behavioural Analytics Dr. Staffan Truvé Influence operation on the web and in social media today target everything from elections to ...
Expense in Depth: Managing Your Total Cost of Controls John Mcclurg John McClurg, Vice President - Ambassador-At-Large, Cylance will show how current approaches to information security ...
Hidden Talent In Plain Sight Kevin Mcloughlin 75% of the Bletchley Park were women. Today only 10% of the cyber workforce are ...
Cybercriminal Abuse in European IP Space Dr. Dhia Mahjoub Through concrete use cases and practical examples we will learn how to track criminal hosting ...
Red Team, Blue team: Two Sides of the Same Coin Dr. Fildes Our industry has adopted myriad attack detection tactics, security frameworks, threat intelligence schemes, and incident ...
How Financial Companies Can Starve Attackers Who Live off the Land Ofer Israeli Securing FinanceCyberattackers and malicious insiders increasingly rely on living-off-the-land techniques. Leveraging native connectivity to move ...
10 Ways to Stop Phishing Attacks George Anderson 77% of phishing attacks in 2018 targeted financial institutions and phishing sites now use SSL ...
Predicting the Unpredictable: A Look Into the 2019 Cyber Threat Landscape Orli Gan Learn about the latest cyber threat landscape & how you can stay one step ahead ...
The Future of Authentication Niklas Palaghias Data leaks and password thefts have proven that password-based authentication approach is inadequate to preserve ...
Turning a Ship Takes Planning & Effort from Every Angle Melanie Oldham Changing the attitudes and behaviours of employees within an organisation can be a gargantuan task. ...
The More We Share, the More Resilient We Are: Why Threat Intelligence is the Future of Cybersecurity Chris Doman Sharing threat intelligence can be the difference in a company bouncing back from or suffering ...
Building a Cybersecurity Talent Strategy to Future-Proof Your Business Budgie Freeman Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the ...
Panel Discussion: FutureTech: Future Proofing Cybersecurity for the Next Tech Frontier: Quantum, AI, Blockchain Mark Chaplin , Tom Cignarella , Andrew Lord Technology is advancing at breakneck speed generating a lot of media and marketing hype – ...
How to Find Infrastructure Shadow IT in the Cloud Dr. Tim Junio The cloud has enabled increases in agility and cost savings in IT, but has allowed ...
Security at the Speed of DevOps: Building In, Not Bolting On Hari Srinivasan Security embedded within DevOps reduces risk exposure up to 80%. Adopt security automation in the ...
Two Attacks for the Price of One? Defending Against Multi-Intent Malware Iko Azoulay Malware engineers are diversifying their businesses with multi-intent malware, where a single successful compromise can ...
Building a Secure Architectural Foundation for Next Generation Networks & Digital Transformation Craig Sanderson Organisations have grown their security defences as they have responded to the rapidly evolving threat ...
We Take Security Seriously Javvad Malik We take security seriously – it’s a ‘throwaway’ phrase commonly used by companies who have ...
Trusted Access: Excuse Me Do I Know You? Richard Archdeacon Trusted Access provides a zero-trust approach to securing all access across your applications and environment, ...
Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx Ian Wilson https://www.infosecurityeurope.com/RXUK/RXUK_Infosec/2019/Presentations/Cyber_Innovation/Day2/11.20-11.35_Titan%20IC.pdf?v=1562846597As we face an ever-larger number of increasingly more complex cyber threats in networks operating ...
Bringing Rapid Prototyping to the Threat Model Process Geoffrey Hill Introduction to the Rapid Threat Model Prototyping methodology, a radical departure from standard architectural threat ...
Automate Remote Access Procedures & Configurations Mate Grbavac On-line application for remote access request management (creation, approvals, logging)Automation and orchestration of remote access ...
Privileged Access Management Made Easy Alan Radford , John Leary Keeping sensitive information secure, maintaining data regulation compliance, and enabling privileged users to work efficiently, ...
How to Secure Your Data in the Cloud John Michael The cloud revolution is upon us. More and more organisations are moving their critical data ...
Combating Open Source Security Vulnerabilities Without Slowing Down Developers Rami Elron Development teams are facing nowadays an unprecedented challenge to accommodate requirements of application security while ...
The Song Remains the Same: Moving the Cybersecurity Dial… Eoin Keary We're still victim of vulnerabilities which are more than 20 years old despite the evolution ...
Scamming you at Infosec? Easy. Danielle Papadakis You may know a thing or two about cybersecurity. However, modern hackers are sophisticated, risk-calculating, ...
Cyber-Physical Security: Cyber Risk Management Strategies for Connected OT & IT Networks Matt Gordon-smith , Gavin Ellis , Shawn Scott In ConversationTraditionally, IT and OT are separate functions with different priorities – confidentiality and privacy ...
Death of the Password: Picture Authentication Georgia Mcgrath Say goodbye to passwords! PixelPin offers an alternative authentication method to traditional passwords and biometrics, ...
Personality Traits Meet Cybersecurity Anne Collard The art of “people hacking” tricks people into unwillingly participate in scams. Certain personality traits ...
Destination Unknown: A Data Science Perspective on UEBA Deployment Steve Gailey User and Entity Behaviour Analytics (UEBA) has emerged as a viable tool in detecting security ...
Keynote Briefing: The Power of People: Amplifying our Human Capacity Through Technology & Community Ann Johnson People are being empowered through technology like never before. AI, Machine Learning, and automation are ...
Women in Cybersecurity Paula Kershaw , Nicola Whiting , Professor Obe , Adenike Cosgrove , Janine Klaiber Infosecurity Magazine’s Women in Cybersecurity Networking EventInfosecurity Magazine’s third annual Women in Cybersecurity networking event ...
How to Monitor & Protect Your Network Using NetFlow/IPFIX Data Filip Hodes A fast, reliable and well secured network is of crucial importance to any organisation. Flowmon ...
The Zero-Trust Approach for Your Alert Haystack Roy Halevi Current approaches for SOC automation are focused on making alerts more consumable and running playbooks, ...
Demystifying Intelligence-Led Red Teaming: What It Is & How to Automate It Menachem Shafran On May 2018, the European Central Bank published the TIBER-EU, a framework for testing financial ...
Keynote: Discovering the Digital Underworld: Privacy, the Dark Web, Tech & Democracy Jamie Bartlett During this session, Jamie Bartlett will take you on a journey of discovery – sharing ...
Zero Trust: What Does it Mean for the CISO? Richard Archdeacon Adopting Zero Trust is an often-repeated phrase in the security industry, and it is growing ...
Managing the Insider Threat: Why Visibility is Critical Lee Duff Ponemon research shows that the average time to spot and contain an insider threat is ...
Optimising Cloud for Security Now You’re “Up There!” Lothar D'cruz Over 90% of CISOs say that leveraging cloud security solutions allows them to be more ...
Trust No One & Suspect Everyone: Zero Trust Security Model Tim Brown Identity & Access ManagementA threat is a threat—whether intentional or not—and the human factor that ...
Deep Dive: Using Artificial Intelligence to Impersonate a Human & Undertake Vishing Attacks David Edwards Hear no Evil see no Evil; How an AI system was developed that could disguise ...
Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway Paul Ducklin Encryption is a vital part of anyone's cloud security toolkit. It means you can safely ...
Short, Brutal & Nasty: New Domains & Their Life & Times Dr. Paul Vixie Domain names are cheap, easy-to-get assets – the perfect tool for the perfect crime. In ...
Modern Cyber Threats & Prioritising Security Controls to Combat Them Chris Goettl Another year, another security show, what silver bullets are you hunting for this go round? ...
Protecting Your Organisation's Very Attacked People Paul Down 90% of all cyberattacks start with an email targeting your end-users. The human factor—the instincts ...
Anatomy of a Cyber Attack: DNSpionage Martin Lee Threat actors continuously search for new techniques to compromise their victims. Recently, Cisco Talos identified ...
The Office 365 Dilemma: How Secure is Secure? Sunil Choudrie Office 365 has captured the imagination of many organisations, offering a wide range of productivity ...
Mobile Security Strategies in a Zero-Trust World Stijn Paumen Mobile devices now generate more corporate traffic than laptops or PCs and an average mobile ...
View from the Board: Managing Organisational Complexity & Risk Dama Inga Beale During this presentation Dame Inga Beale, former CEO of Lloyds of London will share her ...
It’s Not a Legacy That Will Go Away: Securing Industrial Control Systems in the Future Business Model Scott Cairns We cannot ignore vulnerabilities in Industrial Control Systems any longer; critical assets continue to be ...
Regulating the IoT. A Dream too far? Ken Munro In this presentation you’ll get a potted history of the shambles that is IoT security. ...
Don’t Acquire Your Next Breach: Managing Vendor Risk Under the GDPR Linda Thielova Managing vendor risk before, during and after onboarding is a continuous effort under the GDPR ...
The Battle to Protect Public Services Against Phishing Attacks Nikola Howard A growing priority for Nikola Howard, Data Centre Manager at the London Borough of Camden, ...
How to Succeed at Threat Hunting & IR: Think Differently About Data Jamie Moles Two pillars of a successful and proactive SOC are threat hunting and incident response. The ...
It Might Get Loud! Exfiltrating Data Using Audio Interfaces Miguel Marques Turning files into analogue signals is not a novel idea, modems did this many years ...
Why do Software Flaws Persist so Long After Being Discovered? Paul Farrington It takes time to fix security flaws. But developers simply can’t wave a magic wand ...
Panel Discussion: Cracking the Complexity Conundrum: How to Secure, Patch & Protect Complex, Dynamic Organisations Bobby Ford , Ewa Pilat , Jonathan Kidd Enterprises are more dynamic and complex than ever before. From working practices, agile development and ...
AI in Security Operations Centres: What We’ve Learnt so Far Luke Richards Is it time for the traditional multi-tiered SOC to end? Get beyond the InfoSec buzzwords ...
The Future of Cyber Employment Eoin Heffernan For every 100 cyber jobs posted on Indeed.com there are only 32 applicants, a skills ...
Practical DevSecOps: The Simple Free Pipeline Anyone Can Create Jeff Williams After this talk, you'll be able to establish your own DevSecOps pipeline immediately. This reference ...
Strategic Autonomous Response: Learning from Patient Zero to Protect the Network at Large Dave Palmer With email still the most common vector of attack, it is time for a new ...
How the UK’s Data Protection Act of 2018 Impacts Your GDPR Programme Kevin Kiley While the UK's Data Protection Act of 2018 complements the GDPR, there are several key ...
Whose Transformation is it Anyway? How IT Security Teams can Support Digital Services Arthur Barnes , Thom Langford , Marco Rottigni , David Ferguson Ask any CIO what phrase they have been asked about most often in the past ...
ZTE Router Vulnerabilities: A Demonstration on the Security Risks of the IoT Jimmy Jones Positive Technologies researchers have discovered a number of vulnerabilities in a ZTE wifi router, used ...
Monitoring Active Directory & Windows: Indications you are Under Attack Derek Melber Most attackers will take the path of least resistance when trying to breach your environment. ...
App-abet Soup: Should You DAST, SAST, IAST or RASP? Garrett Gross While web applications offer convenience to businesses and customers alike, their ubiquity makes them a ...
Challenges in Securing Open Source Components John K. Smith Open Source Components can provide a huge advantage for software developers in terms of speed ...
Cyber Essentials Plus: Driving Adoption & Raising the Bar John Carroll The majority of common cyber attacks would be prevented by adherence to the 5 controls ...
Integrating Cyber Risk into an Enterprise Risk Management Strategy: The CRO’s Perspective Eugenie Molyneux Cyber risk is listed one of the top 10 risks in terms of both likelihood ...
Branch Security for Direct Internet Access Dimitrie Sandu Allowing branch sites access to business critical cloud applications such as Office 365 over a ...
Why Vulnerability Management Fails Chris Goettl Every wonder why so many companies struggle to manage vulnerabilities? Do you bang your head ...
Evasive Malware: How Attackers Bypass Dynamic Analysis Meni Farjon Mimecast’s Chief Scientist of Advanced Malware, Meni Farjon, will showcase high and low-level, known and ...
Panel Discussion: Three CISOs Walk Into a Bar David Baker , Ross Mckerchar , Christian Toon Featuring security leaders from three different industries as well as research from ESG (Enterprise Strategy ...
Evolution or Revolution: What Has SIEM Become? Oliver Pinson-roxburgh Bulletproof explores the changing face of the SIEM industry and the evolving threat landscape it ...
Phishing & OOB Exfiltration Through Purple Tinted Glasses Owen Hunt The proliferation of client-side attacks continues to grow, as attackers are increasingly aware their chances ...
The Rise of the Data Subject David Amparo The impact of GDPR after 367 days, the complexity of GDPR, how businesses have had ...
How Modern Access Management Can Accelerate Digital Transformation Stuart Sharp Learn how modern access management can accelerate digital transformation by making it simpler, safer and ...
Beyond the Castle Walls: How do we Protect in a De-Perimiterised World? James Chappell In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ ...
Dissecting Today’s Attacks to See the Future of Cybersecurity Paul Edon Dissecting the current threat landscape and analysing major data breaches from the last decade, this ...
Panel Discussion: How to Optimise Investment in Cybersecurity Tools, Technologies & Products David Boda , Stefan Treloar , Dee Deu , Mike Koss Peddling fear, uncertainty and doubt is a criticism that is frequently levelled at information security ...
The Impact of Protocol Evolution on Network Security Michael Mauch New protocols such as TLS 1.3, QUIC, DNS over HTTPS are designed to enhance privacy ...
Champagne CISO: Crisis Comms: How to Handle a Crisis in Front of the Media Steve Averley Even at the most well-run companies things can go wrong, and when a crisis strikes ...
National or Sectorial Cybersecurity Capability Build-Out: Capability Assessments, CSIRT/SOCs, Threat Landscapes & CIIs Dr. Vilius Benetis The session will cover cybersecurity capability build-out via cybersecurity capability assessment, establishment of cybersecurity framework, ...
Cryptojacking: The Ghost of Cloud Security Liviu Arsene A new threat called cryptojacking that illicitly mines cryptocurrency was first documented on CBS’s showtime ...
Understanding & Leveraging GDPR Regulations to Justify IT Security Spend Jon Fielding This session draws upon Apricorn’s survey of over 100 IT security professionals which emphasises the ...
From Liability to Asset: The Role DNS Should Be Playing in Your Security Architecture & Operations Steven Tee DNS is a ubiquitous network service which has a front row seat when it comes ...
Unleash the Power of Your SOC: How to Measure Effectiveness & Mature Your Capabilities Andrew Hollister Despite the average organisation deploying dozens of security tools and products, major breaches are still ...
Risk Management for the Cloud Alastair , Keiron Shepherd , David Locke Protecting your customer data and mitigating risk is highly complex, especially when pursuing a multi-cloud ...
Automated Cyber Value-at-Risk for Application Security Gary Robinson Uleska are leading the way in the automation of cyber value-at-risk determination for application security ...
Cyber Defence 2019: An Overview of HIDS, NIDS & IPS Systems Lovina Chidi This presentation will introduce you to cyber intrusion tools that help to prevent cyber intrusions ...
Keynote: Security by Design: Securing Software & Hardware Design & Development Mahububal Islam As connectivity increases and IoT devices proliferate, building security into the design and development process ...
How to Become APT-Proof in 24 Hours Tim Ager Organisations like yours are investing $15 million annually in information security. They’re doing everything right. ...
Cloud Key Management for Multinational Regulations Nick Sears Understand strategies for key management architectures for cloud based applications that meet the needs of ...
Data Security Made Simple: Share, Work, & Protect Mark Chou Data security is not an easy topic for enterprises—big or small—to tackle. From identifying the ...
Evasive Phishing: New Attacks, Techniques & Trends Tinna Sigurdardottir We are experiencing a ‘perfect phishing storm’ of increasing sophistication, volume, and targeting in phishing ...
Why Artificial Intelligence Doesn't Work & Other Cybersecurity Failed Technologies Ian Mann As the hype and talk of AI increases and with many organisations now claiming to ...
Eliminating the WhatsApp & Dropbox Dilemma Scott Stackelberg Consumer solutions such as WhatsApp and Dropbox are increasingly popular and have revolutionised the way ...
Protecting Your Network’s Precious Jewels with Micro-Segmentation Dania Ben-peretz As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. ...
Panel Discussion: Navigating Complex Regulatory Oversight to Ensure Privacy, Security & Compliance Steve Wright , Peter Brown , Titta Tajwer , Deborah Haworth Regulatory risk is a key challenge for organisations with the threat of huge fines in ...
Modelling a Data Breach: The Financial Implications Peter Erceg With large scale data breaches continually attracting large headlines, businesses are ever increasingly assessing their ...
Device Authentication with ICMetrics Gareth Mcdonald-maier Current secure device authentication and encryption technology has serious limitations in assuring the identity of ...
Is it Really You? Protect Your Digital Self Pedro Martins In this session we will cover how the new technologies and cyber attack tactics evolved ...
Planning your Information Security Career: What you Need to Know Deshini Brooks-kempler People: Careers, skills, next-genThe information security sector is one of the most vibrant and growing ...
The Tortoise & the Hare: IoT Security & The Cyber Physical World Reggie Best As an industry, we are not doing enough with our expertise to support vulnerable, yet ...
Securing Smarter Cities: Practical Protocol & Policy William Malik Attendees will learn of the security and privacy successes – and failures – of smart ...
Keynote: Defending the UK: The NCSC Vision for a more Secure UK N/a N/A
Cyber Resilience In the Face of Human Error Sevtap Duman , Paul Watts , Meni Farjon Cybersecurity has become the new battlefront amongst nations, enterprises, and individuals. This has led to ...
The Art of DNS Rebinding Craig Young So much of the information security world is reactionary… it took years for credential relaying ...
The State of Open Source Vulnerabilities Management in 2019 Rami Elron Open source usage has become a mainstream practice — it’s impossible to keep up with ...
Tales from the Trenches: Reinvent Application Security Testing for DevOps & SecOps Bob Scott DevOps is a revolution starting to deliver. The “shift left” security approach is trying to ...
Automating Business Security is Possible: Why do so Many Enterprises Not Know & Are They Missing Out? Nick France Business certificate management is an often-overlooked but vital issue in the enterprise. Manual management can ...
A Day in the Life of… CISO, Security Analyst, Pen-tester, Security Architect Becky Pinkard , Gemma Moore , Francis Gaffney , Russ Taylor People: Careers, skills, next-genAre you new to information security?Thinking about starting a career in the ...
Defeat Ransomware: Leveraging ATP & Machine Learning to Orchestrate a Synchronised Cybersecurity Environment Across Endpoint & Email Sam Mayne Join us to hear Sam Mayne speak about our advanced threat protection engines. Learn about ...
Effective Steps to Reduce Third-Party Risk Scott Coleman As organisations struggle to protect themselves from the seemingly ubiquitous threat of cyberattack, the concept ...
How to Detect Malware in Encrypted Traffic, Without Decrypting it, Using Artificial Intelligence Mustafa Mustafa The rapid rise of encrypted traffic is changing the threat landscape. It’s reported that as ...
Back to the Future: A Data Breach Prevention Plan Dave Matthews Great Scott! Every day you see headlines about huge enterprises being attacked, but is this ...
Your Organisation & The European Directive on Security of Network & Information Systems (NIS Directive) Ilias Chantzos While GDPR focused on data protection, the NIS Directive focuses strictly on cybersecurity. It is ...
Rise of the Breaches Troy Hunt Data breaches are the new normal. We’ve created ecosystems with so many moving parts and ...
Hardware-Based Mobile Security: Why Is It Important? Juha Eskelin In this session the audience will learn four security principles to apply when choosing or ...
Multi-Phased Attacks: The 1-2 Punch That Can Knock Your Business Cold Thomas Briend In 2019, the volume—and sophistication—of email threats is growing. Phishing is virtually indistinguishable from legitimate ...
Feel the Flow: Where Water & Energy Industries are Most Vulnerable Robert Mcardle There are several sensationalised stories about the vulnerability of internet connected critical infrastructure - especially ...
Skills, Skills, Skills…. Building the Security Team of the Future Emma Smith , Kevin Fielder , Paul Watts , Lee Barney As risks and technologies develop at breakneck speed the demands on the information security team ...
State of Cybersecurity Report v2: Stats, Views & the Year in Infosec Dan Raywood Last year Infosecurity Magazine conducted industry research to determine the driving trends in cybersecurity. In ...
This is (Probably) a Drill: How to "Assume Compromise" Chris Petito Discover the value of running IR table top exercises. Learn how to run incident response ...
Hunting for Zero-Days Jacob Baines New vulnerabilities are being found in code daily. Infact, 18,000+ new vulnerabilities are estimated to ...
How Machine Learning Empowers Threat Intelligence to Easily Solve Your Vulnerability Challenge, One Hundred Times Faster Omer Carmi Organisations have too much information in their hands, and not enough contextual intelligence to act ...
Case Study: Lessons Learned from the NotPetya Cyber-Attack Adam Banks In 2017 to NotPetya ransomware attack wreaked havoc on a range of global businesses including ...
Prevention: The Strategic Element in Your Security Stack Jorrit Van Eijk Security architecture can be broken down into three main elements: Prevention, detection and remediation. Prevention ...
How to Identify and Prevent Evasive Threats Using your Organisation’s Data Snir Ben Shimol Stealth operations that were once only possible for the most sophisticated state-actors, are now much ...
How to Build Business Confidence when Migrating your Most Sensitive Data to the Cloud Neil Larkins Today’s security threats combined with the cost-efficiencies of the cloud have forced businesses to look ...
Automating Cryptographic Vulnerability Analysis in the CI Toolchain Graham Cinkais Accidental deployment of vulnerable cryptography can lead to significant data breaches - like the one ...
The Cloud-First Approach to Sustainable Data Governance Jeff Sizemore Businesses are driving an explosion in unstructured data. The volume of global business data doubles ...
Black Mirrors: The Dark Web, The Enterprise & Platform Criminality Dr. Michael Mcguire Respected criminologist, Dr. Mike McGuire, delves into the murky world of platform criminality, crossing into ...
The Devil Inside Tim Bandos Identifying, building and acting on insider threat cases. This will include discussion of criminal trends ...
The Price of PKI: The Cost of Mismanagement Muralidharan Palanisamy Most legitimate certificates cost anywhere between $0 - $2500 per year depending on the level ...
Strengthening Collaboration Between Law Enforcement & Business Chief Goodman One of the continuing challenges facing the information security community is the conflicting objectives of ...
The Rise of Automated Hacking & the Effect on Your Organisation's Security Robert Krenn The presentation outlines the rise of automated hacking and the consequences for both the attackers ...
Enabling Through-Life ISMS Value Maurice Smit The SABSA Methodology is well regarded for Enterprise Security Architecture, but how can it benefit ...
Growing Your New Cybersecurity Business Alex Van Someren , Kirsten Connell , Akriti Dokania , Charles Fox Innovation: Technologies, start-ups, cyber business growthGrowing Your New Cybersecurity BusinessAre you a new start-up looking ...
Overcome the Tech & Politics of Securing Critical National Infrastructure (CNI) Andrew Habibi-parker The National Cyber Security Centre (NCSC) has warned that hostile states will attempt deadly cyberattacks ...
Building Cyber Resilience to Sustained & Persistent Cyberattacks Nahim Fazal Threat detection, threat intelligence and threat hunting – Enhancing business resilience to sustained and persistent ...
Zero Trusted Networks or: Why Perimeter Security is Dead Jochen Kressin Traditional IT network security is based on perimeter security. Perimeter security makes it hard to ...
Cloud Risk Decoder Ring: Shared Responsibility & Ways to Avoid Self-Inflicted Harm John Turner With continuing cloud data breach headlines, IT and Security teams are experiencing the painful nuances ...
Panel Discussion: Building an Intelligent Incident Response Plan: Lessons from the Front Line Becky Pinkard , Paul Watts , Christian Toon , Nigel Spencer , Peter Shorney , Steph Bailey Effective incident response brings together multiple stakeholders who must work together to deal swiftly with ...
Automated Defences for DDoS Paul Mitsuhata With over 23 million DDoS weapons being tracked is your current security strategy up to ...
Automate or Die: DevSecOps in the Age of Software Supply Chain Attacks Iikka Turunen As nimble organisations deliver new innovations, adversaries are also upping their game, something we’ve seen ...
Let's Talk About Trust, Privacy & Cybersecurity? Chris Bush User privacy often sits second in priority to an organisation’s overall cybersecurity policies. Yet, it ...
The Power Hacker: Don’t Let the Lights Go Out: A Look Inside the Mind of a Hacker Joseph Carson This session is a real-world hack into a power station that explains the process on ...
Secure Behaviour Change: The Application of Behavioural Science to Security Awareness Tim Ward ThinkCyber discuss proven behavioural change techniques such as "nudge theory" and their application in the ...