InfoSecurityEurope 2019 June 4, 2019 to June 6, 2019, London, UK
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Cryptojacking: What You Need to Know | Chris Marrison | In his talk, Chris Marrison, Consulting Solutions Architect at Infoblox, will provide a brief yet ... | |
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Information Security Decisions | Dr. Margaret Cunningham | Wishful thinking won’t protect your data and systems. Without understanding two key psychological constructs, motivated ... | |
Bridging the Gap Between IT & OT | Raj Samani | During this presentation, Raj will discuss the risks associated with connectivity between OT &IT networks, ... | |
Managing Supply Chain Risk for CNI/II | Mo Ahddoud | Complex supply chains are a key vulnerability for critical and industrial infrastructure, with attackers increasingly ... | |
Overcoming Complexity to Strengthen Resilience for CNI & II | Raj Samani , Elisa Costante , Robert Orr , Nigel Stanley | The challenges facing CNI and II are undoubtedly complex as operational technology is increasingly connected ... | |
Keynote: Perspectives from the Frontline: Managing Risk & Building Resilience | Kate Adie | As one BBC Chief News Reporter Kate Adie reported from most of the world’s hotspots ... | |
Your Security Awareness Training Isn't Working | Holly Grace Williams | A look at common security awareness tips and how penetration testers might use those against ... | |
State of Security | Pedro Martins | During this session we will focus on topics that will help you define & lead ... | |
The World’s Most Sought-After Security Researchers...Working For You | Tom Shelton , Dimitrie Sandu | Cisco’s Talos organisation is an elite team of 250 of the world’s most sought-after security ... | |
The "S" in "IoT" stands for "Security" | Viktor Petterson | Along with the proliferation of IoT devices in our homes and lives has come string ... | |
Establishing Cyber Risk Appetite to Enable the Business | Wallace Sann | Balancing personal risk tolerance with organisational risk toleranceIdentifying methodologies and quantitative and qualitative metrics to ... | |
Embracing Zero Trust | James Plouffe | In 2014, Google published “BeyondCorp: A New Approach to Enterprise Security” detailing their implementation of ... | |
Digitalisation & the Cyber INsecurity Gap | Jason Hill | 79% of executives report their organisation is adopting new technologies faster than they can address ... | |
Cyber Threat Intelligence & Criminal Innovation | Max Vetter | In this talk Max Vetter will explore the innovative nature of cyber criminals and demonstrate ... | |
AI: Past Failures, Current Capability & the Future of "Nation State" Defence | Nicola Whiting | With an increasing skills gap and wave of autonomous attacks, military, governments and global enterprises ... | |
A Journey of Self Driven Security Training | James Hooker | This talk details a course of progression from engineer to security advocate, highlighting the importance ... | |
What’s New with the ePrivacy Regulation? Key Considerations for Tomorrow’s Electronic Communications | Kevin Kiley | The ePrivacy Regulation will have a profound effect on marketing activities moving forward. Faced with ... | |
Addressing One of the Largest Risks in Cybersecurity: Humans! | Edward Tucker | Your employees today struggle to identify real cyber attacks, whilst traditional awareness campaigns has failed ... | |
Is That Really You? The Importance of Identity in Breach Readiness & Response | Richard Dean | Monitoring your users’ access and privileges, and securing them as they interact with the internet ... | |
Radical Innovation in Security: A Game-Changing Review of Security Techniques & Outcomes | Darren Thomson | Self driving cars, artificial intelligence, smart speakers, Internet of Things, the “race to digitise” and ... | |
The Key to Securing Your Hybrid Cloud Starts with "ABC" | Elisa Lippincott | Many enterprises are adopting a cloud-first strategy to drive their business. As cloud deployments increase, ... | |
Building Brand Infosec: Engaging Employees to Drive Secure Behaviour | Paula Kershaw , Linda Mccormack , Flavius Plesu , Killian Faughnan | High profile breaches over the last 12 months have demonstrated that no matter how much ... | |
Securing Telecommunications: Safely Enabling Digital Customer Experiences | Dan Woods | Fraudsters and thieves are weaponising each new data breach with credential stuffing attacks. Their automation ... | |
How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks | Tom Moran , Tim Moran | There are five technical information security controls that if implemented correctly are known to eliminate ... | |
Lessons from Nearly a Billion Passwords | Freaky Clown | Join FC in a discussion of cracking and analysis of nearly a billion passwords: Why ... | |
API Security: What you Absolutely Need to Know Now, with Real World Examples of API Attacks | Laurent Gil | In 2018, at least 85% of organisations consider web APIs and API-based integration fundamental to ... | |
In Plain Sight: The App Vulnerability Epidemic | Aaron Schweizer | The world runs on mobile, hybrid and web apps. With millions in use, they are ... | |
Malware, Security Analytics & Cybersecurity in 2019 | Matt Lock | Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, ... | |
Yes We Can Get In. Now What? | Tom Wiele | The results of a red-team test (or breach) can be a thunderclap under a clear ... | |
Neither Phish nor Flash: How Cyber-Criminals Target Business Email Inboxes Without Phishing | James Chappell | Well-resourced actors typically access business email accounts through targeted phishing campaigns or using information-stealing malware. ... | |
Bin Alphanumeric Passwords! | Shehrezade Davidson | Tricerion’s mission is to ‘Bin Alphanumeric Passwords’, by replacing them with Picture Passwords. We are ... | |
Zero Trust Privilege for DevOps & App Developers | Tony Goulding | DevOps has emerged as a new attack surface being targeted by threat actors. In this ... | |
Get the Benefit You Deserve from Threat Intel | Syra Marshall | As Cyber Threat Intelligence moves from the sharing of indicators to the sharing of TTPs ... | |
Devil in the Details: A Reverse Engineering Campaign Across 30 Financial Services Mobile Apps | Alissa Knight | Following a six-week research study I performed into reverse engineering financial services mobile apps, I ... | |
Protecting Your People & Securing the Cloud with CASB | Richard Davis | Driven by Microsoft Office 365, digital transformation is remaking every aspect of modern business. And ... | |
The Digital Risk Dilemma: How to Protect What You Don’t Control | Nick Hayes | Everyday more of your attack surface moves to web infrastructure that you neither own nor ... | |
Incident & Breach Management for Privacy & Security Teams | Kevin Kiley | Privacy and security professionals often approach incident and breach response from two different outlooks. Whereas ... | |
Keynote: It’s all About Peanut Butter: Building a Multi-Disciplinary Infosec Team to Manage Cyber Risk | Florence Mottay | Ever been told that security always says NO? Or asked why we need information security ... | |
From Beyond the Wall to the Seven Kingdoms: Why Email Threat-Sharing Gives Us A Chance | James Baker , James Ucar | For business leaders and aspiring Iron Throne rulers. As members of the security community suffering ... | |
The Inside Story Behind VTech Storio Max Vulnerability - CVE-2018-16618 | Elliott Thompson | SureCloud's Senior Security Consultant will be discussing a critical disclosure discovered on the children's VTech ... | |
DNS: Cybersecurity’s Best Kept Secret for Eliminating Network Threats | Stuart Reed | Growing numbers of cyber threats and volumes of data are creating significant problems. Stretched security ... | |
Using Shipbuilders Wisdom to Protect Data Centres & Clouds | Ofer Wolf | In today’s modern, hyper-connected and threat-laden enterprise landscape, the time has come to shift from ... | |
Your Smart Scale Leaks More Than Just Your Weight | Erez Yalon | Smart devices are a big part of our lives. Bluetooth Smart (BLE), which was introduced ... | |
SSH Keys: Security Asset or Liability? | Mike Dodson | All enterprises rely on SSH for routine administrative tasks by systems administrators, as well as ... | |
Application Security Automation & Orchestration | Gary Robinson | Uleska are leading the way in the automation and orchestration of application security testing, and ... | |
Be the Hunter, Not the Hunted: What the Latest Cyber Attacks Mean to the Defenders | Assaf Dahan | Threats & AttacksThroughout the past year we’ve seen quite a lot - from organisations being ... | |
Building or Modernising Own CSIRT/SOC: Practical Tips | Dr. Vilius Benetis | The presentation will centre around cybersecurity capability build-out via the establishment of governmental, sectorial and ... | |
Human Risk Protection | Flavius Plesu | Academic studies have demonstrated and explained the ineffectiveness of security awareness and education (Bada, Sasse ... | |
Panel Discussion: CyberThreat: Rethinking Cyber Defence to Combat Complex Risks, Threats & Vulnerabilities | Sian John , Jenny Radcliffe , Dr. Keyun Ruan , Burim Bivolaku | As the attack landscape becomes ever more complex as organisations digitise and transform, and cybercriminals ... | |
Taming the Storm Clouds: Managing Network Security Across the Hybrid & Multi-Cloud Estate | Avivi Siman-tov | Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies ... | |
The SME Threat Landscape - Top Cyber Threats Affecting SMEs & How to Mitigate Them | Marc Laliberte | Just because your business is not a large multi-national enterprise doesn’t mean that you are ... | |
Developing a Cybersecurity Programme to Protect Your SME Business | Nick Ioannou , Neil Sinclair , Neil Sharpley | Evaluating the risk landscape to identify threats to SME businessesIdentifying the key elements of an ... | |
Building a Roadmap to Regulatory Compliance | Dai Davis | Analysing the key requirements of GDPR and what they mean for SMEs | |
Troll Hunting Using Behavioural Analytics | Dr. Staffan Truvé | Influence operation on the web and in social media today target everything from elections to ... | |
Expense in Depth: Managing Your Total Cost of Controls | John Mcclurg | John McClurg, Vice President - Ambassador-At-Large, Cylance will show how current approaches to information security ... | |
Hidden Talent In Plain Sight | Kevin Mcloughlin | 75% of the Bletchley Park were women. Today only 10% of the cyber workforce are ... | |
Cybercriminal Abuse in European IP Space | Dr. Dhia Mahjoub | Through concrete use cases and practical examples we will learn how to track criminal hosting ... | |
Red Team, Blue team: Two Sides of the Same Coin | Dr. Fildes | Our industry has adopted myriad attack detection tactics, security frameworks, threat intelligence schemes, and incident ... | |
How Financial Companies Can Starve Attackers Who Live off the Land | Ofer Israeli | Securing FinanceCyberattackers and malicious insiders increasingly rely on living-off-the-land techniques. Leveraging native connectivity to move ... | |
10 Ways to Stop Phishing Attacks | George Anderson | 77% of phishing attacks in 2018 targeted financial institutions and phishing sites now use SSL ... | |
Predicting the Unpredictable: A Look Into the 2019 Cyber Threat Landscape | Orli Gan | Learn about the latest cyber threat landscape & how you can stay one step ahead ... | |
The Future of Authentication | Niklas Palaghias | Data leaks and password thefts have proven that password-based authentication approach is inadequate to preserve ... | |
Turning a Ship Takes Planning & Effort from Every Angle | Melanie Oldham | Changing the attitudes and behaviours of employees within an organisation can be a gargantuan task. ... | |
The More We Share, the More Resilient We Are: Why Threat Intelligence is the Future of Cybersecurity | Chris Doman | Sharing threat intelligence can be the difference in a company bouncing back from or suffering ... | |
Building a Cybersecurity Talent Strategy to Future-Proof Your Business | Budgie Freeman | Qufaro will outline the new cyber education and apprenticeship opportunities for your organisation, including the ... | |
Panel Discussion: FutureTech: Future Proofing Cybersecurity for the Next Tech Frontier: Quantum, AI, Blockchain | Mark Chaplin , Tom Cignarella , Andrew Lord | Technology is advancing at breakneck speed generating a lot of media and marketing hype – ... | |
How to Find Infrastructure Shadow IT in the Cloud | Dr. Tim Junio | The cloud has enabled increases in agility and cost savings in IT, but has allowed ... | |
Security at the Speed of DevOps: Building In, Not Bolting On | Hari Srinivasan | Security embedded within DevOps reduces risk exposure up to 80%. Adopt security automation in the ... | |
Two Attacks for the Price of One? Defending Against Multi-Intent Malware | Iko Azoulay | Malware engineers are diversifying their businesses with multi-intent malware, where a single successful compromise can ... | |
Building a Secure Architectural Foundation for Next Generation Networks & Digital Transformation | Craig Sanderson | Organisations have grown their security defences as they have responded to the rapidly evolving threat ... | |
We Take Security Seriously | Javvad Malik | We take security seriously – it’s a ‘throwaway’ phrase commonly used by companies who have ... | |
Trusted Access: Excuse Me Do I Know You? | Richard Archdeacon | Trusted Access provides a zero-trust approach to securing all access across your applications and environment, ... | |
Accelerating the Analysis of Network & Cloud Traffic: How to Search Faster, Deeper & Smarter with RegEx | Ian Wilson | https://www.infosecurityeurope.com/RXUK/RXUK_Infosec/2019/Presentations/Cyber_Innovation/Day2/11.20-11.35_Titan%20IC.pdf?v=1562846597As we face an ever-larger number of increasingly more complex cyber threats in networks operating ... | |
Bringing Rapid Prototyping to the Threat Model Process | Geoffrey Hill | Introduction to the Rapid Threat Model Prototyping methodology, a radical departure from standard architectural threat ... | |
Automate Remote Access Procedures & Configurations | Mate Grbavac | On-line application for remote access request management (creation, approvals, logging)Automation and orchestration of remote access ... | |
Privileged Access Management Made Easy | Alan Radford , John Leary | Keeping sensitive information secure, maintaining data regulation compliance, and enabling privileged users to work efficiently, ... | |
How to Secure Your Data in the Cloud | John Michael | The cloud revolution is upon us. More and more organisations are moving their critical data ... | |
Combating Open Source Security Vulnerabilities Without Slowing Down Developers | Rami Elron | Development teams are facing nowadays an unprecedented challenge to accommodate requirements of application security while ... | |
The Song Remains the Same: Moving the Cybersecurity Dial… | Eoin Keary | We're still victim of vulnerabilities which are more than 20 years old despite the evolution ... | |
Scamming you at Infosec? Easy. | Danielle Papadakis | You may know a thing or two about cybersecurity. However, modern hackers are sophisticated, risk-calculating, ... | |
Cyber-Physical Security: Cyber Risk Management Strategies for Connected OT & IT Networks | Matt Gordon-smith , Gavin Ellis , Shawn Scott | In ConversationTraditionally, IT and OT are separate functions with different priorities – confidentiality and privacy ... | |
Death of the Password: Picture Authentication | Georgia Mcgrath | Say goodbye to passwords! PixelPin offers an alternative authentication method to traditional passwords and biometrics, ... | |
Personality Traits Meet Cybersecurity | Anne Collard | The art of “people hacking” tricks people into unwillingly participate in scams. Certain personality traits ... | |
Destination Unknown: A Data Science Perspective on UEBA Deployment | Steve Gailey | User and Entity Behaviour Analytics (UEBA) has emerged as a viable tool in detecting security ... | |
Keynote Briefing: The Power of People: Amplifying our Human Capacity Through Technology & Community | Ann Johnson | People are being empowered through technology like never before. AI, Machine Learning, and automation are ... | |
Women in Cybersecurity | Paula Kershaw , Nicola Whiting , Professor Obe , Adenike Cosgrove , Janine Klaiber | Infosecurity Magazine’s Women in Cybersecurity Networking EventInfosecurity Magazine’s third annual Women in Cybersecurity networking event ... | |
How to Monitor & Protect Your Network Using NetFlow/IPFIX Data | Filip Hodes | A fast, reliable and well secured network is of crucial importance to any organisation. Flowmon ... | |
The Zero-Trust Approach for Your Alert Haystack | Roy Halevi | Current approaches for SOC automation are focused on making alerts more consumable and running playbooks, ... | |
Demystifying Intelligence-Led Red Teaming: What It Is & How to Automate It | Menachem Shafran | On May 2018, the European Central Bank published the TIBER-EU, a framework for testing financial ... | |
Keynote: Discovering the Digital Underworld: Privacy, the Dark Web, Tech & Democracy | Jamie Bartlett | During this session, Jamie Bartlett will take you on a journey of discovery – sharing ... | |
Zero Trust: What Does it Mean for the CISO? | Richard Archdeacon | Adopting Zero Trust is an often-repeated phrase in the security industry, and it is growing ... | |
Managing the Insider Threat: Why Visibility is Critical | Lee Duff | Ponemon research shows that the average time to spot and contain an insider threat is ... | |
Optimising Cloud for Security Now You’re “Up There!” | Lothar D'cruz | Over 90% of CISOs say that leveraging cloud security solutions allows them to be more ... | |
Trust No One & Suspect Everyone: Zero Trust Security Model | Tim Brown | Identity & Access ManagementA threat is a threat—whether intentional or not—and the human factor that ... | |
Deep Dive: Using Artificial Intelligence to Impersonate a Human & Undertake Vishing Attacks | David Edwards | Hear no Evil see no Evil; How an AI system was developed that could disguise ... | |
Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway | Paul Ducklin | Encryption is a vital part of anyone's cloud security toolkit. It means you can safely ... | |
Short, Brutal & Nasty: New Domains & Their Life & Times | Dr. Paul Vixie | Domain names are cheap, easy-to-get assets – the perfect tool for the perfect crime. In ... | |
Modern Cyber Threats & Prioritising Security Controls to Combat Them | Chris Goettl | Another year, another security show, what silver bullets are you hunting for this go round? ... | |
Protecting Your Organisation's Very Attacked People | Paul Down | 90% of all cyberattacks start with an email targeting your end-users. The human factor—the instincts ... | |
Anatomy of a Cyber Attack: DNSpionage | Martin Lee | Threat actors continuously search for new techniques to compromise their victims. Recently, Cisco Talos identified ... | |
The Office 365 Dilemma: How Secure is Secure? | Sunil Choudrie | Office 365 has captured the imagination of many organisations, offering a wide range of productivity ... | |
Mobile Security Strategies in a Zero-Trust World | Stijn Paumen | Mobile devices now generate more corporate traffic than laptops or PCs and an average mobile ... | |
View from the Board: Managing Organisational Complexity & Risk | Dama Inga Beale | During this presentation Dame Inga Beale, former CEO of Lloyds of London will share her ... | |
It’s Not a Legacy That Will Go Away: Securing Industrial Control Systems in the Future Business Model | Scott Cairns | We cannot ignore vulnerabilities in Industrial Control Systems any longer; critical assets continue to be ... | |
Regulating the IoT. A Dream too far? | Ken Munro | In this presentation you’ll get a potted history of the shambles that is IoT security. ... | |
Don’t Acquire Your Next Breach: Managing Vendor Risk Under the GDPR | Linda Thielova | Managing vendor risk before, during and after onboarding is a continuous effort under the GDPR ... | |
The Battle to Protect Public Services Against Phishing Attacks | Nikola Howard | A growing priority for Nikola Howard, Data Centre Manager at the London Borough of Camden, ... | |
How to Succeed at Threat Hunting & IR: Think Differently About Data | Jamie Moles | Two pillars of a successful and proactive SOC are threat hunting and incident response. The ... | |
It Might Get Loud! Exfiltrating Data Using Audio Interfaces | Miguel Marques | Turning files into analogue signals is not a novel idea, modems did this many years ... | |
Why do Software Flaws Persist so Long After Being Discovered? | Paul Farrington | It takes time to fix security flaws. But developers simply can’t wave a magic wand ... | |
Panel Discussion: Cracking the Complexity Conundrum: How to Secure, Patch & Protect Complex, Dynamic Organisations | Bobby Ford , Ewa Pilat , Jonathan Kidd | Enterprises are more dynamic and complex than ever before. From working practices, agile development and ... | |
AI in Security Operations Centres: What We’ve Learnt so Far | Luke Richards | Is it time for the traditional multi-tiered SOC to end? Get beyond the InfoSec buzzwords ... | |
The Future of Cyber Employment | Eoin Heffernan | For every 100 cyber jobs posted on Indeed.com there are only 32 applicants, a skills ... | |
Practical DevSecOps: The Simple Free Pipeline Anyone Can Create | Jeff Williams | After this talk, you'll be able to establish your own DevSecOps pipeline immediately. This reference ... | |
Strategic Autonomous Response: Learning from Patient Zero to Protect the Network at Large | Dave Palmer | With email still the most common vector of attack, it is time for a new ... | |
How the UK’s Data Protection Act of 2018 Impacts Your GDPR Programme | Kevin Kiley | While the UK's Data Protection Act of 2018 complements the GDPR, there are several key ... | |
Whose Transformation is it Anyway? How IT Security Teams can Support Digital Services | Arthur Barnes , Thom Langford , Marco Rottigni , David Ferguson | Ask any CIO what phrase they have been asked about most often in the past ... | |
ZTE Router Vulnerabilities: A Demonstration on the Security Risks of the IoT | Jimmy Jones | Positive Technologies researchers have discovered a number of vulnerabilities in a ZTE wifi router, used ... | |
Monitoring Active Directory & Windows: Indications you are Under Attack | Derek Melber | Most attackers will take the path of least resistance when trying to breach your environment. ... | |
App-abet Soup: Should You DAST, SAST, IAST or RASP? | Garrett Gross | While web applications offer convenience to businesses and customers alike, their ubiquity makes them a ... | |
Challenges in Securing Open Source Components | John K. Smith | Open Source Components can provide a huge advantage for software developers in terms of speed ... | |
Cyber Essentials Plus: Driving Adoption & Raising the Bar | John Carroll | The majority of common cyber attacks would be prevented by adherence to the 5 controls ... | |
Integrating Cyber Risk into an Enterprise Risk Management Strategy: The CRO’s Perspective | Eugenie Molyneux | Cyber risk is listed one of the top 10 risks in terms of both likelihood ... | |
Branch Security for Direct Internet Access | Dimitrie Sandu | Allowing branch sites access to business critical cloud applications such as Office 365 over a ... | |
Why Vulnerability Management Fails | Chris Goettl | Every wonder why so many companies struggle to manage vulnerabilities? Do you bang your head ... | |
Evasive Malware: How Attackers Bypass Dynamic Analysis | Meni Farjon | Mimecast’s Chief Scientist of Advanced Malware, Meni Farjon, will showcase high and low-level, known and ... | |
Panel Discussion: Three CISOs Walk Into a Bar | David Baker , Ross Mckerchar , Christian Toon | Featuring security leaders from three different industries as well as research from ESG (Enterprise Strategy ... | |
Evolution or Revolution: What Has SIEM Become? | Oliver Pinson-roxburgh | Bulletproof explores the changing face of the SIEM industry and the evolving threat landscape it ... | |
Phishing & OOB Exfiltration Through Purple Tinted Glasses | Owen Hunt | The proliferation of client-side attacks continues to grow, as attackers are increasingly aware their chances ... | |
The Rise of the Data Subject | David Amparo | The impact of GDPR after 367 days, the complexity of GDPR, how businesses have had ... | |
How Modern Access Management Can Accelerate Digital Transformation | Stuart Sharp | Learn how modern access management can accelerate digital transformation by making it simpler, safer and ... | |
Beyond the Castle Walls: How do we Protect in a De-Perimiterised World? | James Chappell | In 2006 The Jericho forum discussed the diminishing role of the network perimeter in organisations’ ... | |
Dissecting Today’s Attacks to See the Future of Cybersecurity | Paul Edon | Dissecting the current threat landscape and analysing major data breaches from the last decade, this ... | |
Panel Discussion: How to Optimise Investment in Cybersecurity Tools, Technologies & Products | David Boda , Stefan Treloar , Dee Deu , Mike Koss | Peddling fear, uncertainty and doubt is a criticism that is frequently levelled at information security ... | |
The Impact of Protocol Evolution on Network Security | Michael Mauch | New protocols such as TLS 1.3, QUIC, DNS over HTTPS are designed to enhance privacy ... | |
Champagne CISO: Crisis Comms: How to Handle a Crisis in Front of the Media | Steve Averley | Even at the most well-run companies things can go wrong, and when a crisis strikes ... | |
National or Sectorial Cybersecurity Capability Build-Out: Capability Assessments, CSIRT/SOCs, Threat Landscapes & CIIs | Dr. Vilius Benetis | The session will cover cybersecurity capability build-out via cybersecurity capability assessment, establishment of cybersecurity framework, ... | |
Cryptojacking: The Ghost of Cloud Security | Liviu Arsene | A new threat called cryptojacking that illicitly mines cryptocurrency was first documented on CBS’s showtime ... | |
Understanding & Leveraging GDPR Regulations to Justify IT Security Spend | Jon Fielding | This session draws upon Apricorn’s survey of over 100 IT security professionals which emphasises the ... | |
From Liability to Asset: The Role DNS Should Be Playing in Your Security Architecture & Operations | Steven Tee | DNS is a ubiquitous network service which has a front row seat when it comes ... | |
Unleash the Power of Your SOC: How to Measure Effectiveness & Mature Your Capabilities | Andrew Hollister | Despite the average organisation deploying dozens of security tools and products, major breaches are still ... | |
Risk Management for the Cloud | Alastair , Keiron Shepherd , David Locke | Protecting your customer data and mitigating risk is highly complex, especially when pursuing a multi-cloud ... | |
Automated Cyber Value-at-Risk for Application Security | Gary Robinson | Uleska are leading the way in the automation of cyber value-at-risk determination for application security ... | |
Cyber Defence 2019: An Overview of HIDS, NIDS & IPS Systems | Lovina Chidi | This presentation will introduce you to cyber intrusion tools that help to prevent cyber intrusions ... | |
Keynote: Security by Design: Securing Software & Hardware Design & Development | Mahububal Islam | As connectivity increases and IoT devices proliferate, building security into the design and development process ... | |
How to Become APT-Proof in 24 Hours | Tim Ager | Organisations like yours are investing $15 million annually in information security. They’re doing everything right. ... | |
Cloud Key Management for Multinational Regulations | Nick Sears | Understand strategies for key management architectures for cloud based applications that meet the needs of ... | |
Data Security Made Simple: Share, Work, & Protect | Mark Chou | Data security is not an easy topic for enterprises—big or small—to tackle. From identifying the ... | |
Evasive Phishing: New Attacks, Techniques & Trends | Tinna Sigurdardottir | We are experiencing a ‘perfect phishing storm’ of increasing sophistication, volume, and targeting in phishing ... | |
Why Artificial Intelligence Doesn't Work & Other Cybersecurity Failed Technologies | Ian Mann | As the hype and talk of AI increases and with many organisations now claiming to ... | |
Eliminating the WhatsApp & Dropbox Dilemma | Scott Stackelberg | Consumer solutions such as WhatsApp and Dropbox are increasingly popular and have revolutionised the way ... | |
Protecting Your Network’s Precious Jewels with Micro-Segmentation | Dania Ben-peretz | As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. ... | |
Panel Discussion: Navigating Complex Regulatory Oversight to Ensure Privacy, Security & Compliance | Steve Wright , Peter Brown , Titta Tajwer , Deborah Haworth | Regulatory risk is a key challenge for organisations with the threat of huge fines in ... | |
Modelling a Data Breach: The Financial Implications | Peter Erceg | With large scale data breaches continually attracting large headlines, businesses are ever increasingly assessing their ... | |
Device Authentication with ICMetrics | Gareth Mcdonald-maier | Current secure device authentication and encryption technology has serious limitations in assuring the identity of ... | |
Is it Really You? Protect Your Digital Self | Pedro Martins | In this session we will cover how the new technologies and cyber attack tactics evolved ... | |
Planning your Information Security Career: What you Need to Know | Deshini Brooks-kempler | People: Careers, skills, next-genThe information security sector is one of the most vibrant and growing ... | |
The Tortoise & the Hare: IoT Security & The Cyber Physical World | Reggie Best | As an industry, we are not doing enough with our expertise to support vulnerable, yet ... | |
Securing Smarter Cities: Practical Protocol & Policy | William Malik | Attendees will learn of the security and privacy successes – and failures – of smart ... | |
Keynote: Defending the UK: The NCSC Vision for a more Secure UK | N/a | N/A | |
Cyber Resilience In the Face of Human Error | Sevtap Duman , Paul Watts , Meni Farjon | Cybersecurity has become the new battlefront amongst nations, enterprises, and individuals. This has led to ... | |
The Art of DNS Rebinding | Craig Young | So much of the information security world is reactionary… it took years for credential relaying ... | |
The State of Open Source Vulnerabilities Management in 2019 | Rami Elron | Open source usage has become a mainstream practice — it’s impossible to keep up with ... | |
Tales from the Trenches: Reinvent Application Security Testing for DevOps & SecOps | Bob Scott | DevOps is a revolution starting to deliver. The “shift left” security approach is trying to ... | |
Automating Business Security is Possible: Why do so Many Enterprises Not Know & Are They Missing Out? | Nick France | Business certificate management is an often-overlooked but vital issue in the enterprise. Manual management can ... | |
A Day in the Life of… CISO, Security Analyst, Pen-tester, Security Architect | Becky Pinkard , Gemma Moore , Francis Gaffney , Russ Taylor | People: Careers, skills, next-genAre you new to information security?Thinking about starting a career in the ... | |
Defeat Ransomware: Leveraging ATP & Machine Learning to Orchestrate a Synchronised Cybersecurity Environment Across Endpoint & Email | Sam Mayne | Join us to hear Sam Mayne speak about our advanced threat protection engines. Learn about ... | |
Effective Steps to Reduce Third-Party Risk | Scott Coleman | As organisations struggle to protect themselves from the seemingly ubiquitous threat of cyberattack, the concept ... | |
How to Detect Malware in Encrypted Traffic, Without Decrypting it, Using Artificial Intelligence | Mustafa Mustafa | The rapid rise of encrypted traffic is changing the threat landscape. It’s reported that as ... | |
Back to the Future: A Data Breach Prevention Plan | Dave Matthews | Great Scott! Every day you see headlines about huge enterprises being attacked, but is this ... | |
Your Organisation & The European Directive on Security of Network & Information Systems (NIS Directive) | Ilias Chantzos | While GDPR focused on data protection, the NIS Directive focuses strictly on cybersecurity. It is ... | |
Rise of the Breaches | Troy Hunt | Data breaches are the new normal. We’ve created ecosystems with so many moving parts and ... | |
Hardware-Based Mobile Security: Why Is It Important? | Juha Eskelin | In this session the audience will learn four security principles to apply when choosing or ... | |
Multi-Phased Attacks: The 1-2 Punch That Can Knock Your Business Cold | Thomas Briend | In 2019, the volume—and sophistication—of email threats is growing. Phishing is virtually indistinguishable from legitimate ... | |
Feel the Flow: Where Water & Energy Industries are Most Vulnerable | Robert Mcardle | There are several sensationalised stories about the vulnerability of internet connected critical infrastructure - especially ... | |
Skills, Skills, Skills…. Building the Security Team of the Future | Emma Smith , Kevin Fielder , Paul Watts , Lee Barney | As risks and technologies develop at breakneck speed the demands on the information security team ... | |
State of Cybersecurity Report v2: Stats, Views & the Year in Infosec | Dan Raywood | Last year Infosecurity Magazine conducted industry research to determine the driving trends in cybersecurity. In ... | |
This is (Probably) a Drill: How to "Assume Compromise" | Chris Petito | Discover the value of running IR table top exercises. Learn how to run incident response ... | |
Hunting for Zero-Days | Jacob Baines | New vulnerabilities are being found in code daily. Infact, 18,000+ new vulnerabilities are estimated to ... | |
How Machine Learning Empowers Threat Intelligence to Easily Solve Your Vulnerability Challenge, One Hundred Times Faster | Omer Carmi | Organisations have too much information in their hands, and not enough contextual intelligence to act ... | |
Case Study: Lessons Learned from the NotPetya Cyber-Attack | Adam Banks | In 2017 to NotPetya ransomware attack wreaked havoc on a range of global businesses including ... | |
Prevention: The Strategic Element in Your Security Stack | Jorrit Van Eijk | Security architecture can be broken down into three main elements: Prevention, detection and remediation. Prevention ... | |
How to Identify and Prevent Evasive Threats Using your Organisation’s Data | Snir Ben Shimol | Stealth operations that were once only possible for the most sophisticated state-actors, are now much ... | |
How to Build Business Confidence when Migrating your Most Sensitive Data to the Cloud | Neil Larkins | Today’s security threats combined with the cost-efficiencies of the cloud have forced businesses to look ... | |
Automating Cryptographic Vulnerability Analysis in the CI Toolchain | Graham Cinkais | Accidental deployment of vulnerable cryptography can lead to significant data breaches - like the one ... | |
The Cloud-First Approach to Sustainable Data Governance | Jeff Sizemore | Businesses are driving an explosion in unstructured data. The volume of global business data doubles ... | |
Black Mirrors: The Dark Web, The Enterprise & Platform Criminality | Dr. Michael Mcguire | Respected criminologist, Dr. Mike McGuire, delves into the murky world of platform criminality, crossing into ... | |
The Devil Inside | Tim Bandos | Identifying, building and acting on insider threat cases. This will include discussion of criminal trends ... | |
The Price of PKI: The Cost of Mismanagement | Muralidharan Palanisamy | Most legitimate certificates cost anywhere between $0 - $2500 per year depending on the level ... | |
Strengthening Collaboration Between Law Enforcement & Business | Chief Goodman | One of the continuing challenges facing the information security community is the conflicting objectives of ... | |
The Rise of Automated Hacking & the Effect on Your Organisation's Security | Robert Krenn | The presentation outlines the rise of automated hacking and the consequences for both the attackers ... | |
Enabling Through-Life ISMS Value | Maurice Smit | The SABSA Methodology is well regarded for Enterprise Security Architecture, but how can it benefit ... | |
Growing Your New Cybersecurity Business | Alex Van Someren , Kirsten Connell , Akriti Dokania , Charles Fox | Innovation: Technologies, start-ups, cyber business growthGrowing Your New Cybersecurity BusinessAre you a new start-up looking ... | |
Overcome the Tech & Politics of Securing Critical National Infrastructure (CNI) | Andrew Habibi-parker | The National Cyber Security Centre (NCSC) has warned that hostile states will attempt deadly cyberattacks ... | |
Building Cyber Resilience to Sustained & Persistent Cyberattacks | Nahim Fazal | Threat detection, threat intelligence and threat hunting – Enhancing business resilience to sustained and persistent ... | |
Zero Trusted Networks or: Why Perimeter Security is Dead | Jochen Kressin | Traditional IT network security is based on perimeter security. Perimeter security makes it hard to ... | |
Cloud Risk Decoder Ring: Shared Responsibility & Ways to Avoid Self-Inflicted Harm | John Turner | With continuing cloud data breach headlines, IT and Security teams are experiencing the painful nuances ... | |
Panel Discussion: Building an Intelligent Incident Response Plan: Lessons from the Front Line | Becky Pinkard , Paul Watts , Christian Toon , Nigel Spencer , Peter Shorney , Steph Bailey | Effective incident response brings together multiple stakeholders who must work together to deal swiftly with ... | |
Automated Defences for DDoS | Paul Mitsuhata | With over 23 million DDoS weapons being tracked is your current security strategy up to ... | |
Automate or Die: DevSecOps in the Age of Software Supply Chain Attacks | Iikka Turunen | As nimble organisations deliver new innovations, adversaries are also upping their game, something we’ve seen ... | |
Let's Talk About Trust, Privacy & Cybersecurity? | Chris Bush | User privacy often sits second in priority to an organisation’s overall cybersecurity policies. Yet, it ... | |
The Power Hacker: Don’t Let the Lights Go Out: A Look Inside the Mind of a Hacker | Joseph Carson | This session is a real-world hack into a power station that explains the process on ... | |
Secure Behaviour Change: The Application of Behavioural Science to Security Awareness | Tim Ward | ThinkCyber discuss proven behavioural change techniques such as "nudge theory" and their application in the ... |