Conference Program


  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all


1 - 12 of 25 results


Items per page:

Sort By
  • Module 1: Securing the Human Factor

    04 Oct 2017, 08:30 - 12:30, Keynote Stage

    Register to attend this module to discover how to decure the human element. It’s well known that the human attack vector is the most commonly exploited in cybe...

    • Language: English

  • Automating Security Compliance

    04 Oct 2017, 10:30 - 10:55, Technology Showcase

    Cybercrime is fast developing. This session looks at the way you can empower your security teams to fight it: with machines and humans working together. Join Ia...

    • Language: English

  • Securing Privileged Access in Active Directory

    04 Oct 2017, 11:00 - 11:45, Information Security Exchange

    Most Active Directory installations are not organized and too many users have privileges. In this session MVP Derek Melber will cover the methods for you to rep...

    • Language: English

  • Saving you from Yourself and Containing the Insider Threat

    04 Oct 2017, 11:05 - 11:30, Technology Showcase

    The data doesn’t lie. With half of all data records breached due to the insider threat, what can businesses do to better protect themselves? Join Egress as they...

    • Language: English

  • Is Business Intelligence Poised to Transform Cyber Security Operations?

    04 Oct 2017, 11:40 - 12:05, Technology Showcase

    Security Operations Analysis and Reporting (SOAR) is the new Business Intelligence (BI) for Cyber Security. In the past BI was instrumental in transforming indu...

    • Language: English

  • Military Grade Security In Enterprise? Easier Than You Think!

    04 Oct 2017, 12:00 - 12:45, Information Security Exchange

    Modern companies need to evolve their business in a hurry to be competitive and ready to market demands. Their employees constantly demand mobility and remote w...

    • Language: English

  • Explaining Bitcoins Will Be The Easy Part: Email Borne Attacks and How You Can Defend Against Them

    04 Oct 2017, 12:15 - 12:40, Technology Showcase

    If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware,...

    • Language: English

  • "Deep Sea" Phishing - Examples and Countermeasures

    04 Oct 2017, 12:50 - 13:15, Technology Showcase

    Attackers know that everyone is using phishing training software and URL blacklisting, so they're resorting to new techniques resilient to these protections. We...

    • Language: English

  • Why You Should Embrace the EU GDPR

    04 Oct 2017, 13:00 - 13:45, Information Security Exchange

    Now just months away from taking effect, the EU General Data Protection Regulation could impact your ability to do business in the EU. Those who fail to comply ...

    • Language: English (United Kingdom)

  • Security in the Age of Open Source

    04 Oct 2017, 13:25 - 13:50, Technology Showcase

    With over 4,000 new open source vulnerabilities discovered since 2014, developers need new tools in their arsenals to guide, enforce, and monitor their use of o...

    • Language: English

  • Module 2: Privacy, Security, Governance & Risk

    04 Oct 2017, 13:30 - 17:00, Keynote Stage

    Register to attend this Keynote Stage module to learn how to manage information risk, implement effective governance and protect privacy. Information security ...

    • Language: English

  • SDS Cloud: Easy-to-use, GDPR-Compliant Data Confidentiality

    04 Oct 2017, 14:00 - 14:25, Technology Showcase

    Stormshield Data Security (SDS) for Cloud allows users to easily share files across any cloud platform (OneDrive, Dropbox, Box, etc.) “providing 360-degree encr...

    • Language: English

Media Partners 2017

EC-Council Infosecurity Magazine ACSC Cyber Defense Magazine Cloud Security Alliance CyberTech EWF ISC2 EM360 ISMG TechTarget MassTech Security Solutions Watch The Register Crest Mass TLC Newsweek MIT

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.