Loading
We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
Loading
-
Your local time: )Technology & AI are dramatically changing what’s possible in our world. Our challenge as we create new things is to dislodge from the comfort of what we already know. Chris created Shazam after being ...
-
Your local time: )In this session, we will explore why the key to long-term success in cybersecurity lies in returning to the fundamentals. By reinforcing core principles, we can build a strong, sustainable foundation ...
-
-
Your local time: )As identity becomes the new security perimeter, businesses must rethink their approach to access control, compliance, and cyber resilience. This session explores the latest identity security trends, U ...
-
Your local time: )Prof. Simon will provide an in-depth look at the current perceptions and challenges facing the cybersecurity profession, highlighting the growing need for convergence between physical and cyber securi ...
-
Your local time: )As AI becomes central to modern enterprises, cybersecurity is evolving rapidly. In this session, Delinea’s VP of Identity Threat & Research will discuss how identity security is leading this transform ...
-
Your local time: )Maslow’s Hierarchy of Needs can be applied to organisational security culture, with security approaches driven by the fulfillment of fundamental needs similar to human development stages. A strong sec ...
-
Your local time: )Everyone recognises the enormous potential of AI. But how many organisations are actually ready to harness it effectively? Chris Jackson, CPTO, Six Degrees and Richard Gardner, CTO, Lumilinks share a ...
-
Your local time: )We’ll explore how Cyera is revolutionizing data security through the transformative power of artificial intelligence. Drawing from extensive experience protecting Fortune 500 companies, Yotam will dem ...Speakers
-
Your local time: )With vulnerability debt mounting and attacks proliferating, relying on a reactive, siloed approach typically found in traditional vulnerability management programs isn't enough. In this session, we’ll ...
-
Your local time: )In our rapidly evolving digital landscape, traditional cybersecurity strategies have predominantly focused on prevention, aiming to erect barriers against cyber threats. However, the complexity and so ...
Sponsored by:
-
Your local time: )Technology & AI are dramatically changing what’s possible in our world. Our challenge as we create new things is to dislodge from the comfort of what we already know. Chris created Shazam after being ...
-
Your local time: )
-
Your local time: )From data leakage and regulatory non-compliance to shadow AI usage and insider threats, the rapid rise of GenAI continues to introduce new challenges that traditional security frameworks struggle to a ...
-
Your local time: )With so many threats, vulnerabilities, patches, and alerts, it can be difficult to know where to focus. In this session, Ivan will share a practical approach to managing cyber risk that has proven to ...
-
Your local time: )Artificial Intelligence is transforming workflows across industries, enhancing efficiency, decision-making, and security operations. However, alongside its benefits come new risks that require vigilan ...
-
Your local time: )This talk will highlight that security is not merely a technical challenge, but a cultural and human one. The session will explore how security becomes deeply ingrained in an organisation when its "se ...Speakers
-
Your local time: )What is step one in protecting cloud environments? A sea of native tools, traditional vulnerability management, or a collection of acronyms and buzz words?In this session, attendees will learn how to ...
-
Your local time: )As threat actors’ Tactics, Techniques, and Procedures become more complex, it becomes all that more critical for security leaders to understand how they are gaining initial access and fulfilling their ...
-
Your local time: )Join CoreView to get a 101 on Entra Apps - how you find them, how you secure them, and why they have become a favourite attack vector for cyber criminals. Attendees will get: · An overview o ...
Sponsored By:
-
Your local time: )Technology & AI are dramatically changing what’s possible in our world. Our challenge as we create new things is to dislodge from the comfort of what we already know. Chris created Shazam after being ...
-
Your local time: )Endpoints are no longer just devices like laptops and smartphones; the lines keep moving and endpoints are suddenly everywhere and nowhere at once. AI is redefining endpoint security by predicting thr ...
-
Your local time: )Observability doesn't work. Instrumenting applications has proven to be too difficult and there has been too much reliance on distributed traces and metrics to try and help operations teams stay on to ...
-
Your local time: )This session will dive into the key aspects of securing the cloud-native enterprise. We will begin by exploring the benefits and challenges of fully embracing cloud-native technologies, examining both ...Speakers
-
Your local time: )Jim will talk about how, in the age of AI, corporate data has become a major company asset rather than just a cost, with the challenge to all organizations being how to leverage it to reduce costs, in ...
-
Your local time: )As AI becomes a crucial tool for detecting cyber threats, it also becomes a target itself. Adversaries can manipulate data collection, corrupt models, and tamper with outputs—raising critical question ...
-
Your local time: )As deepfake technology becomes more accessible, its potential for exploitation grows. Could deepfakes be the next weapon of choice for social engineers and cybercriminals? From hijacked CCTV feeds to ...
-
Your local time: )
-
Your local time: )This session will discuss how to navigate the shifting cybersecurity landscape and secure emerging services in the cloud. Nicholas will explore machine learning and AI powered cloud security services ...
-
Your local time: )In today’s world, talent knows no boundaries. However, opportunities and user experience often are limited. Organisations face the dual challenge of tapping into a global talent while ensuring secure, ...
-
Your local time: )In a world where cyber threats evolve faster than ever, Big Data is the key to staying ahead. This session explores how businesses can harness the power of big data to revolutionise their Cybersecurit ...
-
Your local time: )This engaging panel discussion will explore the evolving landscape of cyber security talent and how embracing diverse career paths and backgrounds can create a more adaptive and innovative workforce. ...Speakers
-
Your local time: )This presentation tackles the critical yet often overlooked challenges of supply chain security in our interconnected business world. Through analysis of recent high-profile compromises, Andy will exp ...
-
Your local time: )Strengthening the Weak Link: Enhancing Your Cybersecurity Posture Through Effective Employee Engagement.
-
Your local time: )This engaging panel discussion will explore the evolving landscape of cyber security talent and how embracing diverse career paths and backgrounds can create a more adaptive and innovative workforce. ...
-
Your local time: )In this session, KnowBe4's Javvad Malik explores the delicate balance between maintaining a robust cybersecurity posture and fostering a positive work environment. The audience can expect to learn inn ...
-
Your local time: )With today’s rapidly evolving landscape of cybersecurity, the integration of artificial intelligence presents both unprecedented opportunities and complex challenges.In this session, learn from SumoLo ...
-
Your local time: )Can Large Language Models (LLMs) replace static analysis in application security? The short answer is no—but when combined, they unlock a new era of precision, speed, and efficiency in secure software ...
-
Your local time: )
Sponsored by:
-
Your local time: )Securing your data when everyone inside and outside of your organisation wants greater productivity, collaboration and agility, can’t be achieved without better visibility and control of your sensitiv ...
-
Your local time: )In cybersecurity, technology alone cannot fully safeguard digital assets. While advanced systems are vital, the human firewall plays a crucial role in preventing and mitigating threats. This session f ...
-
Your local time: )We’ll explore how Cyera is revolutionizing data security through the transformative power of artificial intelligence. Drawing from extensive experience protecting Fortune 500 companies, Yotam will dem ...Speakers
-
Your local time: )As technology advances, application security faces new complexities. This presentation focuses on three critical areas:1) AI-Generated Code Risks: AI revolutionizes software development but introduces ...
-
Your local time: )This session will explore imposter syndrome in the tech and cybersecurity fields, with an interactive Q&A to engage attendees and highlight famous figures who’ve struggled with it. Yemurai will define ...
-
Your local time: )
-
Your local time: )This session will explore how broadening the scope of threat intelligence can enhance business decision-making, particularly in relation to utility efficiency. By expanding threat intelligence, organi ...
Sponsored By:
-
Your local time: )Join us for an insightful session on driving security outcomes through a unified identity strategy. Discover why traditional SSO and MFA fall short and learn how to address identity security challenge ...Speakers
-
Your local time: )The attack surface is expanding exponentially, driven by rapid cloud adoption, evolving technologies, and increasingly sophisticated cyber threats. In this session, Ellis will examine the leading atta ...
-
Your local time: )With governments worldwide proposing legislation to ban ransomware payments, organisations face mounting pressure to strengthen their cyber resilience and compliance strategies. This session explores ...
-
Your local time: )
-
Your local time: )Whilst Cybersecurity’s focus is to combat current threats, it is also important to remain forward-thinking and assess how to prevent future evolving cyber-attacks. In this session, we will delve into ...
-
-
Your local time: )Join industry experts as they delve into Deepfake technology and its impact on privacy, trust, and security. Discover how AI-generated content is used both for innovation and exploitation, raising con ...
-
Your local time: )The Technology Skills Gap: Training as a Solution - Certification vs. Experience: What Matters More?Join us for a thought-provoking session exploring the skills gap and the ongoing debate between the value of certifications versus hands-on experience. We'll delve into whether the skills gap is real ...
-
Your local time: )The global tech workforce is brilliantly neurodiverse, but is your organisation supporting the needs of your autistic employees so that they can thrive? In this session, Nellie will explore why it’s c ...
-
Your local time: )Join us as we define a new standard for data protection with zero key management. In this session, we will dive into the power of Post Quantum Cryptography (PQC) services, showcasing how they ensure s ...
-
Your local time: )Join CEO, Gerasim Hovhannisyan & Marketing VP, Courtney Austin for a dynamic session covering the latest DMARC adoption trends, new innovations and our new EasyDMARC Academy with free certification. E ...