Loading
We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
Loading
-
Your local time: )Let's Explore the three fundamental building blocks that every organisation needs to strengthen in order to tackle the complexities of cyber threats in the age of AI and Quantum computing. Uncover the ...
-
Your local time: )In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. Starting from a default-deny postu ...
-
Your local time: )In the cybersecurity space where professionals need to be seen to be trustworthy and knowledgeable, imposter syndrome can really hinder career development. It is often overlooked, and needs be to addr ...
-
Your local time: )Join us for a powerful session delving into the critical intersection of mental health and cybersecurity. Our speaker shares his personal mental health journey, setting the stage for an insightful dis ...
-
Your local time: )The MGM '23 attack caused over 100M$ in losses and halted some of their operations. The Uber '22 attack resulted in complete loss of control of all apps and services. What is common to both attacks is ...
-
Your local time: )From data breaches to compliance challenges, this session will delve into common concerns surrounding cloud computing and provide actionable insights to fortify your organisation's digital assets. Joi ...
-
Your local time: )The session will cover the dynamic shift we have seen in Networking and Security programmes as businesses move to a cloud-centric infrastructure and along with the introduction of new, disruptive tech ...
-
Your local time: )Executives expect teams to explain how data informs their decisions. Enabling staff to make data-driven, informative decisions is key. However, data literacy contains a wide spectrum from regulatory c ...
-
Your local time: )You know that "security awareness" is key to a comprehensive security strategy. But just because someone is aware doesn't mean they care. So how can you design programs that work with, rather than aga ...
-
Your local time: )This session will cover the importance of building a robust cyber defence that blends proactive and reactive approaches. Explore threat intelligence, predictive analytics, and incident response tactic ...
-
Your local time: )Operational Technology security breaches can feel abstract – until they hit you. In this session, we’ll hear from cybersecurity experts who’ve witnessed and dealt with OT security breaches first-hand ...
-
Your local time: )In this session we will explore how individuals from diverse professional backgrounds can leverage their transferable skills to excel in cybersecurity. Our speakers will tell their stories of how they ...
-
Your local time: )A strategic approach that juxtaposes the intricate process of managing cyber identities with the structured guidelines of the Cyber Assessment Framework (CAF) by the NCSC. It aims to highlight the ali ...
-
Your local time: )Join us to explore the pivotal role allies play in promoting diversity, equity and inclusion within the cybersecurity sector. We are joined by senior leaders who will explore actionable strategies to ...
-
Your local time: )In this session, we will explore the current state of email security and the role of automation in combating evolving cyber threats. Join us as we discuss the feasibility, benefits, and challenges of ...
-
Your local time: )Threat, vulnerability, risk. These are words that are often used loosely or incorrectly. So first off, let’s define exactly what these mean Risk mitigation alone is not enough. Find out why threats ma ...
-
Your local time: )In a world of cliches and jargon, has cybersecurity become a comms problem rather than a tech issue? Communications plays a central role in preparing for and responding to cyberattacks, but is there a ...
-
Your local time: )Generative AI has unlocked enormous opportunities in the cybersecurity arena, from streamlined vulnerability management to faster incident response. However, the new attack pathways created as a resul ...
-
Your local time: )Understand the tools and techniques cyber criminals use to penetrate your defences. Beat them. Using real threat intelligence can determine the severity of a vulnerability based on its ability to caus ...
-
Your local time: )Join us for a crucial discussion on securing your Cloud organisation. Whether you're just gaining access or seeking to fortify existing defences, safeguarding your Cloud infrastructure is paramount. A ...
-
Your local time: )Adversaries’ tactics, Techniques, and Procedures (TTPs) are continuously evolving and become more sophisticated. CrowdStrike is continuously monitoring and mitigating these threats and adapting to the ...
-
Your local time: )Can historical insights help build a better cybersecurity future? In this session we explore how the Managed Service Provider landscape is set to change rapidly over the coming years and how a change ...
-
Your local time: )With many any organisations already using some kind of automated threat detection solutions, and increased opportunities for the tech such as generative AI will allow users to request event data using ...
-
Your local time: )As organisations conduct more critical operations in the cloud, managing exposure to cloud cyber risk becomes essential. Join this session to learn about innovations in automated cloud penetration tes ...
-
Your local time: )Using research and analyses from multiple sources, this session will highlight how to formulate a strategy to reduce visibility gaps and communicate business risk tied to your exposure. • Least Priv ...
-
Your local time: )During this session, women cybersecurity leaders will address the pressing gender gap that remains in the field. With women making up just 25% of the cybersecurity workforce, urgent progress needs to ...
-
Your local time: )Due to the increasingly far reaching and comprehensive digitization and networking of IT and OT infrastructures, new attack possibilities are constantly emerging, such as phishing, SQL injection, rans ...
-
Your local time: )Session Description (one paragraph and three bullet points): “AI poses new trust, risk and security management requirements that conventional controls do not address.” * The opportunities of AI are as ...
-
Your local time: )Unlock the secrets to building high-performing cybersecurity teams in this dynamic session that intertwines the principles of psychological safety and diversity. Our expert panel will share insights i ...
-
Your local time: )In today's rapidly evolving threat landscape, organizations face increasing challenges in securing their endpoints. The realm of cloud computing has touched and transformed every industry - this sessi ...
-
Your local time: )Explore the pivotal role of organisational transformation in cybersecurity implementation, unveiling how it enhances overall business value. Delve into the process of integrating cybersecurity awarene ...
-
Your local time: )Discover the key elements of effective cybersecurity awareness training in this panel discussion. Our expert panellists will delve into innovative training approaches, share success stories, and offer ...
-
Your local time: )This talk demonstrates Tools, Techniques and Procedures used to identify, replicate and exploit Active Directory and related weaknesses from the perspective of recent Google Cloud/Mandiant Red Teams. ...
-
Your local time: )Secure Access Service Edge (SASE) promises to finally close the security gap that’s been opened by the emergence of remote working. SASE essentially allows organisations to apply the same level of sec ...
-
Your local time: )Though many organisations understand the basics of cyber hygiene, and the importance of ensuring your sensitive data is protected from cyber-attacks, many still fall victim to cyber-attacks due to the ...
-
Your local time: )As enterprises adopt the cloud, new and broader attack surfaces pose a significant risk to organizations. Most measures of risk focus on vulnerabilities and misconfigurations and ignore active threats ...
-
Your local time: )Discover best practices for evaluating your cloud environment's security, delve into threat identification, assess overall infrastructure security, and learn to implement effective measures for safegu ...
-
Your local time: )The AI trend will continue throughout 2024-2025 as more organisations build their AI capabilities for the now and the future. This session will focus on real-world practical methods to safely enable a ...
-
Your local time: )The widespread adoption of generative AI meant increased productivity for employees, but also for bad actors. They can now create sophisticated email attacks at scale—void of typos and grammatical err ...Speakers
-
Your local time: )The cyber assurance role/function is one that has started gaining serious ground in most maturing organisations. But some others are yet to create or understand the need for this expertise. What does ...
-
Your local time: )In this session, we will delve into the dynamic landscape of digital sovereignty and its profound impact on global collaboration, particularly for multinational organisations. We will address the secu ...
-
Your local time: )Discover an engaging case study that highlights DLA Piper's innovative approach to bolstering security awareness using KnowBe4. They successfully fostered a security-focused culture by gamifying user ...
-
Your local time: )In this session, we will explore the nature of cloud attacks, emphasizing that they are not sudden, two-move checkmates but rather a progression of exploitable vulnerabilities. Our focus will include: ...Speakers
-
Your local time: )As cloud adoption expands, so does the complexity, and keeping pace requires a new approach. Organisations need a solution that deploys without agents in minutes and enables security teams to unify a ...
-
Your local time: )This session will explore emerging technology solutions, and will dive into discussions on artificial intelligence, machine learning, and other innovations shaping the future of cybersecurity. Discove ...
-
Your local time: )With the increasing adoption of cloud computing, traditional security measures have proven ineffective, necessitating the emergence of new technologies like CNAPP. Join us as we explore: The Current S ...
-
Your local time: )Delve into the world of cybersecurity with Wire19's CEO, Munesh Jadoun. Gain valuable insights into proactive cybersecurity measures, threat intelligence, and risk mitigation strategies, including: -P ...Speakers
-
Your local time: )Join Kaseya for a fast-paced session diving into the world of Cybercrimes and how Kaseya’s IT Complete stack is possibly the missing piece to your business. Key Takeaways: • Setting the right security ...
-
Your local time: )Every reported breach has by definition circumvented existing security measures. Planning to protect alone is insufficient; we must be Breach Ready. • Measurably reducing the internal attack surface a ...
-
Your local time: )Explore the essentials of data security in our digital age. This session provides actionable strategies to locate, manage, and secure your data, highlighting best practices for data protection, resili ...
-
Your local time: )To build a cyber resilient organisation you need to focus both on prevention, by raising your security posture, and recovery capabilities, in the assumption that when the worst happens you are operati ...
-
Your local time: )Just over a year ago, OWASP refreshed its list of the top 10 vulnerabilities. Broken access controls moved up four spots to top the list, and it is followed by cryptographic failures, and injection. T ...
-
Your local time: )Empathetic leadership in cybersecurity is a pivotal approach that transcends technicalities to prioritise the well-being and concerns of cybersecurity professionals. This style goes beyond conventiona ...
-
Your local time: )Explore groundbreaking innovations reshaping the cybersecurity landscape. Uncover cutting-edge technologies, strategies, and mindsets vital for defending against ever-evolving threats. Join experts as ...
-
Your local time: )In today's rapidly evolving landscape of cybersecurity, the integration of artificial intelligence (AI) presents both unprecedented opportunities and complex challenges. Understanding the implications ...
-
Your local time: )In this session, I’ll detail my journey and the transition from a degree in Electronic and Electrical Engineering to a career in cyber security as an international student. I will cover the essentials ...
-
Your local time: )Join us for a dynamic discussion on navigating the Cyber space career landscape. Our panel of experts address pressing questions such as the UK's technology skills shortage, ideal entry points into cy ...
-
Your local time: )Steve Grey (ALSO Cloud UK), discusses the benefits of using artificial intelligence (AI) to improve productivity and efficiency for small and medium-sized enterprises (SMEs) and mid-market businesses. ...
-
Your local time: )Adversaries are gaining speed every day and organizations need the ability to stay ahead of cyber threats. Yet in today’s complex IT environment, remediating and patching vulnerabilities on endpoints ...
-
Your local time: )Browsers are the most popular enterprise application yet they lack essential enterprise security capabilities and are the targets of a wide variety of attacks. Seraphic takes any modern browser and i ...