Loading
We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
Loading
-
Your local time: )In this session, we will explore why the key to long-term success in cybersecurity lies in returning to the fundamentals. By reinforcing core principles, we can build a strong, sustainable foundation ...
-
Your local time: )Maslow’s Hierarchy of Needs can be applied to organisational security culture, with security approaches driven by the fulfillment of fundamental needs similar to human development stages. A strong sec ...
-
-
Your local time: )This presentation tackles the critical yet often overlooked challenges of supply chain security in our interconnected business world. Through analysis of recent high-profile compromises, we'll explore ...
-
Your local time: )If everything is critical, NOTHING IS. There are too many threats, vulnerabilities, patches, alerts… Let’s discuss an approach to cyber risk management THAT WORKS. How to start speaking the language o ...
-
Your local time: )This talk will highlight that security is not merely a technical challenge, but a cultural and human one. The session will explore how security becomes deeply ingrained in an organisation when its "se ...Speakers
-
Your local time: )
-
Your local time: )This presentation shall seek to discuss the following topic points; Going ‘all in’ on Cloud-native, the security upsides and downsides. The importance of effective Cloud-platform control, management, ...Speakers
-
Your local time: )
-
Your local time: )Deepfakes are getting easier to make but how can they be used in crime? Are they the next tool in the social engineer’s toolkit? From hacked CCTV to cloned RFID cards and quality deepfakes, Jake will ...
-
Your local time: )
-
Your local time: )In a world where cyber threats evolve faster than ever, Big Data is the key to staying ahead. This session explores how businesses can harness the power of big data to revolutionise their Cybersecurit ...
-
Your local time: )This engaging panel discussion will explore the evolving landscape of cyber security talent and how embracing diverse career paths and backgrounds can create a more adaptive and innovative workforce. ...
-
Your local time: )This presentation tackles the critical yet often overlooked challenges of supply chain security in our interconnected business world. Through analysis of recent high-profile compromises, Andy will exp ...
-
Your local time: )Strengthening the Weak Link: Enhancing Your Cybersecurity Posture Through Effective Employee Engagement.
-
Your local time: )This engaging panel discussion will explore the evolving landscape of cyber security talent and how embracing diverse career paths and backgrounds can create a more adaptive and innovative workforce. ...
-
Your local time: )
-
Your local time: )In cybersecurity, technology alone cannot fully safeguard digital assets. While advanced systems are vital, the human firewall plays a crucial role in preventing and mitigating threats. This session f ...
-
Your local time: )As technology advances, application security faces new complexities. This presentation focuses on three critical areas:1) AI-Generated Code Risks: AI revolutionizes software development but introduces ...
-
Your local time: )The session will cover how expanding the scope of threat intelligence can help businesses understand the efficiency of utility and its application to large-scale board member decisions.
-
Your local time: )
-
Your local time: )
-
Your local time: )Whilst Cybersecurity’s focus is to combat current threats, it is also important to remain forward-thinking and assess how to prevent future evolving cyber-attacks. In this session, we will delve into ...
-
Your local time: )Join industry experts as they delve into Deepfake technology and its impact on privacy, trust, and security. Discover how AI-generated content is used both for innovation and exploitation, raising con ...