IP EXPO Europe 2018 - F5 at IP EXPO Europe 2018
3 - 4 OCTOBER 2018 / EXCEL LONDON
Register Now
IP EXPOCyber SecurityDeveloperAI and AnalyticsIoTBlockchain
F5

F5 at Cyber Security X Europe

F5 makes apps go faster, smarter, and safer for the world’s largest businesses, service providers, governments, and consumer brands. F5 delivers cloud and security solutions that enable organizations to embrace the application infrastructure they choose without sacrificing speed and control. For more information, go to f5.com. You can also follow @F5NetworksEMEA on Twitter or visit them on LinkedIn and Facebook for more information about F5, its partners, and technologies.

Jump to: Assets / Speakers / Sessions

 F5 Assets

Credential Stuffing: A Security Epidemic

As identities become the prime targets of cybercriminals, identity and access security become paramount in ensuring the integrity of applications and data. By combining user training, strong and consistent corporate policies, a robust web application firewall, and a centralized authentication and authorization gateway, organizations can prevent, or at least mitigate, today’s increasingly powerful and persistent credential stuffing attacks. 

From DDoS to Digital Point of Sale: Bots Mean Business

 Managing your relationship with bots—good and bad— has become an inherent part of doing business in a connected world. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world. 

  

The Evolving Risk Landscape: Preparing for Emergent Threats

 By carefully considering current and emerging threats, utilising and sharing threat intelligence, and aligning solutions with budget requirements, you can build out a comprehensive security program to be successful and safe now and in the future.

How Malware Can Steal Your Data—and What You Can Do to Stop It

In a world of different types of criminals with varying skill levels, time commitments, resources, and specializations, there’s only one constant: attackers have their eyes set firmly on your apps and the data behind them—and they’re using malware to steal it. While there’s no single thing you can do to prevent these kinds of attacks, a layered defense strategy can help dramatically reduce your vulnerability to malware. 

F5 Speakers

Keiron Shepherd
Keiron Shepherd

Senior Security Systems Engineer (UK&I)

F5 Networks

View Speaker

Keiron Shepherd

A Snr Security Systems Engineer working at F5 Networks, having a background of 17 years within the security industry. Previously occupied roles in consulting, engineering, and security penetration testing.

Matthew Prickett
Matthew Prickett

Specialist Systems Engineer

F5 Networks

View Speaker

Matthew Prickett

Specialist Systems Engineer, focusing on cloud technologies ranging from private/public cloud to automation and orchestration

David Warburton
David Warburton

Senior Threat Research Evangelist EMEA

F5 Labs

View Speaker

David Warburton

David is an information security threat researcher and evangelist for F5 Networks. His focus areas of research are on cryptographic protocols and certificates, digital identity, web application security, information risk management and compliance & regulation. A recent alumni of Royal Holloway University where he wrote his MSc dissertation on IoT Security, he now works on identifying emerging cyber threats, producing actionable intelligence reports and consulting on cyber security strategy within public sector, retail and financial organisations.
 
A regular speaker at industry events and contributor to online, print and TV media, he has over 20 years of experience in infrastructure and security. Previous roles include Senior Systems Engineer with F5 Networks and Solution Architect for cloud and data centre services with SCC. 

F5 Sessions

  • Automated Security in a Multi Cloud World Thu 4th Oct 11:00 - 11:30

    Automated Security in a Multi Cloud World

    Businesses are moving and building new applications in cloud environments at an ever increasing pace. Learning how to manage the security and application services of these apps wherever they live can be a challenging and time consuming task.

    We show you how automation can help you deliver application security in a multi cloud world.

    Speaker

    Keiron Shepherd

    Keiron ShepherdMore

    Matthew Prickett

    Matthew PrickettMore

    Time / Place

    Thu 4th Oct 11:00 to 11:30

    Cloud Security

  • Automated Security in a Multi Cloud World Wed 3th Oct 12:20 - 12:50

    Automated Security in a Multi Cloud World

    Businesses are moving and building new applications in cloud environments at an ever increasing pace. Learning how to manage the security and application services of these apps wherever they live can be a challenging and time consuming task.

    We show you how automation can help you deliver application security in a multi cloud world.

    Speaker

    Keiron Shepherd

    Keiron ShepherdMore

    Matthew Prickett

    Matthew PrickettMore

    Time / Place

    Wed 3th Oct 12:20 to 12:50

    Cloud Security

  • Thingbot Apocalypse: How to prepare for IoT attacks Thu 4th Oct 12:20 - 12:50

    Thingbot Apocalypse: How to prepare for IoT attacks

    It is projected that by 2035 there will be over 1 trillion Things connected to the internet. That’s 142 devices for every human on this planet. Despite cutting edge technology and exciting new use cases in fields such as medical care, smart homes and autonomous vehicles, these devices are routinely hacked. Since compromised IoT devices can be used to pivot inwards and attack an organisation’s internal network or, conversely, used to create a botnet to attack many organisations at once, IoT security affects all of us, whether we use personally use IoT or not.

    Research by F5 Labs has shown that IoT attacks have been lurking in the shadows for longer than you might think and used to carry out far more than just crude denial of service attacks. Threat campaigns using IoT devices include data theft, fraud and cryptojacking. This talk will show you what devices are vulnerable, how IoT devices are found and then compromised, the trends in IoT based attacks, and how to plan for and defend against the rise of the Thingbots!

    Speaker

    David Warburton

    David WarburtonMore

    Time / Place

    Thu 4th Oct 12:20 to 12:50

    Cyber Threat Protection

  • Thingbot Apocalypse: How to prepare for IoT attacks Wed 3th Oct 15:00 - 15:30

    Thingbot Apocalypse: How to prepare for IoT attacks

    It is projected that by 2035 there will be over 1 trillion Things connected to the internet. That’s 142 devices for every human on this planet. Despite cutting edge technology and exciting new use cases in fields such as medical care, smart homes and autonomous vehicles, these devices are routinely hacked. Since compromised IoT devices can be used to pivot inwards and attack an organisation’s internal network or, conversely, used to create a botnet to attack many organisations at once, IoT security affects all of us, whether we use personally use IoT or not.

    Research by F5 Labs has shown that IoT attacks have been lurking in the shadows for longer than you might think and used to carry out far more than just crude denial of service attacks. Threat campaigns using IoT devices include data theft, fraud and cryptojacking. This talk will show you what devices are vulnerable, how IoT devices are found and then compromised, the trends in IoT based attacks, and how to plan for and defend against the rise of the Thingbots!

    Speaker

    David Warburton

    David WarburtonMore

    Time / Place

    Wed 3th Oct 15:00 to 15:30

    Cyber Threat Protection

 
Top