9 - 10 OCTOBER 2019 / EXCEL LONDON
Register Interest
IP EXPOCyber SecurityDeveloperAI and AnalyticsIoTBlockchain

Seminars

Here is a list of all confirmed Seminars for 2018.

All |  Date:
3rd October
4th October 
Select a speaking company
Cyber Threat Protection 16
  • Wed 3rd Oct 11:00 - 11:30
  • How Do Hackers Steal Your Passwords? Alexandre Cagnoni  |   WatchGuard   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 11:00 to 11:30

    How Do Hackers Steal Your Passwords?

    Join us to learn more about the methods hackers use today to hack into your accounts and steal your passwords- everything from cracking tools to mimikatz. The simplicity of their methods will surprise you.

    Speaker

    Photo Speaker Name Profile
    Alexandre Cagnoni Alexandre Cagnoni View Profile
  • Wed 3rd Oct 11:40 - 12:10
  • Revenge of the Nerds. Using Data Science to defeat the cybercriminals John Shaw  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 11:40 to 12:10

    Revenge of the Nerds. Using Data Science to defeat the cybercriminals

    John Shaw will describe how Sophos’s data scientists are using machine learning, neural networks and other data science techniques to stop new and unknown malicious activity in business networks. He will describe the techniques that are already proving very effective, and where the next breakthroughs are likely to come from.

    Speaker

    Photo Speaker Name Profile
    John Shaw John Shaw View Profile
  • Wed 3rd Oct 12:20 - 12:50
  • HACKING EXPOSED: Stories from the battlefield: lessons learnt in responding to the most advanced cyber attacks Zeki Turedi   |   CrowdStrike   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 12:20 to 12:50

    HACKING EXPOSED: Stories from the battlefield: lessons learnt in responding to the most advanced cyber attacks

    CrowdStrike continues to expose unprecedented efforts by highly sophisticated adversaries targeting -- and in some cases, selectively leaking -- information stolen from sensitive government, corporate and private networks. These intrusions reflect a broad range of motives and targets, revealing many never-before-seen tactics, techniques and procedures (TTPs) that are advancing the art of data manipulation and attack obfuscation, while raising the bar significantly for organizations seeking to protect themselves from these potentially disruptive and destructive attacks.

    This session will shed light on alarming new trends CrowdStrike has observed in the global cyber threat landscape, and the evolving best practices that are proving most successful against criminal, hacktivist and nation-state adversaries.

    Speaker

    Photo Speaker Name Profile
    Zeki Turedi Zeki Turedi View Profile
  • Wed 3rd Oct 13:00 - 13:30
  • Securing email – so much more than just encryption Neil Larkins  |   Egress   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 13:00 to 13:30

    Securing email – so much more than just encryption

    Email is far from dead. It is estimated that over 281 billion emails are sent globally every day, cementing it as one of the primary mechanisms for business communication. However, when relied upon by staff to share personal data, email also becomes a major cause of data breaches.

    Join Egress’ Neil Larkins as he examines the ways email security technology can adapt to tackle security threats in a time when organisations are under more legislative pressure than ever before, including the evolution of encryption, preventing user error and risk-based authentication.

    Speaker

    Photo Speaker Name Profile
    Neil Larkins Neil Larkins View Profile
  • Wed 3rd Oct 13:40 - 14:10
  • The True Costs of Cybercrime and the Defender’s Dilemma in a Rapidly Evolving Cybersecurity Landscape Helge Husemann  |   Malwarebytes   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 13:40 to 14:10

    The True Costs of Cybercrime and the Defender’s Dilemma in a Rapidly Evolving Cybersecurity Landscape

    Organizations in the UK are experiencing the highest incidence of phishing attacks, malware and ransomware attacks, and data breaches leading to significant increase in endpoint remediation costs. Security professionals in businesses often find themselves constantly defending against a rapidly evolving and increasingly sophisticated threat landscape that exploits the outdated and inadequate endpoint protection solutions currently deployed, leading to the defender’s dilemma.

    Attend the session to learn in-depth about the rapidly evolving threat landscape in the UK; the true costs of cybercrime; and advanced cybersecurity techniques to prevent, detect and respond against these cyberthreats.

    Speaker

    Photo Speaker Name Profile
    Helge Husemann Helge Husemann View Profile
  • Wed 3rd Oct 14:20 - 14:50
  • Let’s Build a Wall: A Human Firewall Hiwot Mendahun  |   Mimecast   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 14:20 to 14:50

    Let’s Build a Wall: A Human Firewall

    Many organisations tend to focus solely on using security solutions to protect their organisation from cyberattacks and fail. Since technology-based security systems can’t provide perfect protection end users play a critical part in an organisations’ security and risk posture.

    Mimecast looks at how organisations can detect, respond and recover from cyber threats keeping in mind the role of the end user. Learn tactics for how to make the end user a layer of additional security versus a security weakness.  Don’t let human error be your organisation’s weakest link.

    Speaker

    Speaker Name Profile
    Hiwot Mendahun View Profile
  • Wed 3rd Oct 15:00 - 15:30
  • Thingbot Apocalypse: How to prepare for IoT attacks David Warburton  |   F5 Labs  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 15:00 to 15:30

    Thingbot Apocalypse: How to prepare for IoT attacks

    It is projected that by 2035 there will be over 1 trillion Things connected to the internet. That’s 142 devices for every human on this planet. Despite cutting edge technology and exciting new use cases in fields such as medical care, smart homes and autonomous vehicles, these devices are routinely hacked. Since compromised IoT devices can be used to pivot inwards and attack an organisation’s internal network or, conversely, used to create a botnet to attack many organisations at once, IoT security affects all of us, whether we use personally use IoT or not.

    Research by F5 Labs has shown that IoT attacks have been lurking in the shadows for longer than you might think and used to carry out far more than just crude denial of service attacks. Threat campaigns using IoT devices include data theft, fraud and cryptojacking. This talk will show you what devices are vulnerable, how IoT devices are found and then compromised, the trends in IoT based attacks, and how to plan for and defend against the rise of the Thingbots!

    Speaker

    Photo Speaker Name Profile
    David Warburton David Warburton View Profile
  • Wed 3rd Oct 15:40 - 16:10
  • Getting best value out of your proxy investments with ultra-secure browsing Henry Harrison  |   Garrison Technology   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 15:40 to 16:10

    Getting best value out of your proxy investments with ultra-secure browsing

    Once upon a time, the job of the proxy as a security tool was clear: identify bad sites and bad content, and block it. With increasingly sophisticated and targeted attacks, this job is getting harder and harder. It is time for the job of the proxy (or the proxy service) to change. From identifying and blocking known bad sites, it must transitions to keeping endpoints protected by identifying and blocking potentially risky sites.

    But in some cases these risky sites provide valid content and services, and employees have a legitimate need to go there. Rather than simply unblocking them - after all, they still remain risky - the need is for an ultra-secure browsing solution that employees can use to visit even the riskiest sites without putting the endpoint at risk. Learn how Garrison SAVI® ultra-secure browsing can help you give your proxy or proxy service a new lease of life as a platform for risk-based policy enforcement.

    Speaker

    Photo Speaker Name Profile
    Henry Harrison Henry Harrison View Profile
  • Wed 3rd Oct 16:20 - 16:50
  • Protection from Internet Crime & Advanced Threats Dr. Serge Droz  |   Open Systems   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 16:20 to 16:50

    Protection from Internet Crime & Advanced Threats

    Digital business and cybersecurity risks have become inseparable. Enterprises need to think beyond compromise in order to understand the affects. In this presentation, hear from Open System’s VP of OS-Cert as he takes a deep dive into the internet underground and how to protect your Enterprise against the real internet threats from internet crime and advanced threats.

    Speaker

    Photo Speaker Name Profile
    Dr. Serge Droz Dr. Serge Droz View Profile
  • Thu 4th Oct 11:00 - 11:30
  • Evolving Security Analysis: Combining Human and Cyber Threat Intelligence Tech Leaders  |  Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 11:00 to 11:30

    Evolving Security Analysis: Combining Human and Cyber Threat Intelligence

    Deception tactics used by attackers are evolving faster than the defensive techniques of most email security systems. To combat this, Mimecast continuously harvests threat intelligence from billions of monthly emails. As an email security cloud gateway, we regularly see attackers using both new evasion techniques as well as malware that's over a decade old. Mimecast understands Threat Intelligence, but with all the technology in the world, do we need a human’s trained eye to spot the threat to your company or organisation?

    Speakers

    Speaker Name Profile
    Derek Buchanan View Profile
    Kirsty Kelly View Profile
  • Thu 4th Oct 11:40 - 12:10
  • Don't Let BYOD Put Your Whole Network at Risk Matt Boddy  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 11:40 to 12:10

    Don't Let BYOD Put Your Whole Network at Risk

    We carry mobile devices with us at all times, we take them to bed, we take them to the bathroom. We’ve seen time and time again what happens if someone clicks the wrong link on a Windows machine. But what happens if you do the same on your mobile? What happens if you then later connect to the same network as that mobile device? How can we protect ourselves, our families and our colleagues? These are all questions I aim to answer during this presentation where I hack into an Android device and use that device to take down a corporate network.

    Speaker

    Photo Speaker Name Profile
    Matt Boddy Matt Boddy View Profile
  • Thu 4th Oct 12:20 - 12:50
  • Thingbot Apocalypse: How to prepare for IoT attacks David Warburton  |   F5 Labs  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 12:20 to 12:50

    Thingbot Apocalypse: How to prepare for IoT attacks

    It is projected that by 2035 there will be over 1 trillion Things connected to the internet. That’s 142 devices for every human on this planet. Despite cutting edge technology and exciting new use cases in fields such as medical care, smart homes and autonomous vehicles, these devices are routinely hacked. Since compromised IoT devices can be used to pivot inwards and attack an organisation’s internal network or, conversely, used to create a botnet to attack many organisations at once, IoT security affects all of us, whether we use personally use IoT or not.

    Research by F5 Labs has shown that IoT attacks have been lurking in the shadows for longer than you might think and used to carry out far more than just crude denial of service attacks. Threat campaigns using IoT devices include data theft, fraud and cryptojacking. This talk will show you what devices are vulnerable, how IoT devices are found and then compromised, the trends in IoT based attacks, and how to plan for and defend against the rise of the Thingbots!

    Speaker

    Photo Speaker Name Profile
    David Warburton David Warburton View Profile
  • Thu 4th Oct 13:00 - 13:30
  • DNS Tunneling and Exfiltration Kevin Piper  |   Verisign  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 13:00 to 13:30

    DNS Tunneling and Exfiltration

    Hiding in plain sight, the use of DNS, a critical component of online communication, is being leveraged by hackers for malicious activities such as stealing your data, delivering malicious payloads to your systems, and probing you network for vulnerabilities.  

    DNS tunneling and exfiltration present potent threats to data security, which can be extremely difficult to detect if your organization lacks security solutions designed to spot and mitigate them.  By understanding and implementing solutions to combat DNS tunneling and exfiltration, you can keep your organization secure.

    Speaker

    Photo Speaker Name Profile
    Kevin Piper Kevin Piper View Profile
  • Thu 4th Oct 13:40 - 14:10
  • How would you find out if a supplier breached your data? Jeremy Hendy  |   RepKnight   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 13:40 to 14:10

    How would you find out if a supplier breached your data?

    We all use tens or hundreds of third-party suppliers to store and process our data. Whether it’s your CRM, HR software, payroll, training and pension companies, your corporate data has already left the building. And as we’ve seen with many high-profile businesses like Ticketmaster, a third-party data breach can quickly cause major reputational & financial damage to your business. But how do you look after your data when it’s outside your network?

    This presentation outlines simple steps for Data Breach Detection, ensuring you're the first to find out when your data is leaked, hacked, or sold on the Dark Web. In a post-GDPR world, Data Breach Detection could save you millions.

    Speaker

    Photo Speaker Name Profile
    Jeremy Hendy Jeremy Hendy View Profile
  • Thu 4th Oct 14:20 - 14:50
  • ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts Kevin Kiley  |   OneTrust   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 14:20 to 14:50

    ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts

    Together, security and privacy teams share a common goal: Protect the organization from reputational damage, lawsuits, and regulatory trouble. On one hand, ISO 27001 focuses on the assessment of risks and protection of the organization. On the other, the GDPR aims to assess and protect the rights and freedoms of individuals. With a joint goal in mind, it is crucial that security and privacy teams work together to develop a common language that produces greater productivity and takes advantage of collective efforts. In this session, OneTrust will present findings from research conducted in cooperation with the International Association of Privacy Professionals (IAPP), sharing how ISO 27001 and the GDPR overlap, as well as how security and privacy teams can work together to become more effective.

    Speaker

    Photo Speaker Name Profile
    Kevin Kiley Kevin Kiley View Profile
  • Thu 4th Oct 15:00 - 15:30
  • How Client-Side Application Shielding Can Tackle Fraud and Detect Tampering On Your Website Carlos M. Gonçalves  |   Jscrambler  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 15:00 to 15:30

Top