13-26 July 2021
Infosecurity Europe

Sessions

All Sessions
keyboard_arrow_down
keyboard_arrow_down Show filters keyboard_arrow_up Hide filters
  • All Tracks
  • Keynote
  • Talking Tactics
  • ISE
  • Tech Showcase
  • Cyber Innovation Showcase
Tech Showcase
4 Ways Attackers Sidestep Endpoints
event_note
Loading...
event_note
Loading...
place Online Session
card_travel General
mic English
4 Ways Attackers Sidestep Endpoints

As cyberattacks become more sophisticated and difficult to detect, it’s more important than ever for defenders to understand how they work in order to protect against them. In this session, you’ll see how attackers avoid your endpoints and how to detect signs of an attack, even without your EDR firing.

Benefits for delegates attending the session

1. How to create a malicious Office macro 

2. How attackers exploit remote access gateways 

3. How a supply chain attack, like SolarWinds, works 

4. What to look for as a sign of compromise

Loading...
ISE
Active Directory Security: Why Do We Fail and What Do Admins and Auditors Miss?
event_note
Loading...
event_note
Loading...
place Online Session
card_travel General
mic English
Active Directory Security: Why Do We Fail and What Do Admins and Auditors Miss?

Everyone knows Active Directory (AD). It is a seasoned IAM, not to mention one that nearly every organization in the world uses. As AD is responsible for controlling access to most corporate assets, it is the target of most attacks. After 20 years of being overlooked, Active Directory is riddled with vulnerabilities. In this security workshop, a 16x Microsoft MVP will give you direct actions that you can take to reduce your AD security risk.

Five benefits for delegates attending the session:

  1. Learn where threats against AD originate
  2. Understand why there are so many vulnerabilities in AD
  3. Master the rules of Active Directory security
  4. Discover how to detect specific AD attacks used by ransomware
  5. Define what steps to take to reduce AD security risk
Loading...
Talking Tactics
Advanced Attack Simulation
event_note
Loading...
event_note
Loading...
place Online Session
card_travel General
mic English
Advanced Attack Simulation

If you’re concerned about ransomware, whether it’s beating REvil or DarkSide, stopping data exfiltration, or preventing the latest trend of “double extortion”, this session is for you. Join us for a live attack simulation, where we'll walk through a multi-stage attack, and show the side-by-side Defenders view.

Benefits for delegates attending the session:

1. How a simple phishing email can lead to broader compromise.

2. Why a behavioural approach to detection is essential to stopping Ransomware and broader malicious operations.

Loading...
Tech Showcase
AI Analysts: How Machine Learning Mimics Humans & Writes Reports
event_note
Loading...
event_note
Loading...
place Online Session
card_travel General
mic English
AI Analysts: How Machine Learning Mimics Humans & Writes Reports

With pressure on security teams mounting, technology that relieves them from the burden of threat investigation is becoming a necessity. In this session, learn how a technology that automates the processes of threat investigation was created, and how it is uplifting security teams across the globe.

Five benefits for delegates attending the session

1. Learn how an AI approach to security identifies, responds and investigates threats as they appear 

2. Understand how a technology that can mimic complex human thought processes was created 

3. Learn how supervised machine learning can be used to automate the threat investigation process, doing the heavy lifting of the daily threat investigations and identifying incidents of interest

4. Discover how the technology reported on a nation-state APT weeks before public attribution

5. Understand how the technology can be of great value to a SOC, augmenting and uplifting strained security teams

Loading...
Keynote
Aston Martin's Road to Zero Threats
event_note
Loading...
event_note
Loading...
place Online Session
card_travel General
mic English
Aston Martin's Road to Zero Threats

Join Robin’s case-study presentation on foresight information and cybersecurity strategies to transform organisations. As he worked across law enforcement, health and UK think tanks you will hear his unique view to promote 'freedom through information'. During his session, you will learn how Aston Martin’s worked in collaboration with UK Police Service to enhance their threat intelligence programme.

Key learning points:

- How to empower employees to do more while reducing operational overhead
- Enhancing your threat intelligence programme with unique, comprehensive, and easy-to-consume cyber-threat feeds
- Reviewing key trends in cyber criminality and the design of cyber defences including developing micro-learning to raise digital literacy
- Enhancing intelligence-led security testing by developing CTIM and CBEST strategies
- Complementing internal security operations with 24/7/365 coverage

 

 

Loading...
Talking Tactics
Cloud Native Application Security: Embracing Developer-First Security for the Cloud Era
event_note
Loading...
event_note
Loading...
place Online Session
card_travel General
mic English
Cloud Native Application Security: Embracing Developer-First Security for the Cloud Era

Cloud native applications do more than just run on a different platform. The methodologies and skills used to build them are entirely different. Security practices for these applications need a transformation of equal magnitude. In this session, you’ll learn how to adapt your practices to this new organizational reality by adopting a developer-first cloud native application security (CNAS) approach. 

Guy Podjarny, the Author of O'Reilly's new book, "Cloud Native Application Security", will explain this market transition and review the organizational changes required to succeed, including alterations to security practices and tooling. He will share concrete examples to help clarify concepts and act as role models to consider.

Five benefits for delegates attending the session

1. By the end of this session, you’ll understand why and how to embrace a CNAS approach

2. Initiate dev-first security by equipping developers with the mandate and tools to secure what they build during the development process

3. Expand the scope of application security for cloud native apps to include controls that IT security previously handled

4. Learn how adopting CNAS requires significant changes to the way you secure applications and infrastructure

5. Adapt your organization to a dev-first CNAS approach by rethinking your security organizational structure, tooling, and priorities

Loading...
Tech Showcase
Human Layer Security Powered by Machine Learning
event_note
Loading...
event_note
Loading...
place Online Session
card_travel General
mic English
Human Layer Security Powered by Machine Learning

Your employees now control both your systems and your data and, the fact is, people make mistakes, people break the rules, and people can be hacked. Data breaches are at an all time high, and Human Layer Security is more important than ever.

Five benefits for delegates attending the session:

1. Understand why data breaches are at an all-time high

2. Discover what is the new paradigm of security

3. Connect the dots to why the Human Layer is a critical component to your business's cybersecurity strategy

4. Find out how machine learning can help keep your people secure without getting in their way

5. Learn how you can start securing the Human Layer today

 

Loading...
Tech Showcase
Open Season on Open Source - Entering The New Frontier of Securing OSS
event_note
Loading...
event_note
Loading...
place Online Session
card_travel General
mic English
Open Season on Open Source - Entering The New Frontier of Securing OSS

Open source developers are the new front line of security. Attackers have recognised the power of open source and are now beginning to create their own opportunities to attack. This new form of attack on our software supply chains, where OSS project credentials are compromised and malicious code is intentionally injected into open source libraries, allows hackers to poison the well. The vulnerable code is then downloaded repeatedly by millions of software developers who unwittingly pollute their applications to the direct benefit of bad actors.

Five benefits for delegates attending the session:

1. How bad actors are getting into open source projects, tools and development environments

2. What the most common types of malicious takeovers are including typo squatting and brandjacking 

3. How developers can step into the role of security, to protect themselves, and the millions of people depending on them 

4. What enterprises can do to educate their developers on this growing trend of malicious attacks on open source 

5. Why this is trend is only going to continue to grow - leaving more people more and more vulnerable if action isn’t taken

 

Loading...
Tech Showcase
Remote Work is Putting Your Data at Risk. Protect it with Zero Trust
event_note
Loading...
event_note
Loading...
place Online Session
card_travel General
mic English
Remote Work is Putting Your Data at Risk. Protect it with Zero Trust

A year into the pandemic, organisations are still grappling with how to protect business-critical data with the shift to remote work. The 2021 State of Remote Work Security Report found nearly 80% of respondents see data leakage as the greatest potential threat. With remote work becoming the new normal, organisations must address data security risks. Join us for this session as we reveal highlights from the survey and discuss modern security strategies to address information security now and in the long term to ensure secure information access, usage and sharing across your collaboration applications

Benefits for delegates attending the session:

1. Learn the key challenges, security threats and technology gaps identified in the report

2. Understand the impact of remote work on meeting GDPR and privacy compliance mandates

3. Discover how new security strategies like leverage zero trust provide the key to solving these challenges

5. Learn the advantages of Attributed-based access control (ABAC)

4. See how NC Protect dynamically secures collaboration across Microsoft apps using these strategies

 

Loading...
Talking Tactics
Schrems II: What You Need to Follow the EDPB Recommendations
event_note
Loading...
event_note
Loading...
place Online Session
card_travel General
mic English
Schrems II: What You Need to Follow the EDPB Recommendations
The Schrems II decision has had a big impact on organizations of all shapes and sizes. In this session, learn how to operationalize the EDPB’s newly adopted recommendations, and how OneTrust’s free tools and templates can help your organization:
  • Identify data transfers and the mechanisms relied upon with OneTrust Data Mapping
  • Assess vendors relying on SCCs with pre-built SCC validation templates in OneTrust Vendor Risk Management
  • Reduce the burden of vendor assessments through pre-completed assessments in the OneTrust Vendorpedia Exchange
  • Manage contract updates and vendor on-boarding and off-boarding through OneTrust Vendor Risk Management
  • Get instant alerts on new Schrems II guidance with OneTrust DataGuidance Regulatory Research
Loading...
Processing. Please wait.
Loading...