INTERPOL WORLD Theatre 2, Level B2

INTERPOL WORLD Theatre 2, Level B2

What The HACK? – Inside the Hacker’s Mind

As Web technology blossoms, vulnerabilities multiply and hackers are continuously looking to take advantage of them. With thousands of systems being attacked daily even with high-level security, there’s always a weakness. It is war out there! Malicious hackers are waiting to attack with every live application that organizations bring online. Hackers are using new tactics to disguise and outsmart security controls.

Document authentication: the key to more fraud efficient front office processes

Verifying identity documents is becoming increasingly more complex. Border authorities and public and private administrations face the challenge of detecting suspected fraud on various types and versions of documents (passport, ID card, driver’s license, etc.) from an array of issuing countries. As identity document verification forms an integral part of sensitive processes like enrolment and registration in many front desk processes and with the growing sophistication of document fraud, visual checks - to ascertain the authenticity of documents presented - are no longer sufficient.

Highway to Hell or Stairway to Heaven? The privileged pathway of targeted attacks

Targeted attacks are the mostly emphasized growing cyber threat to organizations in the last few years and in the foreseeable future. Even organizations that once relied on perimeter defenses understand nowadays that when targeted, their perimeter will not withstand the attack and the mitigation focus should shift to inside the network, preventing the attacker from operating, detecting the malicious activity and setting up response capabilities to minimize the damage.

Safe Cities – Through the Eyes of Imaging Technologies

The conceptualization of a safe city and modern surveillance infrastructure lays a lot on big data management, software and integration of systems but there is little to no investments being made to improve on the imaging optics which is the key to delivering a high quality image so that matching algorithm do less work at the backend resolution engines. Infinity Optics™ Solutions has developed a proprietary lens technology, the InfinityLens+™ that allows image capture with a Massive-Depth-of-Field vision using just a Single Lens system.

CCFPSM Clinic

FREE two-hour education session based on the (ISC)2 CBK® for the Certified Cyber Forensics Professional (CCFPSM). Delivered by (ISC)2 Forensics Subject Matter Experts (SMEs), the CCFP Clinic will provide forensics professionals with an understanding of the credential and domains, career benefits for credential holders, and the overall exam process, taking candidates one step closer to earning the CCFP certification. CCFP provides a comprehensive validation of your knowledge and skills as a digital forensics expert.

Staying Ahead of the Cyber Security Curve

Over 95% of enterprises and government agencies are compromised and don't know it. As new technologies are developed and implemented, they also present new attack vectors that evil doers can take advantage of to attack your IT security systems and processes. And often, enterprises and governments are compromised without even knowing. Not only do they need to be able to protect, respond and recover from these acts, they must be able to preempt such attacks.

Austrian Achievements in S&T&I in Cybersecurity, Safe Cities and Supply Chain Management

A presentation illustrating the first national security research programme (established 2005) within Europe and its achievements, and an insight on latest development of security research in the following fields: Cyber Attack Information System (CAIS), trustworthy exchange of information (Cyber Incident Information Sharing), next generation encryption methods for virtualization of IT-services (Cloud Computing) and border security systems using VHBR – Very High Bit Rate.

The Enterprise Immune System: Detect Emerging Cyber Threat in Real Time

In this new era of threat, sophisticated cyber-attacks are getting harder to detect. This presentation will explain Darktrace’s new approach to cyber defense, inspired by the human immune system. The Enterprise Immune System is unique in its ability to detect emerging cyber threat in real time, within the network. Darktraces self-learning technology learns normal and abnormal behaviors of individuals and devices within an enterprise, in order to detect anomalous and potentially threatening events.

Pages

Event Owner

Supported By

Supporting Knowledge Partner

Held in

Managed By