INTERPOL WORLD Theatre 2, Level B2

INTERPOL WORLD Theatre 2, Level B2

The Enterprise Immune System: Detect Emerging Cyber Threat in Real Time

In this new era of threat, sophisticated cyber-attacks are getting harder to detect. This presentation will explain Darktrace’s new approach to cyber defense, inspired by the human immune system. The Enterprise Immune System is unique in its ability to detect emerging cyber threat in real time, within the network. Darktraces self-learning technology learns normal and abnormal behaviors of individuals and devices within an enterprise, in order to detect anomalous and potentially threatening events.

Cyber threats overview and response through next generation of Cyber-security centres

From Sopra Steria (35000 people, 20 countries) knowledge and day-to-day surveillance from its cybersecurity datacentres, cyber-risks are amplifying. Cyber-threats (mainly Advanced Data leakage) are increasing including new type of risks such as data destruction and ransomware approach. APT1 report, Aaramco and last Davos 2015 report illustrate this situation.

Think like an attacker, Not an Auditor

Breaches like the ones at Target in US and South Korean banks have proven that simply passing a PCI audit doesn't mean customer data cannot be compromised. Being compliant is important, but it's not enough to mitigate probable attacks and protect critical information. Organizations need to focus on securing the business first, then documenting the process to prove compliance, not the other way around. In order for organizations to move from a compliance-focused to a risk-focused security program, they need to think like an attacker (not an auditor) and understand the threat landscape.

Innovation in Data-Centres - deployment of cutting-edge RFID technology to safeguard data and critical locations

Get a critical insight on how some of the major data centres safe-keep, audit and manage their data security through the deployment of key management system. Gain firsthand clarity on how you can increase security access by integrating the electronic key management system to building management system thereby preventing keys being brought out of the data centres. Find out also how interoperability of different application systems can be enhanced with the seamless integration of our system with third party access systems.

How can government agencies control and protect nation critical mobile infrastructures?

Due to mass usage of mobile telephony all across the globe mobile networks have become nation critical infrastructure. The loss of communication can lead to numerous events. On the other hand the information gathered from these networks can provide new insight in traffic and densities. The LIMA Protect product suite provides solutions to cover situations like high profile events, disasters and border control.

Effective Incident Response from The Front Lines

Many incident response (IR) professionals in security operation centers (SOCs) are faced with challenges to make sense out of a high volume of alerts and work flow processes. Many organisations are plagued with lack of resources and IR professionals. Given the ever-increasing number and complexity of cyber threats, how do IR pros achieve their goal of responding to ‘every’ alert in today’s world of continuous compromise?

The Global State of Information Security Survey (GSISS) 2014

Mr Steve Ingram will be introducing the Global State of Information Security Survey (GSISS) report, recently released by PwC. This survey draws its results from executives of leading organisations across various industries around the world, and provides a picture of the current cyber landscape. Mr Ingram will discuss the significant increase in both frequency of cyber-attacks and their financial impact; while security spending globally remain a static percentage of IT budgets.

Risk Analysis: IT Offensive Surveillance in Today’s Changing, Challenging and Dangerous World’

Changing technology, public opinion and new evasion techniques threaten to make law enforcement agencies blind in the internet age, new technology and new products from internet companies, phone and computer makers and others are all cause for concern while privacy activists are driving a skewed public opinion. How can law enforcement understand and operate effectively in this difficult and changing environment? In this talk, you will hear from a senior officer at hacking team, the world leader in offensive lawful surveillance.

Investigating Cybercrime with Context

Cyber incidents and data breaches are increasing at an alarming rate as attackers continue to evade perimeter security solutions. The emphasis on reducing the sale of an incident has never been greater as finite investigative resources attempt to reduce the time between the incident and containment. This session brings context to your incident response investigations, we will harness the power of visualizations and relationship analytics to support the rapid autopsy of a data breach, quickly drawing out the key forensics artifacts to the user.

Pages

Event Owner

Supported By

Supporting Knowledge Partner

Held in

Managed By